ComSec LLC

For the first time, the U.S. government has publicly acknowledged the existence in Washington of what appear to be rogue devices that foreign spies and criminals could be using to track individual cellphones and intercept calls and messages.

Comsecemail

BEST WAY TO FIND A HIDDEN CAMERA OR SPY GADGET

Tips on What Not To Do and The Best Way to Find a Hidden Camera or Spy Gadget

If you suspect your business or home is under surveillance with a hidden camera or spy gadget, you may not know where to turn for help. Chances are your quest will include an online search for the best way to find a hidden camera or spy gadget. If you aren’t familiar with the acronym TSCM (technical surveillance countermeasures) your search for help may be lengthy. In fact, typing the subject line of this article in a search engine will lead you to a variety of suggestions including hiring a private investigator or using a spy gadget store for services. Others suggestions include performing your own physical search, buying a “cheap” bug detector or choosing the “cheap” bug sweep option. While all of these options may seem like a solution, we caution you to consider the following information before making a decision.

Linkedin-logo

ELECTION YEARS AND ELECTRONIC EAVESDROPPING

Election years present an increased risk of politically motived electronic eavesdropping. The candidates, campaign staff, political organizations, the press and/or news media may be targeted for electronic eavesdropping. From campaign strategies to dirty little secrets, an election can be won (or lost) because valuable information is captured, leveraged and/or reported. An exclusive election news story can make the career of a reporter, or generate significant revenue for a news organization. An election news story can launch a candidate to the top of the polls, or destroy their chances of winning the election. Was the information collected legally? Maybe, and maybe not. But, to a spy who seeks to influence an election, the potential reward far outweighs the risk of being caught. The news organization that breaks the pivotal story is often the winner. The candidate that outwits the eavesdropper(s) may be closer to the election victory.

Cell Phone Spying

A secret catalog of cell phone spying gadgets used by the military and intelligence agencies was recently leaked. The list of cell phone spying gadgets includes the infamous Stingray. Boeing’s dirty boxes are also in the catalog. What’s surprising is just how many cell phone spying devices there are! The cost of these cell phone spying gadgets will blow your mind too. Why so many cell phone spying gadgets? Why pay so much? The information collected is often priceless!

Comsecemail

CORPORATE ESPIONAGE & THE INSIDER THREAT

Effective Risk Management Requires More Than A Strong Cybersecurity Program

With a global cost of $445 billion annually, cybercrime and espionage[1] are a significant risk to an organization’s bottom line. US businesses seeking to effectively manage their risks cannot overlook the threat they pose or their potential financial implications. According to a recent study by Allianz, cybercrime, IT failures, espionage and data breaches are ranked the third most important US business risk[2], preceded in importance only by business interruptions/supply chain risks (ranked 1st) and natural catastrophes (ranked 2nd). Regardless if the threat is foreign or domestic, perpetrated by a company insider or an outsider, a single event can result in damage to brand reputation, lead to an erosion of customer confidence and/or financially devastate the affected company. In today’s digital world, a comprehensive cybersecurity program is a necessity, but relying solely on cybersecurity to address cybercrime and corporate espionage risks simply is not sufficient. J.D. LeaSure, President/CEO of ComSec LLC and a counterespionage expert, provides valuable insight into protecting corporate information from insider threats that corporate cybersecurity programs do not address

Key Considerations From CEO Prioritization to TSCM / Cyber TSCM Inclusion

Ask your CIO or CISO if your company is winning the cybersecurity war, and the reply may not be the confident, positive affirmation the CEO or the Board of Directors wants to hear. Why? Information security professionals know the cybersecurity war cannot simply be “won”. Maintaining corporate cybersecurity posture is a constant battle.

Achieving Corporate Cybersecurity Objectives with C-Suite Involvement

Developing corporate strategy is one of many C-suite responsibilities. Whether you are the CEO, CFO, COO, CSO, CIO or CISO, you must be a strategic thinker who can ensure corporate objectives are fulfilled. Whether you are responsible for protecting intellectual property, controlling finances or managing brand reputation, input from internal and external stakeholders spanning multiple disciplines must be considered in the development of strategic plans. Your corporate cybersecurity plan is no exception. Are you delegating management of your corporate cybersecurity plan to your IT department? If your answer is yes, your cybersecurity plan will likely fall short of C-suite strategic objectives. A counterintelligence and TSCM / Cyber TSCM expert offers insight about cybersecurity vulnerabilities your IT department may overlook.