Thursday, March 16, 2017

Suspected Hack Attack Snagging Cell Phone Data Across D.C.

Malicious entity could be tracking phones of domestic, foreign officials


An unusual amount of highly suspicious cellphone activity in the Washington, D.C., region is fueling concerns that a rogue entity is surveying the communications of numerous individuals, likely including U.S. government officials and foreign diplomats, according to documents viewed by the Washington Free Beacon and conversations with security insiders.
A large spike in suspicious activity on a major U.S. cellular carrier has raised red flags in the Department of Homeland Security and prompted concerns that cellphones in the region are being tracked. Such activity could allow pernicious actors to clone devices and other mobile equipment used by civilians and government insiders, according to information obtained by the Free Beacon.
It remains unclear who is behind the attacks, but the sophistication and amount of time indicates it could be a foreign nation, sources said.
Mass amounts of location data appear to have been siphoned off by a third party who may have control of entire cell phone towers in the area, according to information obtained by the Free Beacon. This information was compiled by a mass-monitoring program supported by DHS and ESD America and known as ESD Overwatch.
Cell phone information gathered by the program shows major anomalies in the D.C.-area indicating that a third-party is tracking en-masse a large number of cellphones. Such a tactic could be used to clone phones, introduce malware to facilitate spying, and track government phones being used by officials in the area.

Wednesday, March 8, 2017

ComSec LLC Adds OverWatch IMSI Catcher Detection Services

Virginia Beach, VA, March 08, 2017 --(PR.com)-- J.D. LeaSure, President/CEO of ComSec LLC announces the addition of IMSI catcher detection capabilities to ComSec’s world-class electronic eavesdropping / detection services. Surreptitious use of IMSI (international mobile subscriber identity) catchers and stingray devices pose a significant threat to the security and privacy of USA corporations and individuals. With ComSec’s IMSI catcher detection services, our clients gain cost-effective, real-time knowledge of IMSI catchers, baseband processor attacks, rogue base stations and cellular jamming threats to their devices and environment.

“ComSec LLC’s exclusive deployment of the ESD Overwatch System equips our clientele with real-time, actionable intelligence they can use to stop cellular attacks and to secure their networks. Enhancing our service offerings with IMSI catcher detection capability further demonstrates ComSec’s commitment to providing all-inclusive eavesdropping threat detection services that strengthen our clients’ security defenses," remarked J.D. LeaSure, ComSec LLC's President/CEO.

Hackers, foreign governments, foreign intelligence services, authoritarian regimes (via the black market in China), etc. use IMSI catchers to illegally access information sent and received via the 2G cellular network. IMSI catchers can be used to verify a phone’s location, track and locate a device, perform a denial of service attack, monitor cell phone use, intercept calls and SMS, and/or alert on the arrival and exit of a phone from a location. While an IMSI catcher can be made for approximately $500, the information illegally captured can be worth millions to the right buyer, and can result in critical financial and other ramifications for the affected corporation or individual.


Call ComSec LLC at 800-615-0392 to schedule IMSI catcher detection / TSCM services.

Saturday, March 4, 2017

Donald Trump Questions ‘Sick Guy’ Barack Obama for ‘Wire Tapping’ His Campaign..

President Donald Trump accused former President Barack Obama of wiretapping his campaign headquarters during the election in a series of messages on Twitter.

*Note: Folks, This is not the first time nor will it be the last. Wiretapping, bugging and eavesdropping is rampant in the political, corporate and private sector. Worried you might be next? Contact ComSec, we can help. JDL~

“Terrible! Just found out that Obama had my ‘wires tapped’ in Trump Tower just before the victory,” he wrote on Twitter. “Nothing found. This is McCarthyism!”
Trump questioned whether it was legal for Obama to be wiretapping a presidential candidate while he was still in office.
“How low has President Obama gone to tapp (sic) my phones during the very sacred election process,” he wrote. “This is Nixon/Watergate. Bad (or sick) guy! Is it legal for a sitting President to be ‘wire tapping’ a race for president prior to an election? Turned down by court earlier. A NEW LOW!”
Trump is likely referring to calls from talk radio hosts Mark Levin and Rush Limbaugh to investigate the nature of the Obama administration’s investigations of his campaign aides for their communications with Russia, as Breitbart News editor Joel Pollak reported. 

Thursday, March 2, 2017

Are Today's Cameras Cybersecure?



Are Today's Cameras Cybersecure? 10 Tips to Avoid Camera Hacking

We’ve all heard about the dangers of hacking into computers and smart devices, as well as cyberthieves stealing credit and debit card information. But have you though specifically about the hacking of the built-in camera in each of those devices?

Here’s the thing: If your device is connected to the internet, then your device’s camera is at risk for being hacked. And it’s not just computers—it’s cameras such as baby monitors or security cameras.

Plenty of experts and insiders use a low-tech way of helping to block camera and microphone access: They simply cover the camera lens or mic port with tape. Beyond that simple, cheap method, though, there are a number of best practices that can help build better security around your camera. That includes super-strong passwords (no “1234” please) as well as up-to-date software, which may solve security lags.

-->

Want to learn more? This graphic can help with additional ideas. Or contact ComSec, we can help. JDL~

Read more here.