DPL-Surveillance-Equipment.com

These are new product announcements from my main website (Open 24/7/365). We have a life-time warranty / guarantee on all products. (Includes parts and labor). Here you will find a variety of cutting-edge Surveillance and Security-Related products and services. (Buy/Rent/Layaway) Post your own comments and concerns related to the specific products or services mentioned or on surveillance, security, privacy, etc.

Saturday, July 04, 2015

Security Expert Reveals Major Vulnerabilities In Global Shipping Ports










Security Expert Reveals Major Vulnerabilities In Global Shipping Ports









The scheme sounds like a work of near science fiction. But police in the Netherlands and Belgium insist its true, and say they have the evidence to prove it: two tons of cocaine and heroin, a machine gun, a suitcase stuffed with $1.7 million, and hard drive cases turned into hacking devices.










The plot, which began in 2011, reportedly involved a mix of international drug gangs and digital henchmen: drug traffickers recruited hackers to penetrate computers that tracked and controlled the movement and location of shipping containers arriving at Antwerp's port. The simple software and hardware hacks—using USB keyloggers and more sophisticated purpose-built devices—allowed traffickers to send in drivers and gunmen to steal particular containers before the legitimate owner arrived.







The scheme was first noticed last year, when workers at a container terminal in Antwerp began to wonder why entire containers—said to contain cargo like bananas and timber—were disappearing from the port. In January, the plot appeared to culminate in a daring raid in the province of Limburg, near Antwerp.




A truck that had left the port and was unwittingly carrying containers stuffed with drugs was attacked by suspects armed with AK-47 assault rifles. According to police, the gang had assumed the driver, who was not killed, was from a rival drug gang.





In June, a joint operation by Belgian and Dutch police resulted in raids on more than 20 homes and businesses, where they seized six firearms, bullet-proof vests, and 1.3m euros in cash inside a suitcase. Fifteen people are now awaiting trial in Belgium and Holland, including two suspected hackers. Police did not say where the containers originated. 



PRO-DTECH II FREQUENCY DETECTOR
(Buy/Rent/Layaway)


"I'm really not surprised at these practices," said Jim Giermanski, a former FBI agent and chairman of Powers International, a transportation security technology company. "The reality is that most shippers don't have a clue as to what to do to secure a container" from tampering by smugglers and terrorists, who, Giermanski warns, could use them to conceal dirty bombs. 






The cyber attack began with simple social engineering: a spear phishing attack through emails that tricked employees into installing malware. The container companies discovered the initial breach and installed a firewall installed to prevent further attacks. But police say the suspects managed to get onto the physical premises to install key-logging devices directly onto the keyboards of computers, allowing them to gain wireless access to keystrokes typed by staff as well as screen grabs from their monitors.







The gangs also reportedly built their own hardware, concealing small homemade devices inside normal hard drive cases and power strips. These allowed them to access and remotely control data on the shipping companies' computers, and to gain security codes so drivers could pick up particular containers.








Shipping is only one among many infrastructures now subject to hacking. Security holes in the computer systems that manage everything from phone systems to energy facilities are now in high demand, among both criminal gangs and state-sponsored cyber squadrons.







"We have effectively a service-orientated industry where organized crime groups are paying for specialist hacking skills that they can acquire online," the director of Europol, Rob Wainwright, told the BBC. The cyber and real-world attacks are consistent with a "new business model" of organized crime activity, one he expects to "become a more significant feature in future" of drug trafficking. To fight attacks like this, Wainwright urges more "tech-savvy" police, as well as laws that help governments improve their surveillance of the internet. 






The drug smuggling enterprise is a font of homemade ingenuity. Mexican gangs have been known to use tunnels and catapults to send drugs over the border. In Columbia, traffickers rely on repurposed Russian submarines. Police inspecting shipping containers have found cocaine stolen away inside frozen sharks.





And until the FBI shut it down, the Silk Road—enabled by Tor, a US government project to provide internet anonymity to dissidents and other legitimate users—gave traffickers of all kinds the first international marketplace for drugs and other illegal substances






Shipping containers are thought to be integral to large drug smuggling operations. The iconic intermodal freight container was introduced in the 1950s as a way of standardizing the way goods are moved around the world. Rising in parallel with computers, containerization is how ninety percent of our stuff moves around the world everyday. But that scale—some 420 million containers are shipped annually—means that customs officials tend to inspect only around two percent of those shipments per year.





Estimates about the use of containers by smugglers are rough. But a report last year by the Stockholm International Peace Research Institute found that the ships unwittingly involved in the trafficking of drugs, guns and other substances, like those used in building WMD, are primarily commercial lines based in Germany, Greece and the US.


(Buy/Rent/Layaway)


"Containerization provides trafficking and proliferation networks with the same cost- and time-saving transport mechanisms that have allowed the world’s multinational companies to deliver their products quickly and cheaply, penetrate new markets and expand their global customer base," the report concluded.





"This doesn't mean the ship owners, or even the captains, know what they are carrying. But it is relatively easy for traffickers to hide arms and drugs in among legitimate cargos," said Hugh Griffiths, the report's co-author. The problem, he told Motherboard, "is one of the greatest security challenges of the 21st century and so far no solution is anywhere in sight."



Wireless Camera Finder
(Buy/Rent/Layaway)


After failing to meet a Congressional mandate to scan all shipping containers entering the US for nuclear materials, customs officials last year decided to table the idea because it was too complicated and expensive. Instead, ports in the US are using sophisticated high-energy imaging technology and radiological sensors only in certain cases—for instance, on containers that appear suspicious to inspectors, because of erroneous ship manifests. A more recent federal audit of an initiative by Customs and Border Protection to routinely check foreign ports found that the system has mostly failed. 





In one recent demonstration, a group of researchers using cheap radio equipment showed they could hijack a system used to track shipping vessels worldwide, causing fake vessels to appear, real ones to disappear, and to issue false emergency alerts. In another, GPS researchers proved they could hijack a ship's navigation system and actually steer it—a technique they've also used on drones





Simpler computer exploits of shipping systems have also been discovered. An investigation by Australian authorities last year revealed that drug gangs were able to use public databases to track which shipping containers in port were under inspection by police, allowing them to abandon those shipments.


(Buy/Rent/Layaway)




And the technique used in Belgium isnt't completely new either: in season two of The Wire, a drug gang in Baltimore hires dockworkers to alter the computer records of containers with drugs that have been planted inside. 






Your questions and comments are greatly appreciated.



Monty Henry, Owner














www.DPL-Surveillance-Equipment.com










































NOW, look in on your home, second home, lake house or office anytime, anywhere from any internet connected PC/Lap-top or Internet active cell phone, including iphone or PDA.

Watch your child's caregiver while sitting at a traffic light or lunch meeting, or check on your business security from the other side of the world. Our built-in hidden video features all digital transmissions providing a crystal clear image with zero interference. With the IP receiver stream your video over the internet through your router, and view on either a PC or smart phone. Designed exclusively for DPL-Surveillance-Equipment, these IP hidden wireless cameras come with multiple features to make the user's experience hassle-free.

NOW, look in on your home, second home, lake house or office anytime, anywhere from any internet connected PC/Lap-top or Internet active cell phone, including iphone or PDA: http://www.dpl-surveillance-equipment.com/wireless_hidden_cameras.html

Watch your child's caregiver while sitting at a traffic light or lunch meeting, or check on your business security from the other side of the world. Our built-in hidden video features all digital transmissions providing a crystal clear image with zero interference. With the IP receiver stream your video over the internet through your router, and view on either a PC or smart phone. Designed exclusively for DPL-Surveillance-Equipment, these IP hidden wireless cameras come with multiple features to make the user's experience hassle-free.

• Remote Video Access

• Video is Recorded Locally To An Installed SD Card (2GB SD Card included)

• Email Notifications (Motion Alerts, Camera Failure, IP Address Change, SD Card Full)

• Live Monitoring, Recording And Event Playback Via Internet

• Back-up SD Storage Up To 32GB (SD Not Included)

• Digital Wireless Transmission (No Camera Interference)

• View LIVE On Your SmartPhone!

Includes:

* Nanny Cameras w/ Remote View
* Wireless IP Receiver
* Remote Control
* A/C Adaptor
* 2GB SD Card
* USB Receiver



FACT SHEET:  HIDDEN NANNY-SPY (VIEW VIA THE INTERNET) CAMERAS

Specifications:

Receiver Specs:

* Transmission Range of 500 ft Line Of Sight
* Uses 53 Channels Resulting In No Interference
* 12V Power Consumption
* RCA Output
* Supports up to 32gig SD

Camera Specs:

* 640x480 / 320x240 up to 30fps
* Image Sensor: 1/4" Micron Sensor
* Resolution: 720x480 Pixels
* S/N Ratio: 45 db
* Sensitivity: 11.5V/lux-s @ 550nm
* Video System: NTSC
* White Balance: Auto Tracking

Make Your Own Nanny Cameras:  Make Tons Of Money In A Booming, Nearly Recession-Proof Industry!


Your Primary Customers Include But Are Not Limited To Anyone In The Private Investigator, Government, Law Enforcement And/Or Intelligence Agencies Fields!

* You Buy Our DVR Boards And We'll Build Your Products! (Optional)

















Our New Layaway Plan Adds Convenience For Online Shoppers








DPL-Surveillance-Equipment's layaway plan makes it easy for you to buy the products and services that you want by paying for them through manageable monthly payments that you set. Our intuitive calculator allows you to break down your order's purchase price into smaller payment amounts. Payments can be automatically deducted from your bank account or made in cash using MoneyGram® ExpressPayment® Services and you will receive your order once it's paid in full. Use it to plan and budget for holiday purchases, anniversaries, birthdays, vacations and more!


DPL-Surveillance-Equipment's Customers can now use the convenience of layaway online to help them get through these tough economic times.

We all shop now and then just to face a hard reality -- big credit card bills. However, our latest financing innovation can help you avoid that. Find out why more and more shoppers are checking out DPL-Surveillance-Equipment's e-layaway plan.

If you're drooling over a new nanny camera, longing for a GPS tracker, or wishing for that spy watch, but you're strapped for cash and can't afford to do credit, do what Jennie Kheen did. She bought her iPod docking station (hidden camera w/motion-activated DVR) online using our convenient lay-away plan.

Our online layaway plan works like the old-fashioned service stores used to offer. But, in Kheen's case, she went to DPL-Surveillance-Equipment.com, found the iPod docking station (hidden camera w/motion-activated DVR), then set up a payment plan.

"It's automatically drawn from my account," she said. "I have a budget, $208.00 a month.

In three months, Kheen had paid off the $650.00 iPod docking station. She paid another 3.9 percent service fee, which amounted to about $25.35 (plus $12.00 for shipping) for a total of $687.35.

"You pay a little bit each month," Kheen said. "It's paid off when you get it and you don't have it lingering over your head. It's great."

Flexible payment terms and automated payments make our layaway plan an affordable and fiscally responsible alternative to credit cards.

1. Register:

It's quick, easy and FREE! No credit check required!

2. Shop:

Select the items or service you want and choose "e-layaway" as your payment option. Our payment calculator makes it easy for you to set up your payment terms.

3. Make Payments:

Payments are made on the schedule YOU set. Check your order status or adjust your payments online in a secure environment.

4. Receive Products:

Receive the product shortly after your last payment. The best part, it's paid in full... NO DEBT.

More Buying Power:

* Our lay-away plan offers a safe and affordable payment alternative without tying up your credit or subjecting the purchase to high-interest credit card fees.

No Credit Checks or Special Qualifications:

* Anyone 18 years old or older can join. All you need is an active bank account.

Freedom From Credit Cards:

* If you are near or beyond your credit limit or simply want to avoid high interest credit card fees, our e-layaway is the smart choice for you.

Flexible Payment Schedules:

* Similar to traditional layaway, e-layaway lets you make regular payments towards merchandise, with delivery upon payment in full. Payments are automatically deducted from your bank account or made in cash using MoneyGram® ExpressPayment®

A Tool for Planning Ahead:

* Our e-layaway makes it easy for smart shoppers like you to plan ahead and buy items such as bug detectors, nanny cameras, audio bugs, gps trackers, and more!

No Hidden Charges or Mounting Interest:

Our e-layaway makes shopping painless by eliminating hidden charges and monthly interest fees. Our customers pay a flat transaction fee on the initial purchase price.

NO RISK:

* You have the right to cancel any purchase and will receive a refund less a cancellation fee. See website for details.

Security and Identity Protection:

DPL-Surveillance-Equipment has partnered with trusted experts like McAfee and IDology to ensure the security and integrity of every transaction. Identity verification measures are integrated into our e-layaway system to prevent fraudulent purchases.

Note: Simply Choose e-Lay-Away as a "Payment Option" in The Shopping Cart



DPL-Surveillance-Equipment.com is a world leader in providing surveillance and security products and services to Government, Law Enforcement, Private Investigators, small and large companies worldwide. We have one of the largest varieties of state-of-the-art surveillance and counter-surveillance equipment including Personal Protection and Bug Detection Products.



Buy, rent or lease the same state-of-the-art surveillance and security equipment Detectives, PI's, the CIA and FBI use. Take back control!



DPL-Surveillance-Equipment.com

Phone: (1888) 344-3742 Toll Free USA
Local: (818) 344-3742
Fax (775) 249-9320

Monty@DPL-Surveillance-Equipment.com


Google+ and Gmail
DPLSURVE


Twitter
DPLSURVE


MSN
 Monty@DPL-Surveillance-Equipment.com

AOL Instant Messenger
DPLSURVE32

Skype
Montyl32

Yahoo Instant Messenger
Montyi32

Alternate Email Address
montyi32@yahoo.com

Join my Yahoo Group!

My RSS Feed



Bookmark and Share

0 Comments:

Post a Comment

Note: Only a member of this blog may post a comment.

<< Home