Wednesday, December 31, 2008

USB Hidden Flash Drive Watch


Since you are probably the clever type, we suspect you could easily find many places to hide a small USB flash drive. This watch features an ample 4GB capacity USB flash drive that slips neatly into the watch case. Simply remove, add data and then re-insert and you're ready to conduct secret missions to building B on the other side of campus.

This watch has a plastic case covered by stainless steel mask with brushed silver finish and convex mineral glass with shiny raised index. The USB flash drive fits flush with the watch case – ready to hold your data safe and secure. You may even forget it's there until you're ready to use it.

Note: Keep an eye out for these to start showing up around the office!

Monday, December 29, 2008

Industrial Espionage escalates


Sixty percent of office workers faced with redundancy or the sack admit they will take valuable data with them, if they could get away with it! 40% are downloading sensitive company secrets right now under their bosses nose in anticipation that they could lose their job.

That’s the findings of a survey by IT security experts Cyber-Ark from research they carried out into “The recession and its effects on work ethics” amongst 250 office workers in London’s busy Canary Wharf.

40% of workers who admit to already downloading competitive corporate data will use it as a negotiating tool to secure their next post as they know the information will be very useful to future employers.

Top of the list of desirable information that is currently being extracted from employers is the customer and contact databases, with plans and proposals, product information, and access / password codes all proving popular choices. HR records and legal documents were the least most favored data that employees were interested in taking.

Redundancy is a sore word and rumors that they were looming would send 47% of workers scurrying about prepared to do anything to try and obtain the redundancy list. Half said they’d try using their own IT access rights to snoop around the network and, if this failed, they’d consider bribing a ‘mate’ in the IT department to do it for them or bribe their friends in HR.


Sunday, December 28, 2008

Tangled U.S. Objectives Bring Down Spy Firm

Washington Post

After a federal jury in New York swiftly convicted a major Afghan heroin trafficker and Taliban supporter named Haji Bashir Noorzai, the government promptly issued the usual celebratory news release thanking the men and women of the DEA and FBI for their "countless sacrifices" in making the case.

Left out was any credit to the party most responsible for the government's victory: an unusual three-man private intelligence firm called Rosetta Research and Consulting.

At the instigation of the Drug Enforcement Administration, Rosetta agents lured Noorzai to America and delivered him right into the feds' hands. He spent 11 days in an Embassy Suites Hotel in Manhattan in 2005, enjoying room service and considering himself a guest of the U.S. government -- until he was arrested. He was imprisoned for three years awaiting his trial, which concluded in September. He faces up to life in prison when he is sentenced in January.

Noorzai's capture should have been Rosetta's finest hour. Instead, it led to the company's downfall. A close examination of the case reveals how a spy firm trafficking in sensitive intelligence for profit got sandwiched between conflicting government goals: Noorzai, one of the company's best sources, was considered an asset by the intelligence side of the government, even as the law enforcement side considered him a criminal.


Wednesday, December 24, 2008

Cyber attacks get worse


Cisco's Annual Security Report found that the overall number of disclosed vulnerabilities grew by 11.5 percent this year, compared to 2007. And if that wasn't bad enough, vulnerabilities in virtualization technology nearly tripled from 35 to 103 year over year. The annual report found that attacks are becoming increasingly blended, cross-vector and targeted.

Cisco said its researchers saw a 90 percent growth during 2008 in threats originating from legitimate domains, nearly double what was seen in 2007. The Cisco report also said spam accounted for nearly 200 billion messages each day, approximately 90 percent of worldwide email.
Despite some signs of progress, this is no time to let your guard down. The Cisco report said to keep on the lookout for the following:
  • Insider threats
  • Data loss
  • Mobility, remote working and new tools as risk factors

Tuesday, December 23, 2008

The Pulse Smartpen


The Pulse Smartpen is a computer within a pen that captures handwriting and simultaneously records audio and synchronizes it to the writing. Consumers tap on their notes to replay what was recorded from the exact moment they were writing. With pre-printed controls at the bottom of the dot paper notebooks, they can fast forward, rewind, jump ahead, pause or even speed up or slow down the audio recordings to easily access information. All of this information, including the audio, can then be uploaded into their computers to save, search for keywords or share with friends, colleagues and classmates.

The 1GB model provides storage for over 100 hours of recorded audio. The 2GB model doubles the storage capacity and provides more flexibility for downloading future applications.


Note: Be on the lookout when the Smartpen shows up at the next business meeting...

Saturday, December 20, 2008

Eavesdropping Husband accused of setting up $5m insider trading ring


A broker allegedly fuelled an insider trading ring by secretly spying on his own wife's work calls...

Matthew Devlin, an ex-Lehman broker now at Barclays Wealth, has been accused by the US SEC of orchestrating a trading ring by passing on confidential information gleaned from his wife, a senior exec at PR agency Brunswick. Devlin allegedly spent four years listening in to his wife’s work calls and checking out her schedule to work out when deals were about to happen, then leaked the information to various friends of his so they could buy and sell shares. In return for these illegal tip-offs, his grateful chums showered him with expensive gifts. Not exactly the kind of tale that will rehabilitate the reputation of Wall Street’s finest with the general populace…

She was universally referred to as ‘the golden goose’, even by her own husband.


Note: Eavesdropping precautions are available!....visit ComSec to learn more.

Thursday, December 18, 2008

Russia says it uncovered nearly 150 spies in 2008

Kyiv Post MOSCOW, Dec 18 (Reuters) - Russian counter-intelligence unmasked nearly 150 spies in 2008, including a network operating on behalf of ex-Soviet Georgia, the head of the FSB Federal Security Service was quoted as saying on Thursday.

"Activities of 48 staff officers of foreign intelligence services have been stopped, as well as actions of 101 local agents of foreign special services," Alexander Bortnikov told an annual meeting with the Russian press.

He said six foreign staff officers and three agents had been "caught red-handed", and nine foreigners accused of spying had been expelled.

The FSB, a target of public criticism in 1990s, has seen a resurgence under ex-President Vladimir Putin, an ex-KGB spy whose two terms as Kremlin chief ended this year.

Putin and top FSB officials have often said that the West, suspcicious of Russia's revived ambitions, has stepped up spying activities in the country. Western officials counter that Russia is itself conducting aggressive espionage abroad.

Does anyone else remember the Cold War?


iPhone Spy Software Hits the Market

Wall Street Journal

LITCHFIELD PARK, Ariz., Dec 17, 2008 /PRNewswire via COMTEX/ -- Retina-X Studios, LLC, announced today the immediate availability of Mobile Spy for the Apple iPhone. Using this groundbreaking iPhone technology, users can silently monitor incoming and outgoing text messages (SMS) and call information of children or employees -- even if activity logs are erased. Mobile Spy had already been available for Windows Mobile and Symbian OS smartphones. The new version for the iPhone is now on the market.
Mobile Spy runs in total stealth mode and no mentions of the program are shown inside the iPhone. After the software is set up on the phone, it silently records the entire text of all SMS text messages along with the associated phone number. The software also records inbound and outbound call information with duration of the call. Immediately after activities are logged, they are silently uploaded to the user's private online account. Accounts can be checked online from any web browser without needing further access to the phone.


Tuesday, December 16, 2008

FBI taps cell phone mic as eavesdropping tool

The FBI appears to have begun using a novel form of electronic surveillance in criminal investigations: remotely activating a mobile phone's microphone and using it to eavesdrop on nearby conversations.

The technique is called a "roving bug," and was approved by top U.S. Department of Justice officials for use against members of a New York organized crime family who were wary of conventional surveillance techniques such as tailing a suspect or wiretapping him.

Nextel cell phones owned by two alleged mobsters, John Ardito and his attorney Peter Peluso, were used by the FBI to listen in on nearby conversations. The FBI views Ardito as one of the most powerful men in the Genovese family, a major part of the national Mafia.

The surveillance technique came to light in an opinion published this week by U.S. District Judge Lewis Kaplan. He ruled that the "roving bug" was legal because federal wiretapping law is broad enough to permit eavesdropping even of conversations that take place near a suspect's cell phone.

Kaplan's opinion said that the eavesdropping technique "functioned whether the phone was powered on or off." Some handsets can't be fully powered down without removing the battery; for instance, some Nokia models will wake up when turned off if an alarm is set.

The U.S. Commerce Department's security office warns that "a cellular telephone can be turned into a microphone and transmitter for the purpose of listening to conversations in the vicinity of the phone." An article in the Financial Times last year said mobile providers can "remotely install a piece of software on to any handset, without the owner's knowledge, which will activate the microphone even when its owner is not making a call.


p.s., "If a phone has in fact been modified to act as a bug, the only way to counteract that is to either have a bugsweeper follow you around 24-7, which is not practical, or to peel the battery off the phone," Atkinson said. Security-conscious corporate executives routinely remove the batteries from their cell phones, he added.

New range of Nokia spy phones

Cool Gadgets

Just be a bit wary if your worst nemesis (or a friend) hands you a shiny new Nokia - it might mean whatever conversations you hold can be eavesdropped upon simply by dialing a secret code.

The selected phones are able to do the following without the user being any wiser ;-

  • Alert you when the phone is switched on, via SMS, so that you can see the number in the phone no matter how often it is changed.
  • Alert you when ever a phone call is made or received by the phone, via SMS, and will also show the number of other party.
  • Send you a copy of any text message sent or received by the phone, via SMS as well as the other persons number.
  • If you dial the phone from a pre-defined number it will open the microphone, without the holder knowing, so that you can hear room conversations, from anywhere in the world.
  • If you dial the phone from a pre-defined number when it is being used for a phone call you will actually intercept both sides of that conversation and be able to hear the everything that is being said.
  • You can remotely change the pre-defined number as much as you like, by a discreet SMS.
  • You can turn each function on and off as much as you like, by a discreet SMS.
  • There is no log of your calls or the copy SMS’s to your phone on the spy phone.
Note: Of course I'm sure Anthony Pellicano wouldn't mind sharing his Jail cell with you!

Be careful out there...

Monday, December 15, 2008

AT&T, T-Mobile can’t claim hack proof phones


Permanent injunctions filed and agreed on

Both AT&T Inc. and T-Mobile cellphone providers have agreed to permanent injunctions against their earlier advertising claims that their voice mail systems were safe from sabotage. Both cell phone providers falsely advertised the security of their systems, according to the Los Angeles District Attorney’s Office.

During an investigation, “cell phones purchased by undercover investigators were easily hacked into, enabling the voice mail to be changed at will. Hacking into voice mail allowed messages to be changed or erased. Important information could be removed from the voice mail and phony information could be inserted,” said the District Attorney. “Imagine the havoc that could result.”


HD Spycam Truly Crushes Employee Morale


The PR company's email begins thus: "You've never seen a camera like this." And it's true. The Digital Window from Scallop Imaging is a rather neat mix of hack and paranoia, a device cobbled together from five cellphone camera lenses, an Ethernet powered box and software which stitches the whole lot together for a seven mega pixel, 15 frames per second, 180º view.

That, for the number-hungry, is a whopping 100 mega pixels per second over 10/100 Ethernet, enough to fill a terabyte hard drive in, well, pretty fast.

To further increase employee paranoia, you'll never know when the camera is looking at you. Because of the 180º view and high-definition, a digital zoom combined with digital pan mean the the cameras never move when looking around.


Saturday, December 13, 2008

The FBI's History of Wiretapping

Washington Post
One of the more baffling questions to come out of the corruption case involving Illinois Gov. Rod Blagojevich is why the two-term governor openly talked about "pay-to-play" schemes in the first place. Shouldn't he have known better? Wiretapping phones is a time-honored FBI tradition.

Wiretap court orders spiked during the Reagan and Clinton administrations and government officials, cabinet members and politicians from both parties, along with the occasional gangster or two, have been caught in the process. Wiretaps in criminal cases, so-called Title III wiretaps, jumped 20 percent in 2007 from the year before, with 457 federal and 1751 state taps being approved.

The FBI broke into civil rights leader Martin Luther King Jr.'s home and office and installed room bugs in an attempt to find evidence King was associating with communists. They didn't uncover anything but did overhear a "sexual encounter" involving King at a party at the Willard Hotel in Washington and another incident in which King told an "off-color joke" about the recently-assassinated President John F. Kennedy.

A video of Rep. John Murtha (D-Pa.) caught on tape by an undercover FBI agent during the Abscam corruption sting.

More here...

Thursday, December 11, 2008

Ineffective Law Enforcement, Bad Economy Fueling Cybercrime

PC World

Cybercriminals operating worldwide are benefitting from ineffective law enforcement and a growing economic recession that could make jittery people more susceptible to cybercrime scams.

So concludes security firm McAfee in its new report, "Virtual Criminology Report--Cybercrime vs. Cyberlaw." published Tuesday. The report pulls together the opinions of about two dozen legal experts, academic researchers and security-response professionals working as far afield as Britain, continental Europe, the Baltic countries, Brazil, India, Japan, Australia, New Zealand and North America.

"There have been a few cases where cybercriminals have been promptly arrested, but they're usually responsible for the small attacks," says Paulo Lima, a Brazilian lawyer specializing in computer-related crime. "Those responsible for the large operations have never been arrested. The public sector has usually acted in a mitigating manner, attacking the symptom and not the illness -- there is an antiquated system and a completely unprepared law enforcement body."


Note: What is the integrity of your company's security posture against corporate, economic and industrial electronic espionage threats?

What is the potential effect on your business if sensitive information (or trade secrets) is intercepted by an eavesdropper? Contact ComSec

Tuesday, December 9, 2008

Illinois Governor "Bugged" Arrested by Fed's

CHICAGO — Gov. Rod R. Blagojevich of Illinois was arrested by federal authorities on Tuesday morning on corruption charges, including an allegation that he conspired to effectively sell President-elect Barack Obama’s seat in the United States Senate to the highest bidder.
A 76-page affidavit from the United States Attorney’s office in the Northern District of Illinois says Mr. Blagojevich (pronounced bluh-GOY-uh-vich) was heard on wiretaps over the last month planning to “sell or trade Illinois’ United States Senate seat vacated by President-elect Barack Obama for financial and personal benefits for himself and his wife.”

The authorities recorded Mr. Blagojevich speaking with advisers, fundraisers, a spokesman and a deputy governor, using listening devices placed in his office, home telephone, and a conference room at the offices of a friend, prosecutors said.


Sunday, December 7, 2008

Super Secret Spy Lens

As you probably already know, it's incredibly hard to get candid shots of those around you when they know the camera is being pointed in their direction — and people seem to have an innate ability to sense this. The Super Secret Spy Lens solves this problem by using a precision mirror and a cut-out in the side to let you point away from your subject, bringing down their defenses and improving the odds you'll get a terrific photograph. For great, candid holiday photos, it's the perfect addition to your camera bag. Also great for weekend espionage work.

More here...

Criminals Auto-dialing With Hacked VoIP Systems

Criminals are taking advantage of a bug in the Asterisk Internet telephony system that lets them pump out thousands of scam phone calls in an hour, the U.S. Federal Bureau of Investigation warned Friday.

The FBI didn't say which versions of Asterisk were vulnerable to the bug, but it advised users to upgrade to the latest version of the software. Asterisk is an open-source product that lets users turn a Linux computer into a VoIP (Voice over Internet Protocol) telephone exchange.

In so-called vishing attacks, scammers usually use a VoIP system to set up a phony call center and then use phishing e-mails to trick victims into calling the center. Once there, they are prompted to give private information. But in the scam described by the FBI, they apparently are taking over legitimate Asterisk systems in order to directly dial victims.

More here...

Friday, December 5, 2008

Camera Found in Church Restroom

BARTLETT, TN - A Bartlett church is now at the center of a police investigation. Bartlett Police say a man planted a camera in the woman's restroom. They say it happened at "That Church," located at 6001 Bartlett Center Drive.

"That Church" in Bartlett has about 50 members. The small congregation is somewhat relieved, but disappointed after learning about what happened in the woman's restroom.

"He would wait until all of the families left. He knew no one was in that building except for them and us. His whole goal was to get video of her, because he was in love with her and she didn't want anything to do with him," says Youth Pastor Corey Force. Force says a church member hid a camera in two of the woman's restrooms to videotape a woman he had a crush on. "His goal was one girl and one girl alone," said Force.

More here...

Wireless-Blocking “Paint"

EM-SEC Coating Creates an “Electromagnetic Fortress” that Safeguards Businesses and Government Facilities from Wireless Attacks

Hampton, VA – March 14, 2007 – EM-SEC Technologies, LLC announced today that the tests performed around the perimeter of their “painted” SCIF (Sensitive Compartmented Information Facility) yielded successful results for the protection of wireless devices and other electronic equipment within the structure. The tests confirmed that wireless transmission of information can be protected from unauthorized access by the use of their EM-SEC Coating System.

“The use of EM-SEC Coating as an electromagnetic barrier for the containment of wireless networks has opened a new realm of possibilities for our company and for the future of wireless communications”

More here...

Wednesday, December 3, 2008

LaCie CurrenKey USB Flash Drive

With the new LaCie CurrenKey you can easily transfer and transport your important data. The USB connector can be revealed by a simple twist. With the universal Hi-Speed USB 2.0 interface, the cross-platform LaCie CurrenKey can be used with all PC or Mac computers. Hi-Speed USB 2.0 not only offers universal compatibility and cross-platform convenience, but features hot-pluggable connection and high-speed transfer rates. Built-in memory of up to 8GB in a tiny USB flash key. Available with a bronze (4GB) or silver (8GB) finish. Shock-proof and durable die-cast casing.


Tuesday, December 2, 2008

Ycam-Knight Online "Baby" Monitor

The Y - cam Knight connects to your wireless router using the same technology as your laptop or desktop PC. Meaning that when you set the camera up looking at your "little one" you can see (and hear) your child from anywhere in the house!

The Y - cam Knight comes with all these great features:

  • Infrared Night Vision
  • Quick and simple setup
  • High quality video with sound - 30fps and 640x480 pixel Resolution
  • Motion detection alerts via email
  • Monitor and record live video and audio from anywhere
  • MPEG-4 compression for reduced bandwidth and storage
  • Mobile Viewing can be viewed from many devices including laptops and iPhone.
  • Multi-client access and password protection
  • Secured wireless connectivity
  • Compact design
Can anyone think of anything else this nifty little device might be used for ?


Saturday, November 29, 2008

X-ray Vision Camera Lens

Xray vision is now a reality! This specially-designed X-ray filter turns an ordinary video camera into a super-stealthy X-ray vision camera. It sees right through clothes, dark windows and sunglasses as if they weren't even there!

This technology has been adapted and marketed to make real xray cameras, x-ray vision, and x-ray infrared pass filters. Unlike the Xray glasses you probably saw advertised in the back of comic books when you were a kid, this technology really does see through many types of clothing. The filter is ideal for law enforcement officers, and security and surveillance personnel.

The theory behind how it works is really simple. Many types of clothing allow light and infrared light to pass through the fabric. This light is reflected back through the clothing, off the skin, to our naked eyes. What we normally see is both the reflected normal light mixed with the Infrared light. The lens filters the normal light out, leaving only the Infrared light and some other ambient light waves. The result...the clothing (and many other materials) become as clear as glass.

YIKES! better get out the Reynolds Wrap and wrap up!


Wednesday, November 26, 2008

Nowell Releases Counter-Espionage Security Software To Defeat Insider Espionage and Identity Theft

Shalom is a security solution that prevents Insider Threats, Internal Fraud and Data Leakage by identifying suspicious and potentially risky behavior inside the business computing environment. It works by detecting and authenticating suspicious insiders exhibiting anomalous behavior via artificial intelligence.

Suspicious behavior is the key indicator of insider threats, internal fraud, and data leakage. Shalom identifies suspicious behavior and quickly reports, then questions the suspicious user for authentication.

If the suspect fails the authentication, this indicates an impostor, so Shalom denies network access to the intruder immediately. On the other hand, if the user passes, Shalom grants them access, but still reports the suspicious activity.

Shalom also generates detailed reports for information security administrators to review later. Reports can be used to resolve security incidents and audit information systems. With Shalom, suspicious internals are identified and intruders denied access. Via Shalom, insider threats, internal fraud and identity theft is better prevented.


Thursday, November 20, 2008

Encrypted Business Hard Drives

Lenovo has introduced their ThinkPad USB Portable Secure Hard Drive nicknamed "The Vault", to give us a new and secure way to protect data. Allowing users to to type in their passcode to access their data, this secure hard drive uses 128-bit advanced encryption. The Vault USB Portable Secure Hard Drive features full-disk encryption for up to ten unique user IDs and one administrator. Lenovo will offer the ThinkPad USB Portable Secure Hard Drives in 160GB and 320GB capacity starting in mid-November for $179 and $219 respectively. Less than an inch thick and smaller than a 3 x 5 index card.

"Guard Your Secrets Because They Are Eagerly Sought".

Wednesday, November 19, 2008

Mind Molester - Electronic Harassment Device

The "Mind Molester" is an instrument of creative electronic harassment. The manufacturer Shomer-Tec, touts it as "an electronic audio device that can drive your victims nuts trying to figure out what it is and where it's at". You can drive somebody crazy in their own house or disrupt an entire office. It produces a very short but powerful 90dB 4.5 KHz sound burst. It features completely random intervals between activations; they'll vary from 4 to 25 minutes, making them non-predictable and even more maddening! Due to the duration, frequency, and sound characteristics, it's a very difficult, time-consuming, and frustrating task to locate the unit. And even if found, they'll have no idea what it is.

Definitely a nasty little device to be on the lookout for!

Monday, November 17, 2008

C-Watch. Bluetooth enabled cell phone watch

Dual Sim Card Support. Carry two cellular phone numbers on your watch. Blue tooth Enabled for headsets, remotes, and data transfer.1.3 MP Digital Camera,Handwriting Functionality, MP3 Player Video Recorder Audio / Video Player Organizer, File Manager Shortcut Keys and Quick Links,Integrated stylus,Added Accessories,Data connect via USB, Micro SD, or Blue tooth. 250Kb Base storage on watch, Micro SD Card Slot, 1GB Micro SD Card Included.

Dick Tracy would be impressed! More here...

TrackingTheWorld Designs G.P.S Letter Logger

When housed in a standard number 10 business envelope, the G.P.S. Letter Logger flows through mail sorting and delivery systems as unnoticed as any typical piece of mail, all the while gathering and reporting important logistical information that allows the Postal Service to analyze the efficiency of its systems. “If the G.P.S. Letter Logger records extended down time in a particular location, that lets the inspector know that there is a potential problem.

The driving forces behind G.P.S. Letter Logger are the combined functions of a powerful and highly efficient microprocessor developed by Texas Instruments and a low-power consumption uBlox ANTARIS 4 GPS module. “The minimal power requirements of both of these components were key to the successful implementation of the G.P.S. Letter Logger.

Merely a quarter of an inch thick, and with the surface area of a tri-folded sheet of paper, the G.P.S. Letter Logger technologically exceeds the capabilities of a similar Siemens product in that the user can adjust the G.P.S. Letter Logger’s GPS reporting frequencies. “G.P.S. Letter Logger’s reporting is fully customizable. Users can choose to receive reports every 2, 5 or 10 minutes or select tilt mode which reports only when a tilting movement is detected.

G.P.S. Letter Logger will operate up to 20 hours in a pre-determined timed configuration or up to two weeks in tilt mode using a slim 1100mAh battery.


Friday, November 14, 2008

Private eyes committed for trial

A trio accused of defrauding a Sunshine Coast woman out of money to conduct a bug sweep of her house have been committed for trial at a later date in the Maroochydore Magistrates court.

It is alleged that the two female private investigators and a son of one of them used the fact that the 55-year-old woman believed her house was bugged to convince her to pay $85 per hour for the bug sweep by producing a fake listening device to confirm her suspicions.

Noosa Heads’ Kathleen Joan Kitchner, 53, and Lake Cooroibah’s Corinne Martell, 46, ran a private investigation business called Private Eyes 007. They have been charged with entering a home to commit an offence, and fraud by dishonestly obtaining a sum of money

Ms Martell was also charged with attempted fraud. Her son, Shane Martell of Ringtail Creek, was charged with entering the dwelling and fraud.

Police allege the 24-year-old climbed into the roof of the Highview Avenue home to produce the fake listening device.


Saturday, November 8, 2008

Combating Corporate and Industrial Espionage

Corporate espionage or industrial espionage is the act of illegal intelligence collection from a corporation, small business entity, executives, etc. Illegal intelligence collection methods can range from computer hacking, theft, intimidation, personnel impersonations, and last but not least...Electronic Eavesdropping or "bugging".

What intelligence are they collecting?
  • Intellectual property Intel
  • Patents Pending Intel
  • Pricing structures Intel
  • Customer Intel
  • Research and development Intel
  • Market Intel, etc.

How much spying actually happens in the real world?

What is interesting to note is that Corporate, Economic & Industrial Espionage is a multi billion dollar underground industry involving manufacture, sales, installation and monitoring with illegal electronic surveillance devices. This is according to current government estimates and is actually the tip of the iceberg. Click here to review the 2002 Report to Congress on Economic & Industrial Espionage 2002 was the last year that the U.S.Government even attempted to put a number on the combined costs of foreign and domestic economic espionage, including the theft of intellectual property.

"Calculating US losses from the technology outflow is difficult. Private estimates put the combined costs of foreign and domestic economic espionage, including the theft of intellectual property, as high as $300 billion per year and rising" (page vii key findings, 2002 Report to Congress on Economic & Industrial Espionage).

"There is every indication that efforts to acquire US economic and industrial secrets will only intensify and become more sophisticated over the next few years. US research and development programs ensure that state-of-the-art technology will continue to originate in the United States, and the openness of US society will make that technology a ready target to foreign countries
and companies".

If you don't have a Technical Surveillance Countermeasures (TSCM) program in place, contact ComSec LLc in Virginia Beach, Virginia today at Ph: 757-615-7053 or Secure Ph/Fax: 866-535-0031, or visit us on the web @ . Click on the Secure Contact Link for a quote on TSCM-Bug Sweep services for your executive office or facility using a telephone or computer away from your area of concern.

*Please "DO NOT" contact us from any suspect room, phone or computer*

Stay Tuned...