Monday, September 28, 2015

“Sick, twisted individual:” Landt to spend 12 years in prison for setting up hidden cameras

If you suspect an employee, other insider or an outsider has your business under electronic surveillance, contact ComSec LLC. Our TSCM experts detect eavesdropping devices that can be used to erode your privacy, damage your reputation and steal valuable corporate secrets. Contact us today to discuss your concerns and schedule service, or call us at 1-800-615-0392.

KENOSHA COUNTY -- An Illinois man will spend twelve years in a Wisconsin prison for conspiring to set up hidden cameras in women's locker rooms at Uline and the RecPlex in Pleasant Prairie. Karl Landt was sentenced on Friday, September 18th.

There was anger and there were tears as one victim after another talked of the impact Karl Landt's four-year, hidden camera project has had on them. And not once did he look them in the eye.

"This is once in a lifetime, historic case," said Michael Gravely, prosecutor.

Landt spent four years compiling more than 20,000 hours of pornographic videos to satisfy his sexual fetishes. Many of those videos were recorded by his girlfriend, at his direction, inside women's locker rooms.

"What kind of sick, twisted individual do you have to be to do this to your coworkers?" said one of Landt's victims. Read more:

Image courtesy of Sira Anamwong at

Friday, September 25, 2015

China Is Stealing American Property

Image courtesy of KEKO64 at
If you suspect your company is the target of corporate espionage, contact ComSec LLC. We offer counterespionage services in the US and globally. Learn more here:

On Friday, communist China’s president Xi Jinping will make a state visit to Washington. Presidential candidates, government agencies and special interest groups are clamoring to have their pet issues added to the discussion agenda. Which ones should President Obama choose?

The 2013 report of the prestigious bipartisan Commission on the Theft of American Intellectual Property certainly indicates that Chinese cyber-theft should top the list. It states, “The scale of international theft of American intellectual property (IP) is unprecedented — hundreds of billions of dollars per year, on the order of the size of U.S. exports to Asia,” and concludes, “China is the world’s largest source of IP theft.” The FBI agrees.

At FBI headquarters in July, the head of FBI counterintelligence, Randall Coleman, said there has been a 53 percent increase in the theft of American trade secrets, thefts that have cost hundreds of billions of dollars in the past year. In an FBI survey of 165 private companies, half of them said they were victims of economic espionage or theft of trade secrets — 95 percent of those cases involved individuals associated with the Chinese government.

Read more:

Wednesday, September 23, 2015

Loco-motive for rail worker accused of corporate espionage

Two major Canadian rail companies are set to battle out an espionage claim in court after a worker defected from one organization to the other – allegedly taking confidential and incredibly valuable information with him.

Canadian National Railway Co. claims former employee Greg Shnerer downloaded pricing information, customer contracts and the corporate business plan – only to quit days later, absconding to industry rival Canadian Pacific Railway Ltd.

Read more:

Image courtesy of adamr at

If you are concerned your company is the target of corporate espionage, call ComSec LLC at 1-800-615-0392. ComSec provides electronic eavesdropping detection services in the US and globally for corporation and executive residences. Visit our web site to learn more:

Monday, September 21, 2015

39 iOS Apps Infected, Including WeChat, Affecting Hundreds of Millions of Users

Malware XcodeGhost Infects 39 iOS Apps, Including WeChat, Affecting Hundreds of Millions of Users

Yesterday we posted an analysis report on a novel malware XcodeGhost that modifies Xcode IDE to infect Apple iOS apps. In the report, we mentioned that at least two popular iOS apps were infected. We now believe many more popular iOS apps have been infected, including WeChat, one of the most popular IM applications in the world.

After we posted the report, some security companies like Qihoo 360 scanned popular apps in App Store by code analysis; and some iOS developers analyzed some more apps using crowd-sourcing techniques. Several Internet companies such as Tencent, NetEase, and Jianshu, have made statements on their respective affected products. Read more:

If you are concerned your smartphone or mobile device is infected with viruses, spyware, Trojans, malware and other malicious payloads, contact ComSec for Cellular Forensics Services:

Image courtesy of  KROMKRATHOG at

Tuesday, September 15, 2015

Cisco router break-ins bypass cyber defenses

Image courtesy of watcharakun at
Security researchers say they have uncovered clandestine attacks across three continents on the routers that direct traffic around the Internet, potentially allowing suspected cyberspies to harvest vast amounts of data while going undetected.

In the attacks, a highly sophisticated form of malicious software, dubbed SYNful Knock, has been implanted in routers made by Cisco (CSCO.O), the world's top supplier, U.S. security research firm FireEye (FEYE.O) said on Tuesday.

Routers are attractive to hackers because they operate outside the perimeter of firewalls, anti-virus, behavioral detection software and other security tools that organizations use to safeguard data traffic. Until now, they were considered vulnerable to sustained denial-of-service attacks using barrages of millions of packets of data, but not outright takeover.

Read more:

Concerned your router may be compromised? ComSec's cyber TSCM service includes an inspection of your Wi-Fi and wireless Internet of Things. We can detect issues with your WiFi security that your cybersecurity program cannot detect. Learn more about our cyber TSCM services, or call us at 1-800-615-0392.

Monday, September 14, 2015

Police: Fired officer used drone to spy on neighbors

 Image courtesy of 

A Valdosta, GA police officer was out of a job as of Monday evening after being arrested for reportedly using a drone to eavesdrop on a neighbor.

Officer Howard Kirkland, 53, of Ray City, was fired Monday morning, Valdosta Police Chief Brian Childress confirmed.

He had been on suspension since September 4th. He was arrested at the police department by Lanier County Sheriff's Deputies on September 10th. The sheriff's office had been conducting an investigation for about a week.

Valdosta Police Chief Brian Childress said he waited to release information about the arrest because he didn't want to compromise the investigation.

Read more:

Wednesday, September 9, 2015

ESPN just nuked the Patriots and NFL for Spygate

The latest bombshell from Bristol links the NFL's tough stance on DeflateGate to its fumbling of the Spygate investigation.

It may be hard to believe, but Roger Goodell's seemingly tenuous position as commissioner of the NFL is more secure following his handling of the DeflateGate scandal, according to a bombshell of a story co-written by ESPN's Don Van Natta, Jr. and Seth Wickersham under the Outside the Lines banner. The reason goes all the way back to Spygate, the 2007 New England Patriots videotaping scandal.

Owners and others were disappointed that the NFL did not issue stronger discipline to the Patriots in the wake of the investigation over video taping opposing teams' hand signals. The ESPN report, in talking with owners, executives and others around the league, found that many inside the NFL view Goodell's tough stance on DeflateGate as a "makeup call" for how the league handled the Spygate.

Read more: 

If you are concerned about hidden cameras being used to collect your valuable information, contact ComSec LLC. We detect hidden cameras, other optical devices, audio devices, and other eavesdropping devices that compromise your privacy. Our bug sweeps are thorough and effective at detecting eavesdropping threats. 

Image courtesy of arkorn at

Tuesday, September 8, 2015

Beijing expected to escape US hacking sanctions

Image courtesy of cssanndesign at
Looming sanctions aimed at Chinese interests suspected of stealing and profiting from U.S. trade secrets are unlikely to directly target Beijing, as the White House is expected to go after companies instead of foreign governments.

A series of leaked comments from unnamed White House sources over the past few days has revealed that sanctions against hackers are now in the works. But experts say they won't apply to cyberattacks like the recent hack of the federal Office of Professional Management, which compromised the personal information of millions of workers and is widely considered to be the work of state-backed hackers.

Read more:

If you suspect your company is the victim of corporate espionage by a nation state, foreign company or foreign national, contact ComSec LLC. Our corporate espionage experts are the best in the business. We perform professional bug sweeps, as well as cyber TSCM to detect cyber threats not addressed by your cybersecurity program. Contact us today!

Thursday, September 3, 2015

Researcher gives baby monitors an 'F' in cybersecurity

Image courtesy of David Castillo Dominici at
A new report by a Rapid7 security consultant claims a slew of baby monitors can be hacked – which could offer potential attackers a way to snoop on people’s homes.
A new report claims a wide array of Internet-connected baby monitors do not have basic cybersecurity protections that would prevent outside hackers from accessing video feeds into unsuspecting people’s homes.

The report released Wednesday by Mark Stanislav, a senior security consultant at the information security firm Rapid7 tested baby cameras from eight different manufacturers and gives all but one failing grades. The other monitor’s letter grade wasn’t much better – a “D.”

Read more:

If you are concerned that your home privacy has been compromised by an eavesdropping device, contact ComSec LLC. We detect hidden cameras, bugs, wire taps, and other surreptitious electronic eavesdropping devices. Get more information here: