The Olde Ways

I was summoned to a meeting with a client. The client firm is over a century old. This successful firm has learned a thing or two about security.

I was asked to surrender my electronic gadgets. Being of the old school, I had none. This pleased the gatekeeper. I was led to a room furnished with only a curious table and four old wooden bankers chairs. No telephone, no electrical outlets, one florescent light fixture above the table.  The gatekeeper had to unlock the room. She then waited at the open door until my contact arrived.

My contact enters and places pieces of chalk and a chalkboard eraser on the the table. Most of the table top is painted with chalkboard paint.

We eventually compose a handwritten Memorandum of Agreement regarding the engagement, sign it, and off we go.

These people understand the rules, especially Rule #1 — If you don’t want it overheard, don’t say it. But I must admit, I have never seen a “Magic Slate” table before.

China’s Espionage and Cyber Attack Strategy

An excellent article about the “recent discovery of Chinese cyber warfare attacks on foreign computers, on communication computers of visiting dignitaries, and espionage activities to assist a friendly country is building weapons of mass destruction (WMDI)” entitled China’s Silent Warfare at BLOg Source INTelligence reveals a lot about China’s espionage and cyber attack strategy.

Industrial Espionage News

Bad Times Can Make Firms Vulnerable to Espionage

Corporate espionage is always a threat, but when the economy is sour the temptation is greater and finding broke or disgruntled employees is easier.

Stamping out data leakage & industrial espionage during a recession

How the recession is impacting IT security and top tips to ring fence your data to minimise risk.

British pair charged in ‘industrial espionage’ row

Two Wyko engineers are alleged to have used a mobile telephone to photograph a secret piece of equipment at an American factory

Mobile Phones & Tin Foil Hats

Under certain circumstances, if you lose sight of your mobile telephone, then you may reasonably assume it has been compromised. These circumstances are more common than you might think. Here are two cases of this that I have encountered over the last year or so.

Read more

Data Slurping

An excellent article at Sharp Ideas about software called Slurp that turns an I-pod into a covert data theft device.

An unauthorized visitor shows up after work hours disguised as a janitor and carrying an iPod…He walks from computer to computer and “slurps” up all of the Microsoft Office files from each system. Within an hour he has acquired 20,000 files from over a dozen workstations…

Ex-Intel worker accused of IP theft

A former engineer at chip maker Intel Corp., Biswahoman Pani, has been charged with stealing trade secrets after taking a new job at rival Advanced Micro Devices Inc..  More than 100 pages of sensitive Intel documents, as well as 19 computer-aided-design drawings, were found in a search of Pani’s house conducted on July 1.

He began working for AMD eight days before his employment at Intel ended. Pani still had access to Intel’s computer network. Russell said Pani used this access to collect sensitive documents that might have provided valuable competitive intelligence for his new employer.

“…there is no evidence AMD knew of Pani’s actions or encouraged them. Neither is there evidence that AMD ever received the confidential Intel files.”

You can read the entire article at The Boston Globe.