Showing posts with label quote. Show all posts
Showing posts with label quote. Show all posts

Friday, July 17, 2020

Quote of the Week — Espionage Truths

"... a key way to detecting espionage is to follow your instincts and protocols."
~ /

Saturday, February 1, 2020

Quote of the Month

“Absent a very strong federal privacy law, we’re all screwed.”
—Al Gidari, a privacy professor at Stanford Law School.
(via The New York Times article above)

Monday, April 8, 2019

Quote of the Week

“Boston is a target-rich environment for anyone who is interested in intellectual property.”
–US Assistant Attorney General John Demers  more

Tuesday, February 13, 2018

Quote of the Week

“If you're a company doing business with other countries, you can expect that you're being hacked – because they want to know your negotiating position,” Charles Widdis, Security Strategy and Planning Manager at CitiPower and Powercor

Wednesday, July 5, 2017

Monday, June 12, 2017

Ponder of the Week

Lawyers and manufacturers are also vulnerable to corporate espionage.  Months can go by before they even realize they've been hit. — Mandy Simpson, CEO, Cyber Toa

Saturday, April 22, 2017

Quote of the Week

"Corporate espionage is not an easy thing to detect; the whole point of a spy is to remain under the radar. In order to uncover this kind of behavior, you’ll need technical controls..." Dr Jamie Graves
more

Wednesday, August 10, 2016

Quote of the Week

"We have never had absolute privacy in this country." ~FBI Director James Comey more

Monday, July 18, 2016

Quote of the Week

"Lord knows how much industrial espionage has gone on." —Bill Curtis, a Fellow of the IEEE more

Sunday, February 8, 2015

Privacy Quote of the Week

"The age of information-sharing is brilliant, as long as you have no secrets."
~ Heather du Plessis-Allan
 

Monday, March 24, 2014

TSCM Quote of the Month

"It's a well-known fact that businesses world-wide invest thousands or even millions protecting themselves from hackers and perceived cyber threats, but often fail to protect themselves against the threat of technical surveillance." –Peter Rucinski of Assure Technical, speaking about lack of attention businesses pay to finding bugs, wiretaps, spycams and other forms of electronic surveillance. (source)

Wednesday, February 5, 2014

Quote of the Day - On retaining privacy...

"It is amazing how lame people are. In today’s world, it is easy to hide. Just unplug." ~MW

Friday, September 6, 2013

The New York Times Quote of the Day :)

QUOTATION OF THE DAY

"This is the golden age of spying."
PAUL KOCHER, a cryptographer, on the National Security Agency's ability to circumvent encryption systems in gathering private Internet information.

Wednesday, June 19, 2013

Quote of the Week - Orwell Got it Wrong

"And surveillance has become entertainment, most ironically in 'Big Brother' where people compete to be under constant scrutiny. More revealing than their narcissism is the audience's enthusiastic voyeurism, playing at Thought Police from the couch." — Peter Marks, Associate Professor, senior lecturer in the Department of English at the University Sydney. He is also a member of the Surveillance and Everyday Life Research Group

Monday, May 6, 2013

New York Times - Quote of the Day - Tapped Out On Taps

"I'm so jaded at this point that I'm not surprised. And from my perspective, let them all wear wires. Let's catch everybody. Maybe if we clean out the whole system, we can move forward." 
~STATE SENATOR TONY AVELLA, a Queens Democrat, on the disclosure that a second state legislator had been secretly recording conversations with colleagues.

Thursday, February 21, 2013

Business Espionage - Quote of the Month

“This is an absolute tidal wave of criminal activity, and we’re not even scratching the surface. We are literally having our nation systematically stolen out from under us.”

 Brett Kingstone, a one-time victim of trade secret theft and writer of The Real War Against America, a book that details how his start-up company was crippled by the theft of trade secrets related to LED lighting. (more)

Thursday, November 8, 2012

Security Quote of the Day

"Protecting classified information depends, today more than ever, on the security awareness of employees. They can literally make or break your security program." NSI, Security NewsWatch

Wednesday, May 30, 2012

Security Quote of the Month

"We're going to double down on secrecy..." 
Tim Cook, Apple, CEO (more)

Meanwhile... 
“Before, criminals used to steal money to become rich, but now they have realized that they can be rich by stealing corporate information.”

These words from a U.S. Treasury Department official send a chilling reminder to industry about the growing threat – and cost – of trade secret misappropriation...
 
Today, trade secret theft costs multinational corporations billions of dollars each year – and no company is immune. Any company with valuable commercial information, processes or intellectual property is at risk; and global companies from all sectors continue to experience significant economic losses not only from trade secret theft, but also from piracy, counterfeit products and corruption. (more)

What's your policy?

Thursday, April 5, 2012

Espionage Outrage Reaches the Boiling Point ...and a solution.

...called the continuing, rampant cybertheft “the greatest transfer of wealth in history.” (bio)
---
Shawn Henry, (FBI) 
...current public and private approach to fending off hackers is "unsustainable.'' Computer criminals are simply too talented and defensive measures too weak to stop them, he said. (bio)
---
Richard A. Clark, (presidential advisor) 
"Yet the same Congress that has heard all of this disturbing testimony is mired in disagreements about a proposed cybersecurity bill that does little to address the problem of Chinese cyberespionage." (bio)
---

Letter to the Editor - The New York Times

Dear Editor,

Richard A. Clarke’s op-ed piece, “How China Steals Our Secrets,” (4/2/12) states the current business espionage problem perfectly, but we need a solution. Consider this...

The Chinese secrets of: silk and tea production; making porcelain, gunpowder and paper, could not survive Western espionage attacks – not even when protected with death penalties. Espionage killed their economy, and the damage lasted for centuries. Obviously, competitive advantages are also National Interest Assets.

The one-sided, punish-the-spy security model, still being used today, never worked. We need to make it two-sided. There must be a proactive legal responsibility to protect.

The solution... Corporate caretakers must be held accountable for protecting their valuables; our national treasures. We need a law creating business counterespionage security standards, with penalties for inadequate protection. We already
successfully employ the same concept with medical and financial record privacy.

Kevin D. Murray
Spybusters, LLC
---

A cybersecurity law alone will not stop spying. 
If implemented, it will force an increase in traditional spy techniques, such as: bugging, wiretapping, physical intrusions and social engineering. (Remember, computer data is available elsewhere long before it is computerized.) 

Protecting our competitive advantages requires a holistic approach; a National Interest Assets law which would also...

• Protect the entire intellectual property timeline, from brainstorming and initial discussions, to the final product or business strategy. 

• Impose a responsibility of due care upon the creators and holders competitive advantage information.

• Specify compliance requirements aimed at countering traditional business espionage practices. Technical Surveillance Countermeasures Inspections (TSCM / bug sweeps), information-security audits, and information-security compliance procedures; safeguards which can be easily mandated and monitored.

This is a no-brainer, Congress.

The cost of keeping National Interest Assets safe is infinitesimal compared to current losses (not to mention the long-term effects). Just ask the Chinese.
~Kevin

Monday, April 2, 2012

How effective is antivirus software on smartphones?

"...my recommendation is to not worry about trying to get antivirus software to run on the phones themselves. Not only is it barely effective, but like any background process, it takes up valuable battery life and resources." TechRepublic (more)