Tuesday, 31 March 2009

US Man Charged With Theft Of Trade Secrets

If you want to know how to protect your company against industrial espionage contact us.

LEE, who is a naturalized U.S. Citizen of Chinese descent, abruptly resigned his employment with Valspar on March 16th of this year, just two weeks after returning from a business trip to the People’s Republic of China.  At the time of his resignation, LEE relinquished both his company issued laptop computer and AT&T Blackberry wireless device.

A subsequent examination of the laptop computer by Valspar network analysts discovered that all of the temporary files had been deleted, suggesting that LEE had taken steps to “clean” the computer’s history. Additional examination of the laptop discovered a hidden file, which contained unauthorized software programs, including a data copying program.  It was also discovered that approximately 44 gigabytes of data, including Valspar trade secret information, had been downloaded to LEE’s computer without authorization. more...

Pigeons fly mobile phones to Brazilian prisoners

For those of you that don't know elicit mobile phones are a big problem in prisons worldwide. Gotta love the innovation here.

Brazilian inmates have turned to carrier pigeons in their quest for communication with the outside world.

Guards have intercepted two carrier pigeons carrying mobile phones to detainees at a prison in Sorocaba, 62 miles from Sao Paolo, a spokesman for the state penitentiary system said. more...

Big Brother is watching: surveillance box to track drivers is backed

This kind of thing was always on the cards.  Also a little concerning if this follows the speed-camera model of guilty unless you can prove your innocence. Still for every signal there is a jammer so the innocent will have their privacy invaded and the guilty will bypass the system.

The government is backing a project to install a "communication box" in new cars to track the whereabouts of drivers anywhere in Europe, the Guardian can reveal.

Under the proposals, vehicles will emit a constant "heartbeat" revealing their location, speed and direction of travel. The EU officials behind the plan believe it will significantly reduce road accidents, congestion and carbon emissions. A consortium of manufacturers has indicated that the router device could be installed in all new cars as early as 2013. more...

19,000 UK credit card details posted on the Net...and accessible on Google

What is really frustrating here is that Google failed to remove the data even after the breach had become public.

A good idea for online shopping: Use only one credit card for all your online transactions, don't use it for anything else and keep a modest spending limit. It is then easy to check your statement and fraud should be very obvious.

The credit card details of up to 19,000 British shoppers were published on the internet - where they could be found using a simple search on Google.

The details apparently originated from the website of a criminal gang in the Far East.

he list, obtained by the Mail, includes the names, home addresses and full card details of thousands of Visa, Mastercard and American Express customers. more...

Sunday, 29 March 2009

Spy chiefs fear Chinese cyber attack

Anyone see a pattern emerging here?

INTELLIGENCE chiefs have warned that China may have gained the capability to shut down Britain by crippling its telecoms and utilities.

They have told ministers of their fears that equipment installed by Huawei, the Chinese telecoms giant, in BT’s new communications network could be used to halt critical services such as power, food and water supplies. more...

Vast Spy System Loots Computers in 103 Countries

TORONTO — A vast electronic spying operation has infiltrated computers and has stolen documents from hundreds of government and private offices around the world, including those of the Dalai Lama, Canadian researchers have concluded.

In a report to be issued this weekend, the researchers said that the system was being controlled from computers based almost exclusively in China, but that they could not say conclusively that the Chinese government was involved. more...

The House of Commons IT systems has reportedly been infected by the infamous Conficker superworm

Several problems here:
One - Why is there not sufficient procedures, policy and systems in place to prevent this kind of virus?
Two  - Why is there not sufficient procedures, policy and systems in place to prevent this kind of report being leaked?
Three - Why are you allowed to connect an MP3 player to the House of Commons IT system? 

The House of Commons IT systems has reportedly been infected by the infamous Conficker superworm, which has previously infected millions of Windows PCs and affected the operation of hospitals, military and large corporate systems.

Political blog Dizzy Thinks first reported that a memo (below) sent out to parliamentary IT network users on Tuesday night warned that Conficker had disrupted the operation of parliamentary systems.

The infection has reportedly prompted a clean-up operation as well as a temporary ban on the use of mass storage devices, including MP3 players, on parliamentary systems. more...


UK Police Identify 200 Children As Potential Terrorists

Parents - please love your children.....

Two hundred schoolchildren in Britain, some as young as 13, have been identified as potential terrorists by a police scheme that aims to spot youngsters who are “vulnerable” to Islamic radicalisation.

The number was revealed to The Independent by Sir Norman Bettison, the chief constable of West Yorkshire Police and Britain’s most senior officer in charge of terror prevention. more...

Friday, 27 March 2009

New Chatham House report, Cyberspace and the National Security of the United Kingdom

FaberBrent were at Chatham House last night for the launch of this important new report.

It was comforting to hear Rex Hughes (via web link from the US) state that we need to see a convergence of traditional security and information security for effective defence. Sounds like holistic security to us.

This report provides a general overview of the problem of cybersecurity. The aim of the report is to inform debate and to make the case for a more coherent, comprehensive and anticipatory policy response, both nationally and internationally. more...

Download the paper here

TelTech intros pay-as-you-use lie detector phone service

I wonder if it actually provides any consistent data as voice analysis is only a small component of lie detection. This compounded with the reduced audio quality of a signal bounced over several phone-lines and i wonder how effective it can really be?

TelTech has launched what appears to be the industry's first pay-as-you-use telephone voice analysis (lie detection) service.

The service, appropriately named `LiarCard,' requires users to route a phone call via a US toll-free number, with onward dialling to the required party whose voice is to be analysed for truthfulness and other stress issue
s. more...

Cybercrime revenues exceeding drug trafficking?

Now this is quite a statement. I wonder when the cybercrime enforcement agencies are going to get the same budget as the DEA?

Testimony from AT&T's Chief Security Officer Edward Amoroso, in which he told a US Senate Commerce Committee that revenues from cybercrime - at $1 trillion annually - are now exceeding those of drug crime, have been confirmed by Finjan, the business Internet security expert.

"Our latest research suggests that, whilst the economic downturn is reducing the income of drug traffickers, cybercriminals are becoming ever more innovative in the ways they extract money from companies and individual," said Yuval Ben Itzhak, Finjan's Chief Technology Officer. more...

Madoff data is exempt from data protection law and can be exported, rules High Court

Public interest.....

Data which is protected by the Data Protection Act can be transferred to the US to help in the investigation of companies run by Bernard Madoff, the High Court has said. The transfer would usually be barred but is justified in this case, the Court said. more...

Thursday, 26 March 2009

Councils used 'snooper's charter' more than 10,000 times

Still more Council abuse of RIPA. The really shocking information here is just 9% of these investigations led to a successful prosecution, so 91% of their snooping could be described as unfounded.

Surveillance powers originally designed to counter the threat of terrorism and safeguard national security have been used by local councils more than 10,000 times over the past five years - often for “crimes” as minor as littering, it emerged today.

Details disclosed under the Freedom of Information Act showed that councils in England and Wales used powers under the Regulation of Investigatory Powers Act (Ripa) to investigate offences ranging from dog fouling to taxi overcharging. more...

Canadian cops cry for BlackBerry wiretap

So this story demonstrates the dichotomy of information security. Blackberry's are (on the whole) pretty secure so this is a problem for the security services.

It has recently dawned on Canadian officials that communications sent with the BlackBerry are among the hardest mobile messages to eavesdrop on. But rather than congratulate the Waterloo, Ontario-based Research in Motion on a job well done, they're calling for laws that would force service providers to use only technology that can be tapped. more...

London health authority put on notice over data breach

I find it unforgivable that public bodies (that we have to provide personal data to) still do not take it's protection seriously. This is a systematic failure and a lack of staff awareness. 

For those of you that do not yet know, data on hard drives (the device in your computer that stores all the information) lives forever. You must have a process for disposing of any computers (business and personal), if you need help contact us.

A north London health authority has been given until the end of the month to improve its information security policies following an embarrassing information security blunder last year.

The Information Commissioner's Office has given Camden Primary Care Trust until the end of the month to pull up its socks following a breach of the Data Protection Act. The ICO's enforcement order comes after PCs containing 2,500 patients' names, addresses and medical histories were dumped beside a skip inside the grounds of St Pancras Hospital last August. more...

Wednesday, 25 March 2009

US phone identity look-up site

This is a pretty scary tool. It is only working in the US but allows you to reveal the owner details and location of any phone line; land or mobile.

Fortunately it would be illegal in the UK but watch out across the pond.

To give it a try go to http://tirs.us/ and put in the US number after the slash on the address line.
The commercial version is here http://www.reversephonedetective.com/

Tuesday, 24 March 2009

Employees see work laptops as personal property

I think this is a fair reflection of how we see our work laptops and mobile phones. If you are providing laptops and phones and not providing real-world guidelines and activating system controls, you are putting you data at risk. If you need help finding a balance contact us.

Work laptops and mobile phones are increasingly being treated as personal property outside the office, potentially exposing businesses to security threats.

A survey by Vodafone found that nearly half of business people use their work laptop to access the internet outside the office, whilst a similar number considered their work issued laptops or mobile devices as their own property whilst away from the office. more...

Lawyer-client privilege can't stop surveillance, says House of Lords

The UK's highest court ruled that spy law the Regulation of Investigatory Powers Act (RIPA) allows lawyers' conversations to be bugged. This is a very significant ruling for all in the legal profession and anyone involved in a legal dispute. 

If you are in the legal profession or involved in litigation contact us now for advice and services to help maintain your privacy. It is worth remembering that it is not just the government that uses covert surveillance during litigation.

The state is allowed to bug communication between lawyers and their clients, the House of Lords has said. more...

Should we be worried about Google Street View?

An interesting take on Google Street view and our civil liberties.

Simon Brew offers his personal take on the launch of Google Street View. And he’s a worried man. more...

Visa chief risk officer says that the recession is creating more identity criminals

Unfortunately we know that when things get tough there is an increase in crime. Anything that will provide an advantage is more likely to happen.  Corporate espionage, identity theft and general theft will all increase. Look out for the signs and do not become a victim.

The dire world economy is one of the biggest threats to payment security, according to the chief enterprise risk officer for Visa. 

Ellen Richey said at the Visa Security Summit in Washington, DC that it was common sense that a poor economy and bleak job market would increase the desperation and creativity of would-be data thieves. more...