Monday, March 31, 2008
Criminals involved in a massive data breach at the Hannaford Bros. and Sweetbay grocery chains stole the customer information from a part of a computer-network system that security experts had believed was secure.
As many as 4.2 million credit- and debit-card numbers were exposed in the breach.
The Hannaford data, which included customer account numbers and card expiration dates, was stolen between Dec. 7 and March 10. ...it has resulted in at least 1,800 cases of fraud.
A malicious software program, written by the thieves, intercepted the information as it went back and forth over a cable to a transaction processor in Denver. It was then transmitted to an Internet service provider somewhere outside the U.S. The software, known as malware, was planted on computer systems in every store in the two chains, the company says.
...it took a team of about 30 forensics experts and information technologists more than 10 days of round-the-clock troubleshooting to discover the malware. (more) (recent data theft list)
There are federal and state (all 50 and DC) statutes governing the use of electronic recording equipment. The unlawful use of recording equipment may not only give authority for civil proceedings against the perpetrator of illegal taping, but may also give rise to criminal charges.
Today’s Bulletin gets right into the meat of how and where the taping of private telephone conversations is allowed...
Interesting exceptions to the rules...
In California, generally an all party consent state, one party alone can record if criminal activity (e.g. extortion) is anticipated or involved.
In Arizona, the subscriber to a telephone service can record telephone conversations with no party consent when criminal activity is involved. (more)
A KeeLoq system consists of an active Radio Frequency Identification (RFID) transponders (e.g., embedded in a car key) and a receiver (e.g., embedded in the car door). Both the receiver and transponder use KeeLoq as encryption method for securing the over-the-air communication.
KeeLoq has been used for access control since the mid-1990s. By some estimates, it is the most popular of such systems in Europe and the US. Besides the frequent use of KeeLoq for garage door openers and other building access applications, it is also known that several automotive manufacturers like Toyota/Lexus (Chrysler, Daewoo, Fiat, GM, Honda, Volvo, VW, Clifford, Shurlok, Jaguar, etc.) base their anti-theft protection on assumed secure devices featuring KeeLoq.
(Hacker video explaining KeeLoq. Minutes: 36:18 - 41:35)
(How to Steal Cars - A Practical Attack on KeeLoq)
Sunday, March 30, 2008
"It’s a tough call knowing when to spy and when to trust. Though my own children, 4 and 7, are too young for me to be going through pockets looking for drugs, turning up mattresses looking for porno, etc., I plan on doing those things in their teen years.
In my own childhood, my parents were way too hands-off. Both of my brothers were doing serious drugs in high school and my parents didn’t find out until it was way too late. They wanted harmony in the house and took the path of least resistance. That meant my brothers were allowed privacy, didn’t have an enforced curfew, were given car keys before they could handle that responsibility. My parents prayed maturity would come soon.
With my own children, I’ve learned that I have to stay on top of things. On the computer, my son has tried to order things online. He even asked my mom for her credit card so he could buy a Ben 10 shirt. We’ve found that we need to set the rules for which Web sites he can look at. Anything not on the ‘Kids’ section of our Web browser’s bookmarks is off limits. Still, we walk by often while he’s online, and we remind him he needs to ask if it’s a new site." (more)
Many of the spy programs on the market are powerful, but aren't very sophisticated code, said Jarno Niemela, a senior antivirus researchers for Finnish security vendor F-Secure, which makes security products for PCs and mobile phones...
One of the latest tools on the market is Mobile SpySuite, which Niemela believes is the first spy tool generator for mobiles. It sells for US$12,500 and would let a hacker custom-build a spy tool aimed at several models of Nokia phones, Niemela said. (more)
They are hellbent on stealing scientific, military and industrial secrets in a bid to make China the world's No1 superpower. The spies are recruited from the 90,000 Chinese who visit Britain each year. Forty per cent of them are on business and a third are students.
A Whitehall source said: "They are told to hoover up everything they can get their hands on. "It can be anything from the results of university lab experiments to secret industrial technology." China's targets include banks, power and water companies, telecom firms and even Parliament.
But Foreign Secretary David Miliband fears any crackdown would upset China and jeopardise trade deals worth £20billion. (more)
Saturday, March 29, 2008
During the hearing, prosecutor Ian Kolvin produced the home-made spying device which consisted of a strip of wood with a broken piece of glass fastened to one end... "The defendant denied any sexual motivation," said Mr. Kolvin. (more)
Thursday, March 27, 2008
Wednesday, March 26, 2008
The acquisition notice asked companies to describe their capabilities in working with the following types of sensors:
• Overhead non-imaging radar.
• Synthetic aperture radar.
• Spectral detectors.
• Thermal infrared.
• Ground-moving target indicator forensics.
• Line-of-sight radar.
• Over-the-horizon radar.
• Airborne electro-optical sensors, known as Cobra Ball.
• Laser intelligence.
• Radio frequency MASINT.
Tektronix Inc., a provider of test, measurement and monitoring instrumentation, announced that Murray Associates, registered as Spybusters LLC, has selected a Tektronix Real-Time Spectrum Analyzer (RTSA) with DPX™ live RF display technology to help the security consultancy identify wireless eavesdropping devices that may be located in clients’ facilities including boardrooms and security trading floors. The RTSA instrument enables the firm to quickly and efficiently spot sophisticated listening devices, even in challenging environments where there are many competing signals.
Corporate espionage is on the rise due to such factors as globalization, decreased employee loyalty and the increasing value of information. In some parts of the world espionage is a common business practice in competitive industries. At the same time, new technologies are making it easier and more affordable than ever to steal information by tapping into private conversations. Given the potential reward, spies are employing increasingly sophisticated technology that can be difficult to detect.
To fight back against this espionage, companies as well as government agencies are turning to firms that specialize in detecting and removing eavesdropping and other surveillance devices. One of the leaders in the segment is Murray Associates. Based in Oldwick, New Jersey, the 30-year-old company, which is registered as Spybusters LLC, is seeing heightened demand for its services. The majority of the firm’s clients schedule regular inspections or sweeps for any form of electronic surveillance technology in sensitive areas such as executive suites, boardrooms, trading floors, vehicles and aircraft as well as executive homes and off-site meeting locations. (more)
Tuesday, March 25, 2008
In addition to privacy you can get anonymity, too. Vumber is like Kleenex, disposable. Change numbers whenever you want. Be in any Area Code you like.
"It’s your anyphone, anytime, anywhere phone number that keeps your identity private – until you decide it not to be.
A Vumber is a number from any area code you want, linked to your home, cell, or work phone. When someone calls your Vumber, Vumber lets you control how you handle the call: you can a) answer it; b) send them to VumberMail; c) give them a busy signal; d) tell them the number is out of service; or e) play them a custom message you create.
It provides unequaled privacy protection when anyone calls your Vumber, and when you call anyone. And it’s not limited to a pre-defined one-to-one calling relationship like you sometimes see out there – it is as simple as having another phone number. Even simpler.
You can call “from” your Vumber, too..." (more)
The flip side... Your Caller ID display is no longer trustworthy. But hey, it never was anyway.
A number of credit card companies now issue credit cards with embedded RFIDs (radio frequency ID tags), with promises of enhanced security and speedy transactions.
But on today's episode of Boing Boing tv, hacker and inventor Pablos Holman shows Xeni how you can use about $8 worth of gear bought on eBay to read personal data from those credit cards -- cardholder name, credit card number, and whatever else your bank embeds in this manner.
Fears over data leaks from RFID-enabled cards aren't new, and some argue they're overblown -- but this demo shows just how cheap and easy the "sniffing" can be.
Forget the tin foil hat.
Wrap it around your wallet and watch where you sit.
There may be an antenna under that chair.
A little research reveals that the top component is an old Ericsson radio-modem (M2050 Mobidem c.1996-97) made for the UK market (425-460 MHz). "a small low power radio modem that can be built into PC or other equipment. It has no power source of its own. It does not have its own antenna, which must be designed specifically for the host equipment. It has rated data transfer rates of 1200 to 9600 bps. It supports Mobitex MACS, AT and X.28 protocols."
According to a press release, "Ericsson has signed an order with Thorn Security Ltd., a leading provider of security services in the U.K. market, for 5,000 Mobidem M2050 radio modems to be used for the company's new Siteguard Smart Signaling alarm services. The new services will be available to Thorn's thousands of customers throughout the U.K. in mid-September.
With the announcement of its new Siteguard Smart Signaling alarm portfolio, Thorn Security has scored a first in the industry. The system uses a self-checking alarm signaling technique that provides intelligent mutual monitoring between wireless data links and landline communications at the customer site. This virtually eliminates line errors and guarantees that the alarm system is functional at all times."
The batteries are 4 "D" cells, rechargeable lead-acid type.
Given the age of the main component, identifying information was left on it (unusual for professional bugging devices) and that similar-looking auto alarm systems exist, its real purpose can be questioned. Is it a bug, or did someone buy a used car not knowing it was outfitted with an alarm system at one time?
Saturday, March 22, 2008
Friday, March 21, 2008
While the banks appear all but ready to blame Hannaford for failing to follow payment card industry standards on security, there are signs that this may be the first of many cases to surface this year wherein the affected retailer was hacked even though it appeared to be following all of the security rules laid out by the credit card associations. (more) (The List of the Zapped)
"First, it is said on 25 June 2006 the wife illegally bugged the husband's telephone, in particular a call between him and his daughter Stella in which Stella made very unflattering comments about the wife. It is further said the wife subsequently leaked the intercepted material to the press so as to discredit him."
On the bugging claim:
"Both the wife and the husband accuse each other of conducting a campaign of harassment and vilification. The reality is that if I let the husband deploy a case about bugging telephones together with subsequent release of them to the press, this will open up a can of worms and the litigation may inevitably snowball with claim and counter-claim."
A summary of Mr. Justice Bennett's judgment in the Paul McCartney - Heather Mills divorce case. (more)
Seduced by Secrets draws on secret files from the Stasi archives, including CIA-acquired material, interviews and friendships, court documents, and unusual visits to spy sites, including "breaking into" a prison, to demonstrate that the Stasi overestimated the power of secrets to solve problems and created an insular spy culture more intent on securing its power than protecting national security.
It recreates the Stasi's secret world of technology through biographies of agents, defectors, and officers and by visualizing James Bond–like techniques and gadgets.
In this highly original book, Kristie Macrakis adds a new dimension to our understanding of the East German Ministry for State Security by bringing the topic into the realm of espionage history and exiting the political domain. (more)
Thursday, March 20, 2008
Do you hear strange noises on your phone line?
Do you feel like your secrets aren't safe?
You're not as paranoid as you might think.
Mobsters and cheating spouses aren't the only ones that get wiretapped. In fact, just about anyone who possesses confidential information is a prime target for a wiretap, so it's important that you know the warning signs. Keep an eye out for these subtle clues to avoid becoming a victim of information theft.
1. Your secrets are out.
2. You hear strange noises, like clicking, static and humming.
3. Your phone makes noise on its own.
4. Your radio has strange interference.
5. Your environment just seems different.
6. Your outside phone box has extra hardware
7. You find a recording machine.
8. You're being blackmailed.
9. Your receiver has extra hardware.
10. You notice a lot of utility trucks near the premise
11. Your TV has interference.
12. You are the victim of a burglary, but nothing was stolen.
13. Your wall plates are moved.
14. You've had a mysterious repair.
15. There are no signs.
16. Your phone company doesn't help.
17. You use a cordless phone.
(The Private Citizen's Guide to Detecting Amateur Wiretaps)
Ilya Zaslavsky is a manager at the TNK-BP oil joint venture, his brother Alexander head of the British Council's Moscow Alumni club. The two, who have joint US and Russian citizenship, were gathering classified data for foreign firms, the FSB said.The Moscow offices of the British oil giant were raided by the authorities on Wednesday.
Russia's security agency, the FSB, has confirmed that the raids were related to the Zaslavsky case.
"During the raid, material proof confirming the industrial espionage was found and confiscated," it said in a statement.
This included business cards of foreign military agencies and the CIA, it said. (more)
Ilya had the other "CIA" Card
Wednesday, March 19, 2008
Now Zimmermann, the CEO of PGP Corp., has found himself back in the fiery debate between federal investigators and those who oppose their snooping--this time thanks to ZRTP, a technology for encrypting Internet telephone calls. ZRTP throws a wrench in the Bush administration's controversial warrant-free wiretapping program and its proposed legal immunity for the telecommunications companies. So far, not even teams of supercomputers and cyberspies at the National Security Agency have cracked ZRTP. That means anyone who uses Zimmermann's Zfone software, a ZRTP-enabled voice over Internet Protocol (VoIP) program available for free on his Web site, can skirt the feds' wiretapping altogether.
Forbes.com spoke with Zimmermann about how his small company has been able to produce an encryption product that not even the U.S. government can break, what ZRTP means for national security, and why cutting off the government's access to our phones is necessary to keep out the truly malicious spies. (more)
An end to wiretapping woes.
Come on. What more do you want from me?
The least you could do is send me some M&M's. :)
Tuesday, March 18, 2008
British expat Murat, 33, found the GPS bug when he was fixing a fault on his VW Transporter. He checked girlfriend Michaela Walczuch's motor and found - another stuck to that.
Furious Murat believes Portuguese police bugged his cars in a desperate bid to nail him for the abduction of Madeleine, four, from Praia da Luz in May.
He is also probing whether Kate and Gerry McCann's private detective agency Metodo 3 could have done it on its own initiative.
His lawyer Francisco Pagarete said last night: "I'm not yet sure what kind of crime we're dealing with here." (more)
Monday, March 17, 2008
The US Army has awarded the [University of] Michigan (UM) $10m to carry out research leading to a "six-inch robotic spy plane modeled after a bat", which would "gather data from sights, sounds and smells". The university has used the Army cash to found a Centre for Objective Microelectronics and Biomimetic Advanced Technology, or COM-BAT...
The unit will have the ability to tiny cameras for stereo vision, an array of mini microphones that could home in on sounds from different directions, and small detectors for nuclear radiation and poisonous gases. Low-power miniaturized radar and a very sensitive navigation system would help the bat find its way at night. Energy scavenging from solar, wind, vibration and other sources like hanging upside down from power cables would recharge the bat's lithium battery. The aircraft would use radio to send signals back to troops.
And that's not all. It seems "the bat" might "perch at a street corner or building for longer assignments and send back reports of activity" - a capability which might be referred to, we suggest, as "gargoyle mode". (more)
Sunday, March 16, 2008
Not only would Britney's medical files give them the answers to some closely guarded secrets, but a photocopied page could sell to the tabloids for thousands. (more) Hip, HIPPA, Hooray
UK - Detailed top-secret plans of MI5's fortress HQ have been sensationally handed to News of the World.
The lost 66-page dossier of floor layouts—once used by trusted contractors at the high-security Central London base—would be gold dust to terrorists.
The plans were given to us by a worried member of the public, who got them from a friend who worked at the building and never handed them back.
Our source said: "It's shocking that such high-level paperwork is out of MI5's control. These are many possibilities once a terrorist has detailed information like this."
The drawings, which we have blurred to protect national security [and are no longer shown], detail 11 of the 13 floors at Thames House—the real-life HQ well-known on the outside to viewers of TV's Spooks.
They reveal lift shafts, ventilation pipes and other places perfect for hiding BOMBS and spy TRANSMITTERS. They also show where the fibre optic cables are that transfer electronic data— a godsend for COMPUTER HACKERS. (more)
By Julian Sanchez
As the battle over reforms to the Foreign Intelligence Surveillance Act rages in Congress, civil libertarians warn that legislation sought by the White House could enable spying on "ordinary Americans." Others, like Sen. Orrin Hatch (R-Utah), counter that only those with an "irrational fear of government" believe that "our country's intelligence analysts are more concerned with random innocent Americans than foreign terrorists overseas."
But focusing on the privacy of the average Joe in this way obscures the deeper threat that warrantless wiretaps poses to a democratic society. Without meaningful oversight, presidents and intelligence agencies can -- and repeatedly have -- abused their surveillance authority to spy on political enemies and dissenters.
...for decades, intelligence analysts -- and the presidents they served -- had spied on the letters and phone conversations of union chiefs, civil rights leaders, journalists, antiwar activists, lobbyists, members of Congress, Supreme Court justices -- even Eleanor Roosevelt...
...Political abuse of electronic surveillance goes back at least as far as the Teapot Dome scandal that roiled the Warren G. Harding administration in the early 1920s. ...
In 1945, Harry Truman had the FBI wiretap Thomas Corcoran...
...John F. Kennedy's attorney general, brother Bobby, authorized wiretaps on lobbyists, Agriculture Department officials and even a congressman's secretary...
...Lyndon Johnson found the tactic useful when he wanted to know what promises then-candidate Richard Nixon might be making to our allies in South Vietnam...
...Johnson famously heard recordings of King's conversations and personal liaisons with various women. Less well known is that he received wiretap reports on King's strategy conferences with other civil rights leaders...
...Few presidents were quite as brazen as Nixon, whom the Church Committee found had "authorized a program of wiretaps which produced for the White House purely political or personal information unrelated to national security."...
...It's probably true that ordinary citizens uninvolved in political activism have little reason to fear being spied on, just as most Americans seldom need to invoke their 1st Amendment right to freedom of speech. But...
...if you think an executive branch unchecked by courts won't turn its "national security" surveillance powers to political ends -- well, it would be a first.
Julian Sanchez is a Washington writer who studies privacy and surveillance. (more)
Saturday, March 15, 2008
If your significant other or family member has ever plotted to listen in on your calls, even check your records or download spying software on your phone, we want to hear from you.
GMA is looking for guests who can talk about their experience with cell phone spying. Fill out the info below and you might just end up on GMA. (more)
Calvin Edward Hullett was indicted on bribery, misappropriation of union funds and other charges.
Investigators have alleged the hidden cameras were placed at the Wilson County camp in an effort to discredit the FOP by catching officers engaged in some type of misconduct.
Hullett, a national organizer for the Teamsters, is accused of using union funds to purchase the surveillance and recording equipment. (more with video)
“Data Security Policies Are Not Enforced,” a survey of 893 corporate IT workers, examined the risks associated with storing and transporting sensitive information and looked at how well companies are implementing and enforcing policies to protect against this risk.
1. Copying confidential information onto a USB memory stick.
2. Accessing web-based e-mail accounts from a workplace computer.
3. Losing a portable data-bearing device.
4. Downloading personal software onto a company computer.
5. Sending workplace documents as an attachment in e-mail.
6. Disabling security and firewall settings.
7. Sharing passwords with co-workers.
"The FAA badge is probably of all the badges just as dangerous if not more so than any other," aviation expert Denny Kelly said.
Kelly, a former commercial pilot and a private investigator, said the badge can give a person free access to nearly every secure area of an airport.
"The FAA badge allows you not only on one airline, plus getting through security, it allows you to get on any airline, any airplane, anyplace," he said. (more) Photo is not representative of stolen ID.
Juju Security... What "badge" can give someone unfettered access to your business - to plant bugs and steal proprietary information, for example? Can you account for all of yours? Is a security amulet really the best solution? Other solutions... 1 2 3
Update: Possible motive for badge theft uncovered!
Special Offer for FAA Employees only...
Located in the Holiday Inn Airport, 2101 S. Meridian is offering FAA employees a 15% discount on their ALL-YOU CAN EAT Lunch Buffet. Just show your ID badge for discount.
Regular price is $9.95 + tax and includes: 21 item salad bar, soup, 2-3 hot entrees, veggies, rolls, dessert bar and drink. Menu selection varies from Bar-B-Q to Italian to Hors Devours.
Lunch hours are 11 a.m. to 2 p.m. on the dates indicated on the calendar.
Call the Holiday Inn at 685-4000 for more information. (more)
Thursday, March 13, 2008
This type of card is used for the Dutch 'ov-chipkaart' [the RFID card for public transport throughout the Netherlands] and public transport systems in other countries (for instance the subway in London and Hong Kong). Mifare cards are also widely used as company cards to control access to buildings and facilities. All this means that the flaw has a broad impact. Because some cards can be cloned, it is in principle possible to access buildings and facilities with a stolen identity. This has been demonstrated on an actual system. (more)
A team of respected security researchers known for their work hacking RFID radio chips have turned their attention to pacemakers and implantable cardiac defibrillators.
The researchers will present their paper, "Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses," during the "Attacks" session of the 2008 IEEE Symposium on Security and Privacy, one of the most prestigious conferences for the computer security field...
By reading between the lines (millions of remotely implanted medical devices, able to administer electrical shocks to the heart, can be controlled remotely from distances up to 5 feet, designed by people who know nothing about security), it is easy to predict the gigantic media storm that this paper will cause when the full details (and a YouTube video of a demo, no doubt) are made public. (more)
Philippines - A military agent who claimed taping the conversations of President Arroyo and a former poll official in 2004 is facing a bigamy suit in a Quezon City court.
Arlene Sernal filed a complaint against her husband Vidal Doble, a former technical sergeant in the Intelligence Service of the Armed Forces of the Philippines before the sala of Regional Trial Court Judge Rosa Samson Tatad of Branch 105. (more)
This old-time operator is a $500-a-day man. "Plus expenses." No matter that there may be millions at stake, that's his price.
"I'm cheap," he says. (more) He is also [your thought here].
Tuesday, March 11, 2008
"Corporate espionage is big business. According to the FBI, such theft costs all U.S. companies between $24 billion and $100 billion annually. Interestingly, only about 20 percent of those losses are tied to cyber threats while the majority of them are associated with low-tech schemes such as unlawfully entering open offices." (more)
Eavesdropping, and low-tech espionage tricks, precede cyber-threats. They are also the easiest to spot. Discover the eavesdropping and espionage attacks and the cyber-threats die of starvation. The security secret... You have to look, to discover – on a regular basis. Start your schedule of detection audits, today.
The suit further alleges that district officials listened in on the conversation in retaliation for Coleman’s pursuing her son’s legal rights and to gain an advantage in the negotiations. (more)
These sites keep track of it all...
Havari Information Service - AlertMap
USDA Active Fire Map
Illegal Alien Activity Tracking System
PetFlight Airport Incident Map
Real-Time Earthquate Map
Disaster Resource Network
For all intents and purposes most everyone including the GSMA—an organization representing most of the mobile phone operators—considered and still considers GSM very secure. In reality A5/1, the technology used to encrypt GSM communications has been vulnerable for at least a decade. The sense of security seems to be based on the fact that the original attack venues require a great deal of computing power, time, and therefore money to accomplish the crack. So an organization would have to be particularly motivated to even want to crack GSM traffic. Care to guess who has enough motivation?
It appears that researchers David Hulton and Steve Miller have recently developed techniques to greatly reduce the time and required computing power needed to crack A5/1 encryption. The two researchers have even patented their work personally. The efficient modifications of the original crack open all sorts of doors making it easier for both black and white hat types to decode GSM conversations. (more)
On April 4, 2008, an Academy Award®-winning filmmaker and the world's greatest rock n' roll band will unite to bring audiences the year's most extraordinary musical film event, "Shine a Light," to theaters everywhere.
Martin Scorsese's concert documentary "Shine a Light" will show the world the Rolling Stones as they've never been seen before. Filming at the famed Beacon Theatre in New York City in fall 2006, Scorsese assembled a legendary team of cinematographers to capture the raw energy of the legendary band. (more) (review)
Monday, March 10, 2008
Sources told the Daily News that Herm Edwards, then the Jets head coach, and his defensive coordinator Donnie Henderson not only noticed a camera aimed at them from the opposite sideline during a game between the Jets and Patriots, but they waved at it. (Does this constitute consent?)
The News' report also said the videotape was apparently one of six tapes Belichick turned over to the league that were subsequently destroyed by the order of NFL commissioner Roger Goodell. (more)
But spying has always existed in football and other professional sports. A marvelous book, "The Echoing Green," documents how the 1951 New York Giants utilized a telescope to steal opposing catchers' signs — and relay them to the batters.
Papa Bear George Halas, it has been claimed, paid young men to listen to and film other teams' practices. The old Kansas City Chiefs were accused of being the worst spying offenders — by Al Davis, who was accused of bugging AFL teams' locker rooms. The Broncos purportedly had two spies a long time ago at a San Diego workout, writing plays on the inside of paper cups.
A former NFL coach told me at the recent Super Bowl in Arizona that his team cheated regularly. "We did everything you can imagine to get information on the teams we were playing. The more technology, the easier you can get stuff. It's common in the league," he said.
Belichick was caught.
Now, Congress is involved. (more)
"The weed of crime bears bitter fruit..."
Sunday, March 9, 2008
The online catalogs have names like Spy World, Spy Source and even Spy Zilla. The wonderful and disturbing new world of spy gadgets offers obscure, often expensive devices -- available in most cases to anyone with a credit card.
Most spy gadgets should be and could be used for legal and ethical purposes -- but you know they probably won't be.
Hidden cameras, secret microphones, GPS tracking devices, telephone voice changers, camera and microphone detectors, computer and cell phone snooping devices, cell phone and Wi-Fi "jammers" -- spy gadgets are sold vaguely and euphemistically as "security" or "surveillance" products. But you can bet they're popular with perverts, snooping bosses, suspicious spouses, cheaters, blackmailers, criminals and terrorists.
Nobody monitors who buys this stuff or what they use it for... (much more)
Smart businesses regularly conduct eavesdropping detection inspections. If you're not looking, you're not finding. Call us.
The Defense Advanced Research Projects Agency (DARPA) will award contracts to design and build an unmanned spy plane they've dreamed up that will stay aloft for for an amazing five years. The pseudo satellite will circle the globe for years at between 60,000 and 90,000 feet, gathering photos, communications, and generally watching everything you do. (more)
New for 2008! eBlaster 6.0
eBlaster has been the standard in remote monitoring software for parents and employers for almost a decade. It's time for a real innovative change, and we have some very exciting news.
Blaster 6.0 is now available, and we have added features we believe you're really going to like. Now, you have the ability to change options and settings remotely without having to return to the computer on which eBlaster is installed.
What Else is New in eBlaster 6.0?
NEW! Block Web Sites
-- Block inappropriate web sites by name immediately...
NEW! Block Chat/IM Contacts
-- Block all chat and instant messaging with specific people...
NEW! Online Searches
-- records searches made on Google, AOL, MSN, and Yahoo...
NEW! Screen Snapshots with Keyword Alerts
-- Now you can actually see EXACTLY what they saw...
NEW! MySpace Activity
-- All activity on the popular but potentially dangerous MySpace site...
When was the last time you checked your computer for spyware?
Inspired by Thomas Easton's 1990 novel, Sparrowhawk, in which animals enlarged by genetic engineering were fitted with implanted control systems, the Defence Advanced Research Projects Agency (DARPA) set out to insert microsystems into living insects as they undergo metamorphosis.
The plan is that their organs will grow around the chips and wires that make up the remote-control devices. (more)
Friday, March 7, 2008
The microdrone can film from more than 350ft away and beams back live video footage to operators on the ground.
If needed, the little helicopter can even swoop down and squirt offenders with a security marking solution called SmartWater which can be identified by police. (more)
Geragos filed a lawsuit suit against XtraJet claiming the company violated Jackson's right to privacy by videotaping their Nov. 2003 flight from Las Vegas to Santa Barbara, where the King of Pop was to surrender to child molestation charges. XtraJet's former owner Jeffrey Borer tried to sell those tapes to the media.
The judge awarded Geragos and an associate lawyer $2 million in compensatory damages and $8 million in punitive damages, according to TMZ.
Geragos called the taping "one of the most outrageous acts I've seen in my 20 years of practicing criminal law." (more)
But he bragged about it so much — and recorded himself doing so — that Mr. Pellicano “was the biggest government informant in this case,” the prosecutor, Kevin Lally, said Thursday.
Mr. Pellicano, 63, who is defending himself against wiretapping and racketeering charges, denied nothing in his opening remarks, saying that his business was “problem solving,” and that customers in the entertainment industry paid him well because they knew he would “perform” for them. He stressed only that he never intended their secrets to become public. (more)
Sounds like it should be easy, but consider, "modern" record players won't play at 78rpm.
Now you know why Mike is the Ace.
...big corporations are still conscious about securing the workplace against foreign ears. “Whenever you’re in competition it means someone isn’t going to play the game fairly,” says Murray. “Businesses are very proactive about detecting these types of devices.” Most corporations do inspections on a quarterly basis, “and it’s something you rarely hear about,” says Murray. After hours, a counterintelligence security team will come in and investigate the most sensitive areas of the company. According to Murray, it costs between $5,000 and $10,000 to inspect eight to ten executive offices and a boardroom. (more)
Thursday, March 6, 2008
The SwissMiniGun is the size of a key fob but fires tiny 270mph bullets powerful enough to kill at close range.
Officially the world's smallest working revolver, the gun is being marketed as a collector's item and measures just 2.16 inches long (5.5cm). It can fire real 4.53 bullets up to a range of 367ft (112m). (more)
The Attorney-General, Michael Atkinson, wants to crack down on modern-day peeping toms using mobile phones to capture images of people without permission.
"We're also concerned with indecent filming, filming people going to the lavatory, filming people engaged in private acts, namely sexual acts, that occur only in private," he said.
"The Rann Government is keen to protect peoples' privacy from modern-day peeping toms, the raincoat brigade and some of the more extreme elements of the paparazzi. (more)
Actors Sylvester Stallone, Keith Carradine and Farrah Fawcett, along with movie studio executives Brad Grey and Ron Meyer and former powerhouse talent agent Michael Ovitz, are among the 120 prosecution witnesses called to testify in a case that has kept Hollywood on tenterhooks for almost six years.
Pellicano, 63, is accused of illegally wiretapping the telephones of opponents of his powerful clients and of bribing police officers and telephone company workers to run illegal background checks on the targets of his investigation.
Pellicano is representing himself at his trial and has pleaded not guilty, along with his four co-defendants, to the 111 federal charges they face together. The trial in Los Angeles federal court is expected to last up to 10 weeks. (more)
Scientists have developed a way of ‘decoding’ someone’s brain activity to determine what they are looking at.
“The problem is analogous to the classic ‘pick a card, any card’ magic trick,” says Jack Gallant, a neuroscientist at the University of California in Berkeley, who led the study. But while a magician uses a ploy to pretend to ‘read the mind’ of the subject staring at a card, now researchers can do it for real using brain-scanning instruments. “When the deck of cards, or photographs, has about 120 images, we can do better than 90% correct,” says Gallant. (more)
Josh_Wright: "Enterprises are doing ... better. We are seeing fewer open networks and more organizations moving to WPA/WPA2 from WEP. There is still more than a fair share of WEP networks, sometimes motivated by the need to support legacy wireless clients (such as VoIP phones, or Symbol scanners). A lot of the enterprises I talk to feel comfortable with the security of their WPA/WPA2 networks, but they often fail to realize that this is only one piece of a wireless security strategy. Failure to address client configuration and security issues, rogue detection and home/mobile users leaves organizations exposed to attack. (more)
When did you last check the security of your wireless network?
Idea... Have us preform an on-site wireless LAN security survey.
Wednesday, March 5, 2008
More than 58 percent of the 304 companies surveyed said they'd fired workers for misusing company-provided e-mail accounts or improper use of the Internet on a company computer. A much smaller portion, 6 percent, said they had terminated an employee for inappropriate use of a company phone or voice mail. (more)
ST. GEORGE`S, Grenada, The main opposition political party in Grenada is demanding an independent investigation by Scotland Yard into the circumstances surrounding the alleged secret recording of an executive meeting by a member of the Royal Grenada Police Force.
Party officials apprehended Officer No# 77 Kellon Noel on Tuesday evening around 7 p.m. as he allegedly video and audio taped the meeting, which was being held at the party’s headquarters in St George’s.
Dressed in plain clothes, the officer who is attached to the Special Branch Unit, was apparently in an abandoned building adjacent to the NDC headquarters when party members say they noticed a flashing red light next to a window and rushed to investigate. They claim they found Noel with the recording equipment hastily exiting from the building. They surrounded, questioned and searched him, they said, and during the probe his police identification card was among the documents found in his pocket. (more) (more)
The survey showed that the younger they are, the more jealous people tend to be: Some 56% of 18- to 29-year olds said they would seize the opportunity to snoop, compared to 45% of people aged 41 to 50. People older than that are either more secure or don’t care anymore. Only one-fifth of people 51 to 60 wanted to know where their mates were at every moment. (more)
The $10 billion New York-based hedge fund, run by Paul Singer, filed suit today against Cedar Hill Capital Partners alleging it of scheming to “literally steal the software in order to use it for its own trading activities,” branding the activity “nothing short of an overt act of corporate espionage.” (more)
Gilbert Peterson and colleagues at the Air Force Institute of Technology at Wright Patterson AFB, in Ohio are developing technology that could help any organization sniff out insider threats by analyzing email activity or find individuals among potentially tens of thousands of employees with latent interests in sensitive topics. The same technology might also be used to spot individuals who feel alienated within the organization as well as unraveling any worrying changes in their social network interactions. (more)
Comments from secret sources who KNOW...
"Could not read any more information than I could with SIMCon or SIM Seizure. Save your money." - S.H.
"Interesting marketing strategy, but the statement on their website that "This is the only SIM Card reader in the world that can actually see the *deleted messages*" is completely false. It is certainly not the _only_ product. You can do the same thing with any SIM/smartcard reader and a copy of Smartcard Commander (manually) or many other SIM analysis packages do it automagically (such as SIM Analyzer Pro), and it will cost you less than half of what Brickhouse is charging for this product. Deleted SMS's are very very simple to recover, as only one byte of the SMS entry changes to mark it as "deleted." Recovery of SMS from the SIM will depend on whether the phone stores SMS (and the other data this product claims to recover) on the SIM card or on the phone itself. Not all GSM phones store SMS/phonebook/etc to the SIM, and it can be a user-defined option where to store the data. Also, a typical SIM card may only hold a maximum of 30 SMS messages." - P.K.
Sunday, March 2, 2008
(from Jan. 9, 2008)
"WikiLeaks.org is developing an uncensorable version of WikiPedia for untraceable mass document leaking and analysis."
Every coin has it light side and dark side.
The flip side of this coin is extortionography.
"What is Extortionography?"
Using audio / video / photographic or other evidence for personal or monetary gain, or to force a desired result or outcome.
"Do [insert demand here] or I will send [insert audio, video or other info-leak here] to WikiLeaks!"
(from Feb. 20, 2008)
Recent days have brought two federal court decisions with disputed First Amendment legitimacy.
In San Francisco, District Judge Jeffrey White acceded to a request by a Cayman Islands bank to shut access to the Web site Wikileaks.org, which "invites people to post leaked materials with the goal of discouraging 'unethical behavior' by corporations and governments," as the New York Times reports.
In this case, the bank, Julius Baer Bank and Trust, accused "a disgruntled ex-employee" of giving stolen documents to Wikileaks in violation of banking laws and a confidentiality agreement. (more)
Free speech advocates immediately hailed as a victory the decision on Friday of a federal judge to withdraw a prior order turning off the Web address of the site Wikileaks.org ...
“Maybe that’s just the reality of the world that we live in,” Judge White said. “When this genie gets out of the bottle, that’s it.” (more)
"What does this mean to me?," you ask yourself.
- The court has given extortionography the green light for now.
- Don't assume your business information is protected from leakers.
- Reassess your information security procedures, today.
- The most damning leaks are always the audio and visual leaks.
- Conduct eavesdropping and spycam detection audits frequently.
Need help? Call us.