Tuesday, March 31, 2015

Mobile Phone Battery Life Will One Day Be 10 YEARS

Mobile phone battery life will one day be 10 YEARS thanks to super-efficient chip

Technological advances can be a good thing. BUT, if this 10-year battery powered a cell phone bug that was placed discreetly in your office or conference room . . . how easy would it be for a spy to collect against your organization for a long, long time? The extended battery life would reduce or eliminate the risk of exposing the spy when they returned to your office or conference room to replace or recharge the battery.  Ten years is a long time to be able to collect against you!

  • Atmel has released its ultra-low power ARM-based microcontroller. 
  • Uses third of the power than rivals and can harvest energy from your body
  • San Jose-based firm said it will extend battery life in gadget to 'decades'
  • Reducing the number of times batteries need to be changed in wearables, fire alarms, smart homes and more." 
Read more: http://www.dailymail.co.uk/sciencetech/article-3019260/Mobile-phone-battery-life-one-day-10-YEARS-thanks-super-efficient-chip-harvests-energy-body.html 

Thursday, March 26, 2015

Is your computer bugging you?

Data leaks due to security flaws and hacker activity constantly make the news, but they're not the only ones that businesses have to worry about. Leaks can stem from employee or industrial espionage activity too and of course there's always government snooping.
Whilst larger businesses with sensitive data or intellectual property to protect often check for old-style surveillance they may not be as aware of the potential for PCs and other gadgets to gather intelligence as well as leak data. We spoke to Andre Ross, Director of Australian digital forensics and information security company Elvidence to find out how businesses may be at risk and what they can do to combat it.  Read more: http://goo.gl/2Y7VRs
Need a TSCM / Cyber TSCM survey of your business or residence? Contact COMSEC LLC today: http://comsecllc.com/

Tuesday, March 24, 2015


New Zealand launched a covert surveillance operation targeting candidates vying to be director general of the World Trade Organization, a top-secret document reveals.

In the period leading up to the May 2013 appointment, the country’s electronic eavesdropping agency programmed an Internet spying system to intercept emails about a list of high-profile candidates from Brazil, Costa Rica, Ghana, Indonesia, Jordan, Kenya, Mexico and South Korea. 

Friday, March 20, 2015

Suspects in Turkey’s Espionage Probe Face Life Sentences:

The Gölbaşı Public Prosecutor’s Office in Ankara has completed its investigation into suspects detained in an operation launched on claims that they wiretapped and spied on figures including then-Prime Minister Recep Tayyip Erdoğan, demanding life sentences for 28 people.

Police conducted a broad operation in January into the so-called “parallel structure” of sympathizers of U.S.-based Islamic scholar Fethullah Gülen in the judiciary and security forces, detaining scores of officials from the Telecommunications Directorate (TİB) and the Scientific and Technological Research Council of Turkey (TÜBİTAK).

The prosecutor’s office has charged the 28 suspects with “founding an organization to commit crime,” “violating the confidentiality of communication,” “disrupting the state’s unity and country’s integrity” and “spying in terms of politics and the military.”

Read more: http://goo.gl/yHQDka

Monday, March 16, 2015

The new MacBook's single port comes with a major security risk:

The new MacBook's single port comes with a major security risk: 

After years of development, USB Type-C is making a very big debut. Last week, Apple announced its new MacBook would come with just a single Type-C plug for both power and data, a move that allowed for the slimmest MacBook ever. A few days later, Google unveiled the new version of its flagship Chromebook Pixel with the same Type-C port. To the extent that hardware components can have a moment, USB Type-C is having one.
But, while the new port is powerful, it also comes with serious security problems. Read more: http://goo.gl/0VZ4D5

Wednesday, March 11, 2015

CIA Aided Domestic Phone Spying

"A Justice Department program used to gather data from U.S. cellphones apparently has a secret partner: the Central Intelligence Agency (CIA). 
The CIA played a role in helping the U.S. Marshals Service develop technology that imitates cellphone towers, The Wall Street Journal reported on Tuesday. The system, used on airplanes, allows federal agents to scoop up identifying and location information for thousands of cellphones in every sweep.
The spy agency’s role in the so-called “dirtbox” program was previously unknown, and is considered unusual, given that the CIA is banned from most domestic spying operations."

Read more here: http://goo.gl/UEFPzv

Friday, March 6, 2015

Watch out! 7 household items that may be spying on you.

"To date, there haven't been any major privacy or security incursions on smart home appliances. But privacy experts warn that with so many microphones and cameras coming into people's homes, it's an area that warrants some caution.
Many people, though, don't realize how many potential monitoring devices are in their houses already. Here's a look at common—or soon to be common—household items that could potentially give outsiders more insight into your day-to-day life than you realize. Each has safeguards in place to protect your privacy, but it never hurts to know what's watching—and listening. 
—By Chris Morris, special to CNBC.com"
Read more here.

Monday, March 2, 2015

Stingray Spying Devices Disrupt Cell Service, Feds Admit

A recent court filing appears to confirm what civil liberties groups have long feared: that a powerful telephone surveillance device used by federal and local law enforcement to target a particular phone affects others too.

The technology is known as Stingray, and it’s used to gather data on a specific mobile device. The feds haven’t said much about, arguing that they don’t want suspects to know how the system works, but groups such as the American Civil Liberties Union (ACLU) have said it’s too invasive because “innocent” phones get swept up in the operation.

Stingray, the ACLU and others argue, disrupts cell service for any phone in the vicinity and for devices that use the same cell network. And not only has the Justice Department not said much about it, they have so far refused to answer any questions or even confirm what the ACLU asserts.

Read more here: http://sputniknews.com/us/20150302/1018969722.html#ixzz3TGZhCZVW