Showing posts with label dumpster. Show all posts
Showing posts with label dumpster. Show all posts

Wednesday, May 23, 2018

Dumpster Diving…A Treasure Trove

From the book, What You Don't Know... Your Guide to Achieving "Knowledge Advantage" in the Information Age!

"Valuable Open Source information is thrown away every day, waiting to be collected by the thoughtful researcher. Dubbed “dumpster diving,” or “trash picking” a wastebasket becomes a friend to researchers and a foe of anyone you are collecting on...

How useful dumpster diving is can be readily seen by the fact that a highly-placed US intelligence official was convicted and sentenced to life in prison for working with Moscow operatives. He had thoughtlessly thrown away key clues to his betrayal, not thinking they would end up on a prosecutor’s desk. Expecting anything to be buried forever in a trash heap can be a major mistake...

In the United States the Supreme Court has said that, as a general rule, things left in trash cans curbside are considered “abandoned” and are there for the taking."

Related: Confidential Paperwork Security

Saturday, June 24, 2017

Things We See — Blue Bucket Blues


Not all information security issues are this obvious. 
Finding all of them requires an independent Technical Information Security Survey. more

Tuesday, November 15, 2016

TSCM School: How Small Can Electronic Surveillance Bugs Be?

...or, why we listen to the wires.

Electronic surveillance devices (audio, video, data) are often referred to by their generic term — bugs.
Amplified Mic (enlarged)
Bugs may be highly specialized, as in a video only spy camera, or may incorporate audio, video and data snooping. An example of this is a device which is secreted in a vehicle, which collects GPS data, audio and video.

Most people, however, think of bugs as audio-only radio transmitters.

Often the simplest bugs are the most effective. These are just microphones attached to a length of wire.

The other end of the wire can be connected to a distant radio transmitter, voice recorder, or simply an amplifier with headphones.

Most people are surprised to learn all homes and offices come prewired, bugging-ready.

Standard telephone cables have unused pairs, and computer Ethernet cables generally only use two of the four pairs they contain. Most older office buildings also have legacy wiring which was never removed.

These "hardwired" bugs are among the most difficult to detect, which is why spies and law enforcement favor them.

Since a microphone is the main element of a hardwired bug,
I thought it might be very useful to show you how small they
can be.

These fingers are holding a real microphone, actual size.

Now you know just how much the other picture was enlarged.

Amazingly small, these microphones are mass produced by the millions.

Fortunately, most wind up in cell phones and hearing aids. However, many are sold on eBay for pennies, and then become bugs.

Not everyone knows how to find these. But, don't worry, we do.

Wednesday, August 24, 2016

CNN Report: How is the US / China Cyber Theft Agreement Working Out?

About a year ago, China and the United States formally agreed not to conduct or knowingly support the cyber theft of each other's intellectual property.

So, how is that agreement working out?

Not great, said Adm. Mike Rogers, head of US Cyber Command.

"Cyber operations from China are still targeting and exploiting US government, defense industry, academic and private computer networks," Rogers said last April during testimony before a US Senate committee.

Cyber theft of US trade secrets can easily ruin American businesses and result in higher prices for consumers. Even more worrisome, stolen American military secrets could put US servicemen and women at risk during combat. more with video

See the dramatic story of how the United States caught and convicted an American who was spying for China. Watch CNN's "Declassified," Sunday at 10 p.m. ET/PT.

Saturday, December 5, 2015

Security Director Alert: A Brilliant Answer to Shredding Security Worries, and Cost

Epson Develops the World's First Office Papermaking System
Turns Waste Paper into New Paper 
  
PaperLab promises to revolutionize office recycling by securely destroying documents and turning them into office paper using a dry process.

Seiko Epson Corporation has developed what it believes to be the world's first compact office papermaking system capable of producing new paper from securely shredded waste paper, without the use of water.

Epson plans to put the new "PaperLab" into commercial production in Japan in 2016, with sales in other regions to be decided at a later date.

Businesses and government offices that install a PaperLab in a backyard area will be able to produce paper of various sizes, thicknesses, and types, from office paper and business card paper to paper that is colored and scented.

Until now enterprise has had to hire contractors to handle the disposal of confidential documents or has shredded them themselves. With a PaperLab, however, enterprise will be able to safely dispose of documents onsite instead of handing them over to a contractor. PaperLab breaks documents down into paper fibers, so the information on them is completely destroyed. more



This could be the biggest information security news of the year for many corporations and government agencies. ~Kevin

Wednesday, August 19, 2015

Trashnet - Garbage Trucks with License Plate Readers

CA - San Jose may enlist garbage trucks as eyes on the ground for a short-staffed police force.

Equipping trash haulers with license plate readers would turn them into roving scouts for the San Jose Police Department. Already, the trucks travel every city street every single week, covering more ground than a cop car.

Mayor Sam Liccardo proposed the idea with support from council members Raul Peralez—a former policeman—and Johnny Khamis. more

Sunday, August 31, 2014

Broker, Trader, Lawyer, Spy: The Secret World of Corporate Espionage

In this penetrating work of investigative and historical journalism, Eamon Javers explores the dangerous and combustible power spies hold over international business.

Today's global economy has a dark underbelly: the world of corporate espionage. Using cutting-edge technology, age-old techniques of deceit and manipulation, and sheer talent, spies act as the hidden puppeteers of globalized businesses... Readers meet the spies who conduct surveillance operations, satellite analysts who peer down on corporate targets from the skies, veteran CIA officers who work for hedge funds, and even a Soviet military intelligence officer who now sells his services to American companies.

Intelligence companies and the spies they employ are setting up fake Web sites to elicit information, trailing individuals and mirroring travel itineraries, dumpster-diving in household and corporate trash, using ultrasophisticated satellite surveillance to spy on facilities, acting as impostors to take jobs within companies or to gain access to corporations, concocting elaborate schemes of fraud and deceit, and hacking e-mail and secure computer networks.


This globalized industry is not a recent phenomenon, but rather a continuation of a fascinating history. The story begins with Allan Pinkerton, the nation's first true "private eye," and extends through the annals of a rich history that includes tycoons and playboys, presidents and FBI operatives, CEOs and accountants, Cold War veterans and military personnel. (more)

Monday, February 13, 2012

Deshredding Reveals Massive Cold War Identity Theft

The reconstructed contents of 500 trash bags offer new insights into the extent of spying activities by the East German secret police, or Stasi, in West Germany.

As the German regional public broadcaster RBB recently reported, the Stasi ran an extensive program of stealing identities of tens of thousands of West German citizens to enable their spies to operate freely in the West...

This massive fraud came to light when the agency of the Federal Commissioner for the Stasi records completed the reconstruction of about a million torn-up documents, or the contents of about 500 trash bags. The reconstruction was accomplished, for the most part, through meticulous work by hand. (more)

Spybusters Security Tip: Never use a stripcut shredder. Always crosscut, particle, or pulp shred your sensitive wastepaper. Computerized document reconstruction (de-shredding programs) are available.

Monday, March 28, 2011

Export, eh... or, The PC is Smokin'

Dumpster diving isn't something Saskatchewan's privacy commissioner makes a habit of, but this time Gary Dickson says he was left with little choice.

Dickson and two assistants had to wade through a massive recycling dumpster this week to recover medical files. They sorted through paper more than 1 1/2 metres deep after getting a tip directing them to the container behind the Golden Mile Shopping Centre in Regina... "So we seized all of this stuff immediately and the only way we could do that was getting into the recycling bin."

It took a couple of hours to go through the dumpster. Dickson estimates they found more than 1,000 files that should have been shredded.

Whoever tossed the files had to know what they were, he said.

The commissioner said doctors, regional health authorities and other health professionals have long been told to follow Saskatchewan's Health Information Protection Act. The act says trustees have to safeguard personal health information in their custody.

There are fines of $50,000 for individuals and $500,000 for organizations for breaching the act. (more)

A shredder is beginning to look like a bargain, Doc.

Friday, July 30, 2010

Mission Impossible Data Destruction for Computers

from the press release...
UK - From 1st August, Stone http://www.stonegroup.co.uk/, the UK's largest privately-owned computer hardware manufacturer, will only provide its public sector customers with PCs and laptops that include the famous "Mission: Impossible" option to self-destruct the data on the system prior to disposal...  These products will include - at no extra cost - a pre-configured executable programme which will allow the customer to perform a data erasure process in-house, without the presence of an engineer or the need to remove hardware to an off-site facility.

James Bird, CEO at Stone, explains, "It sounds like that great opening sequence in Mission: Impossible when the data self-destructs after 30 seconds! It is, of course, very carefully controlled and managed and there isn't the excitement of flames and smoke, just a simple electronic signal! But with the penalty for data protection breaches now reaching up to 500,000 pounds for organisations which do not properly manage the deletion of their records... (more)

Thursday, November 5, 2009

Details of an Attorney's Tactics Revealed

"For years, Broward County's socially and politically connected marveled at the astonishing success of Fort Lauderdale lawyer Scott Rothstein and wondered: How does he do it?...

...Sakowitz said Rothstein boasted of having sophisticated eavesdropping equipment and that former cops would sift through potential defendants' garbage. With compromising evidence in hand, the firm urged the targets of the claims to pay a settlement without a public lawsuit." (more)

Thursday, June 11, 2009

Spybusters - Top Ten Spybusting Tips

(cover story - Plaintiff Magazine, June '09)
Who are these snoops?

Snoops can be competitors, vendors, investigators, business intelligence consultants, colleagues vying for positions, overbearing bosses, suspicious partners, the press, labor negotiators, government agencies. The list is long.

Why would I be a target?
Money and power are the top two reasons behind illegal surveillance. If anything you say or write could increase someone else’s wealth or influence, you are a target.

Is snooping common?
Yes. The news is full of stories about stolen information. In fact, many news stories themselves begin with leaks.

Can I protect myself?
Yes. Espionage is preventable. If... (full article)

Monday, December 10, 2007

It's 10 o'clock. Do you know where your secrets are?

"...in the fashionable neighbourhood of Friedrichshain, a German hairdresser was astonished to find a plastic bag containing classified plans for the Bundesbank's new safe in garbage cans in his very own backyard.

The plans detailed "floor thickness, movement detector placements, doors, passageways and barred gates" reported mass circulation daily Bild.

"These plans are secret," was written at the top of the page in bold capitals. (more)

Friday, September 21, 2007

Dumpster Diving in Singapore

In what Singapore's Chief Justice declared was the first time that questions of law have been raised here over the ownership of garbage, the courts allowed an appeal from a group of creditors who had a dump staked out, so as to dig up the dirt on their debtor.

Almost daily for six months, a group of private investigators hired by the creditors — various American investment funds — lurked around the common rubbish dump at Orchard Towers.

From a distance, they would watch cleaners deposit bags of trash. And after the cleaner contracted by two companies, Vestwin Trading and Hilltree Enterprise, made his drop-off, the investigators — taking care not to be spotted — moved in to pick up the bag of trash. (more)

Dumpster diving is alive and well. Take precautions. And, yes... the book is real. Buy it here, and find out how dumpster divers are trained!

Wednesday, May 2, 2007

Repo Men Have Spy Problems Too

"I have a friend who owns a small company in a larger city here in the South. Not long ago, he discovered that someone was going thru his trash bin when he rolled it out the night before pick up. He happens to have his office and lot next to another business that has security cameras, one of which also covers the front of his building and trash bin in it's scope. When he asked to see the video from a certain night, he learned it was a longtime employee of a medium sized company that we both worked for at one time.

Apparently this guy was dumpster diving to get at any records that would show who his clients are, fee schedules, etc. When we worked together for this larger company, it was not uncommon for us to be told to go by competitor's lots and write down tag numbers on the repo's to get the lien holder info. ...

The last thing we should have to worry about is our fellow repossessor, yet unfortunately, we all need to realize that they are our biggest threat of all." ~ David J. Branch

Wednesday, March 21, 2007

FartCam Sniffs Out Trash Tippers

UK - A council is to hide cameras inside baked bean tins and brick walls to catch residents who put rubbish in the wrong bins.

The covert surveillance has been ordered by Ealing council to target 'enviro-criminals' an Evening Standard investigation has found. (more)

UPDATE... EALING council was rubbished' in national and London press this week over its decision to use hidden cameras in bags of rubbish. ... (reply) "We make no apology for taking the toughest action against those few who continue to blight our borough without any thought of the impact on the majority of residents." (more)

Tuesday, January 30, 2007

Richie Rich, Paper Boy

News carriers and retailers in Worcester, Mass., get an unexpected bonus with their usual shipment of the Telegram & Gazette: the credit and debit card numbers of 240,000 subscribers to the paper and its sister publication the Boston Globe, both owned by the New York Times Co.

The security breach is the result of a recycling program in which paper from the Telegram & Gazette's business office is reused to wrap bundles of newspapers. (more)

Tuesday, January 9, 2007

One man's trash is another man's...

OK - Dumpster diving thieves may have their hands on your private information. Personal documents, with visible bank account information, were found in an overflowing dumpster behind a strip mall near 91st and Yale on Sunday. Some of the documents, which were not shredded, had fallen onto the ground and were blowing around in the wind, police said.

Tulsa Police contacted some of those identified on the documents; their reaction was not a pleasant one. (more)