INVESTIGATORS & SECURITY CONSULTANTS

Blog

Anti-Counterfeiting – More Crucial Than You Might Imagine!

The impact of counterfeiting on consumers and legitimate businesses is well illustrated in an short article on LinkedIn Pulse by David Howell, a brand protection and anti-counterfeiting expert.  Although it is written from a U.S. perspective his comments are universal as counterfeiting is a worldwide problem that affects all of us.

AAEAAQAAAAAAAAKIAAAAJGM5ZGExM2MzLWJhNzgtNDIyMy1hOTQ2LWVlYTBjMTQ5MGNhZQDavid explains that counterfeits don’t just affect high end consumer products.  Virtually everything we buy and use can be faked, with knock-on effects to organised crime, employment and health.  If you want to gain an insight into counterfeiting and what can be done to counter this ever growing threat then this article is for you.

https://www.linkedin.com/pulse/hot-topic-anti-counterfeiting-more-crucial-than-you-david-howell?trk=hp-feed-article-title-like

Property and Equipment Seized at London Counterfeiter’s Premises

Surelock, acting on behalf of TRAP and together with officers from Southwark Trading Standards and Police, raided Unit 13, Matara Mews, London SE17 3DW, the premises used by the prolific eBay seller “elgenuk2014” who had been selling numerous counterfeits of our clients’ brands.  All offending stock, screen printers and equipment were dismantled and seized.

 Surelock will assist Southwark TS put together an evidence package in order that a prosecution may be considered.

 SAM_1467

 

Controlling and Protecting Company Data in a Mobile World

In this increasingly data-driven world, corporate security is more important than ever before. This concept is even more prevalent with the rise of the modern smartphone. Although these devices are quite convenient, the chances of proprietary information becoming lost, corrupted or stolen have dramatically increased. An employee could leave a company and no longer be authorised to view private data or a phone may be lost and fall into the hands of criminals and similar fraudsters. Intellectual property theft is therefore a very real concern. When we combine these threats with ever-advancing mobile phone hacks, it becomes clear that powerful solutions need to be put in place. What are some of the latest systems designed to mitigate the risks of this data loss?

XenMobile

Like many other systems, XenMobile addresses the issue of mobile device management (MDM). Secure email, document sharing, cloud-based solutions and the ability to effectively wipe all data should a device be lost are some of the techniques that this software employs.

Symantec Mobility

This mobility suite offers protection at important data access points such as the device, the application and the data layers themselves. Proprietary systems help to ensure that threats such as malware, unauthorised viewing and leakage are adequately addressed. Another key benefit here is that company-centred applications can be located alongside personal apps; neither of which will interfere with the other.

Druva

Enterprise-grade security is a defining feature of the enterprise mobility systems provided by Drupa. Cloud-based storage is shielded from third-party eyes through the use of two-factor encryption. This will prevent any unauthorised individuals from viewing important data. Remote deletion capabilities as well as location monitoring can effectively deal with any threat as soon as it becomes known. All of these features are backed up with centralised monitoring; offering management and the end user superior levels of transparency.

IBM MobileFirst

IBM MobileFirst offers a number of security solutions which are based around the needs of the business. These include device security and content security. Furthermore, both applications and communications can be hidden from prying eyes thanks to robust levels of encryption alongside systems such as multi-factor authentication (amongst other methods).

ManageEngine

This company offers a framework known as Mobile Device Manager Plus. Permissions based upon the role of the employee, the ability to immediately wide remote data, geolocation tracking and the blocking of commercial applications while on company premises are a few mobile security solutions offered by ManageEngine.

The Critical Concept of Encryption

All of these systems share one thing in common. Each employs a proprietary encryption system to dissuade and prevent intellectual property theft from a mobile device. This is important, for many employees may use passwords that are considered to be rather weak. Should an employee copy data onto his or her phone and their PIN number be similarly vulnerable, fraud and theft are an even greater possibility. Whether accidentally or to view this data from the convenience of home with no bad intentions, the threat is just as real.

In these and other cases, encryption will always play an important role. Not only should peer-to-peer (P2P) encryption systems be used, but there can also be times when the data itself is encrypted. This will require another password in order to be viewed. Such a concept is an excellent redundant security feature and many systems will make use of multiple levels of encryption.

Increased Threats

Ultimately, mobile security and intellectual property theft are both growing concerns. Due to the sheer number of these devices and the presumption that their presence within the corporate world will continue to grow, companies should take these possibilities very seriously. What also should be mentioned is the rise of 4G connectivity. As this allows massive amounts of data to be downloaded, the potential of such information to be compromised obviously increases. Whether from the loss of a device or an intentional breach of traditional firewalls, more innovative solutions need to be put into place. The examples that we have seen are only a handful of the solutions that now exist. Still, their methods will continue to evolve alongside the threats that will likewise advance.

Mobile device management is an area that must be taken quite seriously by any company. Theft, fraud and data corruption can cost an enterprise untold amounts of money while placing their proprietary information in jeopardy. These solutions are effective ways to address and nullify such threats within real-world scenarios.
Surelock Global Investigators and Security Consultants are also well qualified (with a wealth of experience and knowledge) to provide advice in matters of corporate and personal security.

Government is Reviewing the Bribery Act

The Government is reviewing the Bribery Act after business leaders claimed it was making it difficult for British firms to export goods.

The Business Secretary, Sajid Javid, is inviting companies to comment on whether the tough anti-corruption measures are “a problem”.

Critics fear it is a way of weakening the law at a time when the Government should be clamping down on existing loopholes, and supporters of the Act say they are surprised by the move.

Letters sent by the Department for Business, Innovation and Skills (BIS) invite industry leaders to comment on whether the Act has had an impact on their attempts to export. They also ask if guidance issued to help business people avoid problems under the Act is useful and for suggestions to clarify the information. BIS officials said the guidance that accompanies the Act, rather than the law itself, was the main focus.

pg-1-bribery-3Following widespread international criticism of the UK’s failure to reform its ineffective anti-bribery laws, the Act was regarded as one of the most controversial laws passed by the last government.

The Coalition boasted it was the world’s “toughest” anti-corruption law. But the Confederation of British Industry led fierce criticism of the Bill and argued it would restrict economic growth.

Opponents continued to lobby against aspects of it after it passed into law in 2011. They claim UK law goes “above and beyond international standards” and puts British business at a disadvantage against their competitors.

But the anti-corruption campaigner Transparency International said that corporate lobbying appeared to be the basis for the review rather than evidence. It said that 89 per cent of companies surveyed in the Government’s own research, released earlier this month, reported that the Act  had no impact on their ability to export.  The activists point out that no one has yet been prosecuted for facilitation payments in the UK and that there is a low risk of prosecution.

But Neil Carberry, CBI director for employment and skills, welcomed the review.

“Bribery is morally and legally wrong and businesses have been supportive of the principles of the Act. With the majority of other countries’ rules more flexible than the UK’s, some businesses are being put at a competitive disadvantage when operating in global markets,” he said.

“That’s why we are pleased that the Government has decided to review the impact of the Act, which we’ve long been calling for. It should focus on how to tackle corruption while protecting the UK’s competitiveness.”

Full article: http://www.independent.co.uk/news/uk/politics/anticorruption-campaigners-furious-as-government-considers-softening-bribery-act-10425362.html?origin=internalSearch

 

10% of EU Clothing and Footwear Sales are Counterfeit

A new study by the Office for Harmonization in the Internal Market (OHIM) states that counterfeits account for nearly 10% of the total sales in the EU textile and clothing sector.  This equates to more that EUR26bn (US$28.8bn) and up to 363,000 jobs being lost per annum due to counterfeit clothes, shoes and accessories.

The European apparel and textile confederation Euratex is urging the EU to take action in the fight against counterfeiting and piracy by combating the problem both within the EU and by ensuring that imported counterfeit clothing are intercepted and perpetrators brought to justice.

Full article: http://www.just-style.com/news/fakes-take-10-of-eu-clothing-and-footwear-sales_id125841.aspx

 

 

Stay Safe: Three Simple Ways to Improve Your Personal Security

No matter where you live in the world there are potential threats to your home, to your personal security on the streets, and to your identity online. You only have to turn on the news or read the papers to see the increasing number of security issues the we face these days. However, a few simple adjustments can make all the difference to you and your family’s security. Read on for some simple yet highly effective preventative strategies that will help you to stay safe.

Protect Your Home

Home security is a serious issue as break-ins not only put your belongings at risk of theft, but they can also pose a safety risk for you and your family. An estimated 33% of burglars gain access to a property through the front door and 7% of all burglaries result in violent crime against someone who was in the home. Some simple measures will help to update the security of your home and make it less of a target to thieves. You can start by making sure that all windows and doors have a secure locking system. An alarm system along with CCTV cameras on the exterior of your property will further help to deter people from breaking in. You can also use security lights around the perimeter of your property. These security lights can be motion activated in order to illuminate the area as soon as someone comes within range.

Stay Safe Online

It’s important that you take measures to stay safe when using the Internet too. A study by CIFAS reported that of all recorded fraud cases, a massive 47% of those were some form of online identity fraud. You can stay safe online by avoiding giving out personal details like your address or birth date. Make sure that your personal social media pages, such as your Facebook are set to private so only close friends and family can see your personal updates and photographs. Ensure that your passwords are hard to hack by choosing a selection of letters and numbers and avoiding using simple passwords such as one word dictionary letters, names and places. It is also a good idea to have different passwords for different accounts so that if one does happen to be hacked the rest of your accounts remain secure.

Internet users should also be aware of phishing scams. These are where a fake email is sent asking for personal information such as pin codes, dates of birth or addresses. A bank will never ask for personal information via email. If in doubt, stay safe and contact the company who you think the email is from directly, and report the email to your service provider if necessary.

Be Street-Wise

Be street smart by choosing to walk in well-lit safe areas, and by avoiding walking in dark places alone at night. Keep valuables, particularity mobile phones and digital devices out of sight when walking alone, and be wary of keeping wallets and purses in your pocket in busy areas, as you could be easily pick pocketed. If you have concerns over your safety when travelling then it may also be worth taking self defence classes in order to better protect yourself should you be involved in an incident.

These are just a few of the many things that you can do in order to stay safe in your home, on the streets and online. Surelock are one of the leading companies in the personal and business security field. They provide a range of services including surveillance services and private investigation services in harassment, blackmail and kidnap and burglary, arson attacks and stalking cases. They also provide protection against violence training courses for your security needs.

A History of Locks and Security

Ever since the concept of ownership was established, locks have been around. Their history is fascinating, not only in terms of the evolution of the locking mechanism, but also in terms of the ways locks are implemented and their relationship to the different levels of security and the need to deter the variety of threats which have come about over the millennia.

Earliest Locks.
The earliest locks, designed with preventative security strategies in mind were developed in Assyria, 6,000 years ago. These were pin locks; a series of pins slot into holes on a bar across a door securing it. By Roman times the use of locked doors and strong boxes had become common place. Locks play a significant role, of course, in helping provide personal security and one has to be grateful for their significant advancement since these early Assyrian locks. Modern threats can not be averted via locking mechanisms alone and there is an increasing need for companies like Surelock to help advise on all round personal and corporate security.

Locks are only a small aspect of overall personal security, but nonetheless their advancement since these early Assyrian locks

Locks have come a long way since then. Although companies like Surelock are leaders in the provision of personal security and advice on security matters.

Basic mechanics.
Early locking devices were based on two simple mechanisms still used today:

• A series of pins that on application of a key rise from specially prepared housings, releasing the lock; or alternatively
• A bolt or bolts activated, on the turn of a key, by levers.

Warded locks common during the medieval period were of this type had become much smaller and were built into doors facilitating the use of keyholes.

Tumbler Locks.
1778 saw the invention of the first modern lever tumbler locks. In 1778, English locksmith, Robert Barron, improved the design with the introduction of a double acting lever tumbler lock which kept the bolt in place and ensured that the lever was lifted to the right height to address the bolt.

In the 1820s, Jeremiah Chubb took the lever tumbler lock a stage favour with his relocker; a feature which enabled the key holder to determine whether anyone had meddled with the lock. Lever tumbler locks eventually became known as Chubb locks, incorporating several levers of which the five lever varieties became a popular way of ensuring a good degree of home security and a foil against burglary. Home insurers invariably request these locks be fitted on external doors as a condition of insurance.

Pin Locks.
It was Linus Yale and his son, of the same name who in the mid 19th century improved the design of pin tumbler locks by introducing key pins of different sizes, each matching a particular cut in the key, and driver pins which prevented the plug, which by now was housed in a cylinder inside the frame of the lock into which the key was inserted, from rotating. The driver pins were kept in place and at the right height by springs.

In 1784 Joseph Bramha of Barnsley, England received a patent for his lock design culminating in his famous Challenge Lock, so called because he offered a 200 guinea prize to anyone who could pick it. Charles Hobbs an American locksmith did, though not without controversy, at the Great Exhibition of 1851.

Padlocks.
Padlocks are invariably metal with a U shaped shackle that locks into the device. Applying the key opens the shackle which can then be linked by a chain or hasp to the item to be secured. In an integrated padlock, rotating discs with groves cut into them connect with the shackle. In padlocks with a modular design the plug is set in the cylindrical housing which also has a “locking dog” pins that jut out from the shackle lock into the casing. In 1920 Harry Soref put this type of lock in general production using plates riveted together with a hole running tough the middle to house the cylindrical mechanism.

Cylinder Locks.
The Romans provide the earliest examples of cylindrical locks that use moveable discs with numbers on which when properly aligned release the locking mechanism. Today they are used to lock bikes, gym lockers and for personal security on hand luggage, laptops and other devices. In 1857 James Sargent designed a key changeable magnetic bank lock. He then went on to develop a time lock and in 1880 merged the two ideas to create the first lock that could be opened by combination but only at a certain time.

Sam Segal, was an American Police office who noticed that thieves tend to jemmy locks where a bolt fits into a housing but leave hinges alone. In 1912 he invented a hinged lock that bolted across an opening secured with a deadbolt. He then went on to invent a pick-proof cylinder lock.

Modern locks.
Lever activated mortise locks tend to be the favoured option for internal house doors and require housing in a door jamb opposite to the lock. Digital locks are common place on multi-occupancy buildings. Once the correct code is input a small electrical charge releases the mechanism. Smart locks can be operated from smart phones, specially designed and enabled key fobs or other devices that can signal using Wi-Fi. It is even possible to transfer the information required to open a smart lock via Wi-Fi to another person.

The future.
In 1936, the ophthalmologist, Frank Burch noted the uniqueness of each person’s iris. Since then technology first developed to facilitate biometric identification is now being used for locks. The person seeking entry simply looks into a glass plate and if the iris pattern is held on the system the door will unlock.

ABI meet with Information Commissioners Office

images

Roger Bescoby and Mark Hodgson, members of the Governing Council of the Association of British Investigators, met with senior Information Commissioner’s Office (ICO) personnel at the beginning of July in Wilmslow.

The ABI Governing Council have been conscious that the Association would benefit from more direct dialogue with the ICO, and indeed all other stake-holder Regulators. The meeting therefore took place at the request of the Association and was readily and immediately agreed to by the ICO, who were most receptive hosts.

The meeting proceeded in an open and candid manner. We were of course keen to receive and understand the current thoughts of our principal regulator and equally we found our hosts to be inquisitive, vocal and informative to the various discussion points raised during the session. The feeling generated was that the meeting was highly valuable in enhancing the reciprocal understanding between regulator and industry and that further and more regular contact would be beneficial.  It was also mutually agreed that such meetings can only result in the ICO having a deeper knowledge of the investigation industry sector than they do currently and not least its day-to-day challenges. It’s probably fair to say we detected some potential stereotype opinions still in existence but feel that the day gave us the opportunity to begin to effectively dispel these.

The session undoubtedly gave us the perfect platform to explain how the ABI is actively, demonstrably and energetically promoting compliance, best practice and training like never before in it’s 100+ year history.  It seemed that our efforts in this space were recognised and appreciated.

Much discussion centred around our members’ perpetual frustrations, primarily the lack of access to existing and collated information –  intelligence that is recognised as routinely vital to law enforcement agencies and yet denied to the sector who is actually undertaking the vast majority of such enquiries. Intel sources such as HM Land Registry and Credit Reference Agencies were of course high on the agenda.

We were able to inform a possibly unaware ICO contingent of just how little Police attention or assistance is currently received by our clients, be they Lawyers, Bankers or Insurers. It was explained that this is why they turn to the private sector in increasing numbers.

It was interesting to hear that the ICO themselves openly admit some Data Controllers simply and incorrectly quote the DPA as a reason not to provide information – often due to either ignorance, or fear of getting things wrong.

The meeting also gave us the opportunity to voice our wishes and indeed expectations that, post licensing, some additional regulatory leeway will be afforded towards the professionally-trained investigator. Not unreasonably, we argued, investigators simply request the tools to do the job that society expects to be done when fraud proliferates and the Law is to be upheld.

Both sides came away from the meeting with various and agreed action points, not least surrounding access to certain specific forms of information, which the ICO kindly agreed to look into further on our behalf.

We would like to take this opportunity to thank Alastair Barter and Garreth Cameron of the ICO for their kind hospitality on the day and look forward to further and more regular healthy consultation in the future.

http://www.theabi.org.uk/news/association-meet-with-information-commissioners-office

National Markets Group Launches Inaugural Awards for Tackling IP Crime

At the Chartered Institute of Trading Standards conference in Bournemouth last week (Wed 1 July 2015), Leon Livermore, CEO of the CTSI presented the inaugural National Markets Group Awards.

20150707_152939
Pictured (left to right): Sharon Penketh, National Trading Standards e-Crime Team ; Graham Mogg, Chair of the National Markets Group; Martin Harland and David Hunt of Camden Council Trading Standards.

The National Markets Group for IP Protection (NMG), which consists of representatives from industry, enforcement and government, works in partnership to reduce the availability of counterfeit and pirated goods at markets, car boot sales and social media platforms such as Facebook.

Recent initiatives coordinated by the NMG and its partners have set about tackling counterfeiting activity at these locations.

Team Award
Camden Council Trading Standards, which has initiated an holistic approach to reducing the level of counterfeiting activity at the five markets in the London borough, scooped the NMG’s Team Award.

In carrying out a number of raid actions, as well as awareness raising activities amongst consumers and market operators, this partnership with the NMG and the market operator has seen a transformation of the Camden market place and made it a safer and more equitable trading environment for consumers and local businesses.

Individual Award
The Individual Award was presented to Sharon Penketh of the National Trading Standards e-Crime Team for her coordination of the recent Facebook initiative OP JASPER, which saw NMG members partnering with over 60 Local Trading Standards Authorities to tackle the threat from the sale of counterfeit and pirated goods on the social media platform.

The month-long operation saw the removal from Facebook of over 4500 images of counterfeit goods and led to 25 active investigations against traders selling an array of counterfeit goods consumers.

Association Award
The National Association of British Market Authorities (NABMA) was chosen by the NMG to receive its 2015 Association Award with special recognition to its Chief Executive, Graham Wilson OBE, for his long standing support and promotion of the Real Deal initiative, which sees market operators and Trading Standards departments working together, through a voluntary charter, to ensure that markets are kept free from counterfeit goods. The Award will be formally presented to Graham Wilson at the NABMA National Conference in September.

Martin Harland, Principal Officer at Camden Trading Standards said: “For Camden Trading Standards to win two team ‘inaugural’ awards for our IP enforcement work from NMG and ACG is fantastic news. With the addition of team member David Hunt’s individual ‘highly commended’ award, they are very well received in recognition of our new successful working partnership with the ACG and the National Markets Group. This new way of working is now having an effect on the supply of counterfeit goods in the borough’s markets and shops which can only improve the local economy in the borough for business as well as for residents and visitors. It is a terrifically tremendous morale booster for a small team of four officers.”

Mike Andrews, National Coordinator, National Trading Standards e-Crime Team said: “The National Trading Standards eCrime Team, working with our partners in the National Markets Group, are taking a robust stance on criminals who exploit social media to sell counterfeit and dangerous products. We are delighted that Sharon’s hard work has been recognised by the Group. Sharon has demonstrated a high degree of professionalism and diligence and fully deserves this award.”

Graham Wilson, Chief Executive of NABMA said: “NABMA is delighted to support the Real Deal campaign and I hope our partnership working will continue into the future.”

Graham Mogg, Chair of the NMG said: “Since its inception in 2008, the NMG and the Real Deal campaign have been at the forefront of the battle to reduce the availability of counterfeit and pirated goods in the market place. We are proud of our achievements and even more delighted that we have been able to recognise the outstanding contribution of the award winners in this way.”

For full article: http://www.realdealmarkets.co.uk/real-deal-news/national-markets-group-launches-inaugural-awards-to-recognise-achievements-in-tackling-ip-crime/

For more information, go to www.realdealmarkets.co.uk