Menu
Navigation

Global articles on espionage, spying, bugs, and other interesting topics.

Keep abreast of the espionage threats facing your organisation.

Buddhist Monks Caught Smoking, Drinking and Gambling on Hidden Camera

The footage came to light when Seongho, who had previously been expelled from the order for defaming its leader, submitted it as evidence after reporting the incident to prosecutors. He claimed that he found a USB drive containing the footage on the floor of his temple and that the tape had been recorded with a hidden camera in the hotel room.

Gambling is illegal in South Korea, except for at licensed casinos and horse racing tracks. “Buddhist rules say don’t steal. Look at what they did, they abused money from Buddhists for gambling,” Seongho said.

Jaseung has since apologised to all of the country’s Buddhists.

“We deeply apologise for the behaviour of several monks in our order,” he said in a statement. “The monks who have caused public concern are currently being investigated and will be punished according to Buddhist regulations as soon as the truth is verified by the prosecution.”

The scandal also excited attention on Twitter, with some posts calling for reforms within the sect.

“It can be good news. Please, Jogye order, cut out the rotten part before it gets worse and take this opportunity to be reborn,” one tweet said.

Chung Yoon-sun, secretary-general of the Buddhist Solidarity for Reform, said political conflicts between monks have become commonplace in Korean society.

“It’s just like politics,” he told the Korea Times. “In society, if there’s a conflict of interest between two groups, they make a deal or they fight. There have been cases in the past in which monks physically assaulted each other. Especially during the election two years ago, the problem was most severe. This incident also might have something to do with the upcoming election in the autumn.”

Shot of video showing South-Korean monks playing poker, drinking and smoking in a hotel room (Screengrab)


Garbled warning bugging Mac Pro users after OS X 10.7.4 update

If you have a Mac Pro system and have updated to Apple’s recently released OS X 10.7.4 update, you may find an apparent warning window appear whenever you reboot your system. The warning looks like a standard information dialog box window that contains a picture of a Mac Pro system from the side, but the rest of the window contains no information of value.

Instead of a hint at what the warning could be about, the window simply states “keyApplicationTitle” in the area where the referenced application name might be, “keyWarningOptimalInfo” where the information or warning description text might be, and instead of an OK button the only button in the window contains the text “keyOKButton.”
Garbled warning window

(Credit: VicB01 / Apple Discussions)

This window appears at boot-up for some Mac Pro users who have upgraded to OS X 10.7.4.

These components are clearly the code structure that Apple uses to insert the appropriate text strings into the window, but it appears either a syntax error or some similar oversight has caused the string association to misfire, and instead put the object titles into the window. Clicking the OK button seems to close the window with no apparent change to the system; however, the intent of the warning is lost to those who are experiencing it.

This error is reminiscent of the one that appeared with the previous OS X 10.7.3 update, where users were finding interface elements being replaced with odd green and pink patterns, with red question marks and orange “CUI” text. While not as widespread as the one in OS X 10.7.3, this one evokes similar confusion in its that users cannot figure out what their systems are trying to tell them.

Simple tests like booting to Safe Mode show no change in the behavior of this error, so those who experience it can either tolerate it or try reinstalling the OS X 10.7.4 Combo update, and perform simple maintenance procedures like running a permissions fix on the boot drive, or at the very worst reinstalling OS X followed by again applying the combo updater, though these steps are not guaranteed to work.

Hopefully Apple will clarify the situation soon, but until then Mac Pro users with this issue may have to dismiss the bizarre warning window every time they boot their systems.


Fears of spying hinder China Mobile license

China Mobile, the world’s largest mobile provider, applied in October for a license from the Federal Communications Commission to provide service between China and the United States and to build facilities on American soil.

Officials from the FBI, the Department of Homeland Security and the Justice Department’s national security division are concerned that the move would give the company access to physical infrastructure and Internet traffic that might allow China to spy more easily on the U.S. government and steal intellectual property from American companies, according to people familiar with the process who declined to be identified because the deliberations are secret.

Those officials, known collectively as “Team Telecom,” review FCC applications by foreign-owned companies. They could advise the FCC not to issue the license, but may instead demand a signed agreement designed to satisfy security concerns, the people said.

The review is being led by the Justice Department, which declined to comment, as did the FBI and DHS.

A move to block the license could provoke a lawsuit by China Mobile, officials said. But lately, the U.S. government’s focus on cyber espionage has sharpened considerably.

China Mobile, which has nearly 670 million subscribers, is not applying to provide domestic U.S. telephone or Internet service. But traffic from U.S. carriers, such as Verizon Communications Inc. or ATT Inc., could be routed to the China-owned network should a license be granted.

“Suddenly, you’ve got a perfect ability to exfiltrate information out of the country,” said Scott Aken, a former FBI cyber security investigator.

A U.S. representative for China Mobile, who declined to be quoted by name, said the company is cooperating with Team Telecom’s inquiries and expects to satisfy any concerns through a national security agreement. The firm declined to address allegations about Chinese spying.

Team Telecom’s review of China Mobile’s application is complicated by the fact that two other Chinese government-owned firms, China Telecom and China Unicom, were granted similar licenses in 2002 and 2003, respectively, well before Chinese cyber espionage was viewed as a pressing concern. Both carry phone and Internet traffic between the U.S. and China.

In neither case did Team Telecom require a national security agreement that specifies, for example, how the company must protect U.S. classified information that could traverse its network.

In recent years, Team Telecom has required foreign-owned firms to sign extremely detailed agreements.

One signed in September by Level 3 Communications, a Broomfield, Colo., carrier, requires the company to provide the manufacturer name and model number of all equipment relating to the undersea cables used to carry traffic to and from the United States. According to the FCC, 43.5 percent of the company is indirectly owned by foreign interests.

U.S. officials in recent months have warned repeatedly that cyber espionage, in some cases authorized at the highest levels of the Chinese government, has become a grave threat to U.S. economic and national security.

Tens of billions of dollars in U.S. intellectual property has been stolen, much of it through hacking originating in China, U.S. intelligence officials have said. In addition, China has obtained national defense information, the officials have said.

On April 8, 2010, China Telecom, China’s largest fixed-line telephone company, rerouted 15 percent of the world’s Internet’s traffic through Chinese servers for 18 minutes, according to the U.S.-China Economic and Security Review Commission.

China Telecom denied hijacking Internet traffic, but it did not explain how erroneous instructions were issued in a global Internet routing system based largely on trust.

In February 2011, the U.S. government blocked a deal by another Chinese telecom company, Huawei Technologies, to purchase 3Leaf Systems, an insolvent technology firm based in Santa Clara, Calif. Huawei is privately owned, but American officials alleged that it has ties to the Chinese military.

Last month, Australia barred Huawei from bidding for work on its national broadband network because of security concerns. Also last month, Symantec Corp. unwound its joint venture with Huawei, reportedly over concerns that the U.S. government would stop sharing information with Symantec.

The House intelligence committee is investigating the role of Chinese telecommunications companies in espionage, with a focus on Huawei and ZTE Corp., which makes switches, routers and other products.

Sean McGurk, a former senior DHS cyber security official, said China Mobile’s entrance into the U.S. market “would pose a concern to most people. We’re not really sure, not only where the information is flowing, but what potentially is being left behind.”


Utah industrial espionage case settled with plea deal

A scientist indicted in U.S. District Court for allegedly emailing trade secrets from a Utah drug company to his brother-in-law in India has pleaded guilty to one count of unlawful access to a protected computer.

The case against Prabhu Mohapatra, 42, of North Logan, marks the first time an industrial espionage case has been filed against a Utah defendant, according to the FBI.

In exchange for Mohapatra’s plea, 25 other charges were dismissed, including those related to the theft of trade secrets.

He faces up to five years in prison when he is sentenced Aug. 28 by Judge Clark Waddoups.

A senior scientist at Logan’s Frontier Scientific Inc., Mohapatra admitted accessing a company computer to obtain the chemical recipe for Meso-tetraphenylporphine, according to court documents.

He then sent the recipe to his brother-in-law, who was employed by a competing company, according to the initial indictment.

Mohapatra, who worked at Frontier Scientific from 2009 to 2011, was caught after a co-worker noticed suspicious behavior and reported it to management, court documents state.

 


Crestwood business owner charged with installing hidden camera in women’s bathroom

ST. LOUIS (KMOV) — The owner of a Crestwood construction company is accused of installing a hidden camera in the women’s restroom at his business.

Brian Spear, who owns Spear Construction, was charged with attempted invasion of privacy.

Police said Spear placed a hidden camera in the women’s restroom and recorded women on the toilet.

Authorities said a former employee found the camera under a pipe under the sink.

The employee, who wishes to remain anonymous, said she couldn’t believe she found a hidden camera in bathroom she’d used for more than 11 years.

“What did he see? How long has it been there? What was he doing? Why was he doing this,” the employee said when asked what went through her mind when she found it.

Police said the camera was placed so it would record women from behind when they sat down on the toilet.

Spear admitted to the accusations in an interview with Crestwood Police, saying he’s a “butt man.” Police said he had watched video of several different women over at least a two-month span.

The victim said she was mortified when she discovered the camera was installed by her own boss.

“They’re sick. Why would someone want to see that? Why are they doing this to me?” she asked.

With her attorney by her side, the victim said she’s now suing her former boss. She quit the day she found the camera and has been out of a job ever since.

“I don’t know if he’s shared these images with anybody else but we will find out,” said Chris McDonough, her attorney.”

News 4 tried to get Spear’s side of the story, but he wasn’t at work when reporter Lindsay Bramson showed up to the business.

Spear is expected to make his first court appearance June 1.