Menu
Navigation

Global articles on espionage, spying, bugs, and other interesting topics.

Keep abreast of the espionage threats facing your organisation.

FBI, rangers search Tenaha city offices for bugging devices

TENAHA, Texas (KTRE) –

Tenaha Mayor George Bowers has confirmed that Texas Rangers and FBI agents searched city property for bugging devices this week.

Ranger Tom Davis is the lead investigator in the case, according to a spokesman with the ranger’s office. Messages have been left for Davis.

Read More


No bugging device found at Pranab’s office

The Finance Ministry on Friday said that no bugging device was found within its premises, including the office of Finance Minister Pranab Mukherjee [ Images ], and the suspicious adhesive discovered was chewing gum-like material.

Minister of State for Finance S S Palanimanickam [ Images ] informed the Lok Sabha in a written reply that security audits are periodically conducted in the ministry and Mukherjee’s office.

One such routine security check was conducted on September 4, 2010, by the Investigation Directorate of the CBDT, which engaged the services of an expert with the domain knowledge of the subject, he said.

During this check, adhesive-like substances were noticed at various locations, Palanimanickam added.

“This was brought to the notice of the Prime Minister by the Union Finance Minister in September 2010,” he said.

The Prime Minister directed the Intelligence Bureau to conduct a secret inquiry into the matter.

“Adhesive patches were found stuck at a few places. The adhesive patches were subjected to chemicalforensic analysis, which revealed that the substance contained contents comparable with contents of chewing gum,” the minister added.

Physical examination of the recovered substance did not reveal any sign or mark suggestive of any device having been attached thereto.

“Thereafter, all these premises have been subjected to regular screening. During these exercises, no devices have been detected,” Palanimanickam added.

In June this year, the government faced a controversy of alleged snooping of the offices of Mukherjee and his aides in the North Block.


Schools use the net to eavesdrop on students

While social networking sites are not accessible from school computers, Lila Mularczyk, the deputy president of the NSW Secondary Principals’ Council, recently argued that cyber-bullying connected with school was treated in the same way, no matter when it occurred.

Read More


Rep. Rogers: Cyber espionage major threat

WASHINGTON, Aug. 13 (UPI) — The head of the House Intelligence Committee says cyber espionage is one of the greatest challenges facing U.S. intelligence agencies today.

Rep. Mike Rogers, R-Mich., told retired U.S. intelligence officers in a speech Friday in Washington that Russia and China appear to be the major players in state-sponsored espionage, the Los Angeles Times reported. He said cyber spying is the biggest threat aside from al-Qaida and said intelligence agencies need the resources to combat it.

Rogers warned against making large cuts in the funding for U.S. intelligence agencies.

“Nation states are investing huge amounts of time, personnel and money to steal our data,” Rogers said. “We are not as prepared as we need to be.”

Rogers said reports on cyber espionage suggest Russian and Chinese military and intelligence agencies are involved.

While U.S. government agencies are generally quiet about cyber espionage, attacks have been reported by private security companies, Google and academic researchers.


NEWS FOCUS: Cyber-espionage attacks threaten corporate data in new unrelenting ways

Stealthy, sometime long-term cyber-espionage attacks to steal sensitive proprietary information – what some now call “advanced persistent threats” (APT) – have become a top worry for businesses.

Last week the Security for Business Innovation Council, a group of 16 security leaders from companies that include eBay, Coca-Cola Company, SAP, FedEx Corp., Johnson Johnson and Northrop Grumman, summed up their thoughts on APT in a report, saying this type of attack is forcing IT to rethink network security. “Tackling advanced persistent threats means giving up the idea it’s possible to protect everything. This is no longer realistic.”

Read More