A device the size of a quarter that can be installed in 60 seconds on a proximity card reader could potentially be used to break physical access controls in 80 percent of deployments.
The device, dubbed BLEKey, is used to read cleartext data sent from card readers to door controllers to either clone cards or feed that data to a mobile application that can be used to unlock doors at any number of installations.
The hack unveiled at Black Hat is worrisome for facilities reliant on proximity cards and readers for access to buildings in critical industries or enterprises. Researchers Eric Evenchick, an embedded systems architect at electric car manufacturer Faraday Future, and Mark Baseggio, a managing principal consultant at Optiv (formerly Accuvant), used the ubiquitous HID cards and readers in a number of successful demos during their talk, but said that it’s likely the same weaknesses that facilitate their attacks are present in devices from other manufacturers. more video
Really Scary: 29:35 minutes into the video they explain how to make a card-key interceptor, stick it into a back pack, go to the target workplace, get in an elevator with employees (or just close to one of them), secretly read everyone's cards, and make a clone card.
Happy Halloween ~Kevin
Friday, October 30, 2015
The Disorderly Orderly, or Spycam Peek-A-Boo in the ICU
India - Police have arrested a 30-year-old male orderly of Rajiv Gandhi Cancer Institute and Research Centre
on charges of filming women after allegedly putting up spy camera in changing room for nurses.
A nurse spotted the spy camera in the changing room inside the intensive care unit (ICU) on the third floor and alerted a security guard, said sources.
Police have reportedly recovered two obscene video clips from his spy camera, which was installed for around 12 hours, said sources. Police will now try to retrieve deleted data, added the sources. more
on charges of filming women after allegedly putting up spy camera in changing room for nurses.
A nurse spotted the spy camera in the changing room inside the intensive care unit (ICU) on the third floor and alerted a security guard, said sources.
Police have reportedly recovered two obscene video clips from his spy camera, which was installed for around 12 hours, said sources. Police will now try to retrieve deleted data, added the sources. more
Police vs Spy Blimp in PA - Shotguns Preveil
PA - State police used shotguns Thursday to deflate a wayward military surveillance blimp that broke loose in Maryland and floated for hours before coming down into trees in the Pennsylvania countryside.
Curious residents trickled into a staging area as the military began gathering up some 6,000 feet of tether, the blimp’s huge hull and a smaller tail piece, a process expected to take at least through Friday.
The white behemoth still had helium in its nose when it went down in a steep ravine on Wednesday afternoon, and the easiest way to drain the gas was to shoot it, U.S. Army Captain Matthew Villa said. State police troopers peppered the blimp with about 100 shots. more How it all started.
Curious residents trickled into a staging area as the military began gathering up some 6,000 feet of tether, the blimp’s huge hull and a smaller tail piece, a process expected to take at least through Friday.
The white behemoth still had helium in its nose when it went down in a steep ravine on Wednesday afternoon, and the easiest way to drain the gas was to shoot it, U.S. Army Captain Matthew Villa said. State police troopers peppered the blimp with about 100 shots. more How it all started.
The Ultimate Spy vs Spy
via
Mark Frauenfelder, Boing Boing
It was a wordless one-page comic about two oddly pointy faced spies, one dressed in black and the other dressed in white. Other than their different colored outfits, they behaved identically. They hated each other and created elaborate Rube Goldberg type machines to try to kill each other. Sometimes their machines worked, often, they’d backfire. They were tricky but usually too clever for their own good.
This anthology colorizes 150 “Spy vs Spy” comics drawn by Antonio Prohías from 1961 until his death in 1987. The book also includes a collection of “Spy vs Spy” comics by the talented cartoonist Peter Kuper, who took over the strip when Prohías died. The anthology features a section of wonderful “Spy vs Spy” tribute drawings by noted cartoonists such as Peter Bagge, Bob Staake, Darwyn Cooke, Gilbert and Jaime Hernandez, and Bill Sienkiewicz. There’s also a biography of the Cuban-born Prohíasm and a new 4-page color strip by MAD luminary Sergio Aragones about his friendship with Prohías. With all the new material here, this book is a must for anyone who loves “Spy vs Spy.”
Spy Vs Spy: An Explosive Celebration
by Antonio Prohías and Peter Kuper
Liberty Street, 2015, 224 pages, 8.8 x 0.8 x 11.2 inches
$16.46 at Amazon
It was a wordless one-page comic about two oddly pointy faced spies, one dressed in black and the other dressed in white. Other than their different colored outfits, they behaved identically. They hated each other and created elaborate Rube Goldberg type machines to try to kill each other. Sometimes their machines worked, often, they’d backfire. They were tricky but usually too clever for their own good.
This anthology colorizes 150 “Spy vs Spy” comics drawn by Antonio Prohías from 1961 until his death in 1987. The book also includes a collection of “Spy vs Spy” comics by the talented cartoonist Peter Kuper, who took over the strip when Prohías died. The anthology features a section of wonderful “Spy vs Spy” tribute drawings by noted cartoonists such as Peter Bagge, Bob Staake, Darwyn Cooke, Gilbert and Jaime Hernandez, and Bill Sienkiewicz. There’s also a biography of the Cuban-born Prohíasm and a new 4-page color strip by MAD luminary Sergio Aragones about his friendship with Prohías. With all the new material here, this book is a must for anyone who loves “Spy vs Spy.”
Spy Vs Spy: An Explosive Celebration
by Antonio Prohías and Peter Kuper
Liberty Street, 2015, 224 pages, 8.8 x 0.8 x 11.2 inches
$16.46 at Amazon
Thursday, October 29, 2015
Spycam Ejection
Australia - A Brisbane landlord has been slammed for installing CCTV cameras inside his rental property and spying on his tenants, who he evicted once they complained.
Renters Ben and Lila - who withheld their surnames - told Channel Nine's A Current Affair they noticed they were being recorded on the first day they moved into their new apartment.
The security camera was set up in the lounge room, switched on and recording.
According to the program, the furious flatmates immediate flicked the switch on the camera, before they were contacted by the landlord who said they had to turn it back on. more video
Renters Ben and Lila - who withheld their surnames - told Channel Nine's A Current Affair they noticed they were being recorded on the first day they moved into their new apartment.
The security camera was set up in the lounge room, switched on and recording.
According to the program, the furious flatmates immediate flicked the switch on the camera, before they were contacted by the landlord who said they had to turn it back on. more video
Crackdown on Users of DroidJack Spyware
Law enforcement officials in almost half a dozen European countries have searched the homes of people suspected of having used software to spy on mobile phone users...
In Germany, prosecutors searched the homes of 13 people on Tuesday, they said, adding raids had also taken place in Britain, France, Belgium and Switzerland. They did not have further information on the raids in other countries.
The suspects in Germany, aged between 19 and 51, are believed to have bought and used smartphone software DroidJack, which allows surveillance of phones that use Google's Android...
The software allows users to monitor a smartphone's data traffic, eavesdrop on phone conversations or hijack a phone's camera without its owner noticing. It can also be used to spy on smartphone users as they access online banking systems. more
In Germany, prosecutors searched the homes of 13 people on Tuesday, they said, adding raids had also taken place in Britain, France, Belgium and Switzerland. They did not have further information on the raids in other countries.
The suspects in Germany, aged between 19 and 51, are believed to have bought and used smartphone software DroidJack, which allows surveillance of phones that use Google's Android...
The software allows users to monitor a smartphone's data traffic, eavesdrop on phone conversations or hijack a phone's camera without its owner noticing. It can also be used to spy on smartphone users as they access online banking systems. more
Bud Flight - Spies on the Go
The two-state battle for a federal spy agency’s new regional headquarters is heating up,
with Missouri Gov. Jay Nixon on Wednesday announcing plans to publicly push to keep the agency in St. Louis as hundreds of supporters gathered across the Mississippi River to tout a potential Illinois location.
At stake in the bistate regional fight are more than 3,000 high-tech jobs at the National Geospatial-Intelligence Agency paying an average of $75,000.
The defense and intelligence agency is considering four sites to replace its current location near the Anheuser-Busch brewery south of downtown St. Louis. more
with Missouri Gov. Jay Nixon on Wednesday announcing plans to publicly push to keep the agency in St. Louis as hundreds of supporters gathered across the Mississippi River to tout a potential Illinois location.
At stake in the bistate regional fight are more than 3,000 high-tech jobs at the National Geospatial-Intelligence Agency paying an average of $75,000.
The defense and intelligence agency is considering four sites to replace its current location near the Anheuser-Busch brewery south of downtown St. Louis. more
Business Espionage: Buy Your Batting Average with Blackmail
Former big leaguer Lenny Dykstra admitted to spending "half a million bucks" on private investigators to dig up dirt on umpires during his playing career.
Dykstra says he then used the information not necessarily to bribe umpires, but to intimidate them into giving him favorable calls. "Fear does a lot to a man," he says. Here's the video:
"Their blood is just as red as ours. Some of them like women, some of them like men, some of them gamble," said Dykstra. He then imagined a scenario in which he asked the umpire if he "covered the spread last night" after a called strike, then the strike zone shrunk to his advantage.
"It wasn't a coincidence that I led the league in walks the next few years," he added. Dykstra led the league with 129 walks in 1993 while with the Phillies. His previous career high was 89 walks, though he missed plenty of time with injuries. Dykstra's walk rate did spike from 1993-94:
Dykstra says he then used the information not necessarily to bribe umpires, but to intimidate them into giving him favorable calls. "Fear does a lot to a man," he says. Here's the video:
"Their blood is just as red as ours. Some of them like women, some of them like men, some of them gamble," said Dykstra. He then imagined a scenario in which he asked the umpire if he "covered the spread last night" after a called strike, then the strike zone shrunk to his advantage.
"It wasn't a coincidence that I led the league in walks the next few years," he added. Dykstra led the league with 129 walks in 1993 while with the Phillies. His previous career high was 89 walks, though he missed plenty of time with injuries. Dykstra's walk rate did spike from 1993-94:
This App Turns Your Smartwatch into an Eavesdropping Device
There are times when being able to easily record audio is a serious advantage in your day to day life. Whether that means you do it for work, school, or anything else, now you can easily do it with Wear Audio Recorder on your Android Wear device. Whether it's a short moment or a full meeting, this app has got you covered.
Wear Audio Recorder has a fantastic look that is both simple and stylish. Unsurprising when you realize that they're using Google's Material Design. On your Smart Watch, this app doesn't have a ton of features. What it does, it does well. Recording is as simple as opening the app, and tapping record. more
Why do I mention it?
So you will know what you're up against.
Wear Audio Recorder has a fantastic look that is both simple and stylish. Unsurprising when you realize that they're using Google's Material Design. On your Smart Watch, this app doesn't have a ton of features. What it does, it does well. Recording is as simple as opening the app, and tapping record. more
Why do I mention it?
So you will know what you're up against.
Wednesday, October 28, 2015
Spies in Space: The Final Frontier in Espionage
Space, the ‘final frontier’, is rapidly becoming an extra-terrestrial battleground for corporate espionage and other types of cyber attack as hackers seek to gain commercial advantage from rival networks operating in the $330-billion space economy...
The amount of data now being beamed between satellites supporting commercial networks on earth is growing rapidly, making them a ripe target for cyber attacks, said Luca del Monte, a senior strategist at the European Space Agency, and one of many experts who attended the annual International Astronautical Congress last week in Israel.
Space presents a double opportunity for hackers – the hardware up in orbit and the information it transmits. more
The amount of data now being beamed between satellites supporting commercial networks on earth is growing rapidly, making them a ripe target for cyber attacks, said Luca del Monte, a senior strategist at the European Space Agency, and one of many experts who attended the annual International Astronautical Congress last week in Israel.
Space presents a double opportunity for hackers – the hardware up in orbit and the information it transmits. more
The 'Spy in a Bag' Case Continues
Gareth Williams was blackmailed with 'staged photos in Las Vegas hotel room' by Russian spies, claims former KGB agent...
A former KGB major says he believes Gareth Williams was murdered by Russian hit men as the MI6 spy refused to become a double agent, even after they blackmailed him by taking compromising, staged photographs.
The former major and intelligence officer Boris Karpichkov, who was exiled from Russia and now lives in the UK with a new identity, told his version of events to The Daily Mail. He claims to have a source high up in Russian intelligence services.
Mr William’s dead body was found locked in a bag in his Pimlico flat in 2010. He has been a codebreaker at GCHQ but at the time was on secondment to MI6 at their offices in Vauxhall, London. more
A former KGB major says he believes Gareth Williams was murdered by Russian hit men as the MI6 spy refused to become a double agent, even after they blackmailed him by taking compromising, staged photographs.
The former major and intelligence officer Boris Karpichkov, who was exiled from Russia and now lives in the UK with a new identity, told his version of events to The Daily Mail. He claims to have a source high up in Russian intelligence services.
Mr William’s dead body was found locked in a bag in his Pimlico flat in 2010. He has been a codebreaker at GCHQ but at the time was on secondment to MI6 at their offices in Vauxhall, London. more
Criptyque Launches Pryvate™, the First Fully Secure Communications Platform
Criptyque, the secure communications provider, today announced the launch of Pryvate™, the first all-encompassing and fully encrypted communications platform for mobile devices. Pryvate secures communication services across email, voice calls, conference calls, video calls and instant messenger to protect consumers and businesses from cybercriminals, intruders, corporate espionage, hackers and more.
The Pryvate application provides triple-layered security powered by top-of-the-line 4096-bit encryption, with AES 256-bit key management and DH key exchange. It offers truly seamless independent, network agnostic security combined with high quality of service at a low cost.
Initially available on Apple and Google Play stores, the service provides security by generating unique encryption keys on the devices of both users who communicate via the application. Once a key is used, a new key is created for every subsequent interaction and auto renew for every call, IM, message, session etc. Pryvate has no access to users’ encryption keys past, present or future: making it impossible to leak, hack, collaborate or give away keys, which makes all communication through Pryvate totally secure and impervious to hacking. more
The Pryvate application provides triple-layered security powered by top-of-the-line 4096-bit encryption, with AES 256-bit key management and DH key exchange. It offers truly seamless independent, network agnostic security combined with high quality of service at a low cost.
Initially available on Apple and Google Play stores, the service provides security by generating unique encryption keys on the devices of both users who communicate via the application. Once a key is used, a new key is created for every subsequent interaction and auto renew for every call, IM, message, session etc. Pryvate has no access to users’ encryption keys past, present or future: making it impossible to leak, hack, collaborate or give away keys, which makes all communication through Pryvate totally secure and impervious to hacking. more
Business Espionage: HSBC Nemesis Falciani Mocks Swiss Justice a Mile From Border
Herve Falciani, the Frenchman wanted on charges of industrial espionage in Switzerland, has opted to skip his trial at the country’s top court and instead plead his case before a jury of journalists at a French hotel, less than a mile from the Swiss border.
The Frenchman was the star attraction at a conference billed “Investigative Journalism in the Time of Wikileaks” Wednesday at the Domaine de Divonne. The hotel and casino is a 20-minute drive from Geneva, where Falciani took client data from HSBC Holdings Plc’s private bank nearly a decade ago. more
The Frenchman was the star attraction at a conference billed “Investigative Journalism in the Time of Wikileaks” Wednesday at the Domaine de Divonne. The hotel and casino is a 20-minute drive from Geneva, where Falciani took client data from HSBC Holdings Plc’s private bank nearly a decade ago. more
Tuesday, October 27, 2015
What's in The Washington Post basement?
Nixon tapes and Cold War spy photos.
Deep in the basement of the Washington Post newsroom, national security reporter Walter Pincus is rediscovering 40 years worth of handwritten notes, White House telephone records and declassified spy photos. As the Post prepares to move into a new building in December, he’s digging up details on many of the historical stories he’s worked on. (Jorge Ribas and Jayne W. Orenstein / The Washington Post) more
Deep in the basement of the Washington Post newsroom, national security reporter Walter Pincus is rediscovering 40 years worth of handwritten notes, White House telephone records and declassified spy photos. As the Post prepares to move into a new building in December, he’s digging up details on many of the historical stories he’s worked on. (Jorge Ribas and Jayne W. Orenstein / The Washington Post) more
Corporate Espionage that Flies Below the Radar
by Kevin G. Coleman, SilverRhino
Headlines about economic, corporate and industrial espionage have been in abundance lately and for good reason... Several subject matter experts agree that much of these espionage activities that target businesses are criminal-based.
Recently while on the executive floor of one large company a new twist to espionage tradecraft popped up.
After entering a conference room, a note on the whiteboard caught my attention: “DO NOT ERASE.” Seeing that on a whiteboard filled with financial numbers, notes, diagrams and so on is not an uncommon occurrence. When I was looking out the windows, I saw a drone slowly fly by. Given the camera capabilities that are now available and becoming common on drones, it would not be difficult to capture what was on those whiteboards. The images are digitally captured, cropped, enhanced extracted and then sold...
Today economic, corporate and industrial espionage is big business. With significant money being made selling corporate secrets, this threat will only grow. more
Headlines about economic, corporate and industrial espionage have been in abundance lately and for good reason... Several subject matter experts agree that much of these espionage activities that target businesses are criminal-based.
Recently while on the executive floor of one large company a new twist to espionage tradecraft popped up.
Drone at office window story. |
Today economic, corporate and industrial espionage is big business. With significant money being made selling corporate secrets, this threat will only grow. more
His Spy Got Caught and was Arrested. The Handler Disavowes it as "Silly"
David Vitter calls spying arrest ‘silly’; Sheriff Newell Normand says Vitter would be ‘worst governor in Louisiana history’
Louisiana - The bungled political espionage that unfolded hours before Saturday’s election has exposed and perhaps deepened the enmity between U.S. Sen. David Vitter and Jefferson Parish Sheriff Newell Normand, fellow Republicans who traded barbs Monday as Vitter turned his attention to the gubernatorial runoff next month.
The animus between the two elected officials traces its roots to a similar split between Vitter and the late Harry Lee, Normand’s combative predecessor. And the relationship appears to have reached a nadir after Normand caught a private investigator hired by Vitter’s campaign secretly recording the sheriff’s regular coffee gathering at the Royal Blend cafe in Old Metairie. more
Louisiana - The bungled political espionage that unfolded hours before Saturday’s election has exposed and perhaps deepened the enmity between U.S. Sen. David Vitter and Jefferson Parish Sheriff Newell Normand, fellow Republicans who traded barbs Monday as Vitter turned his attention to the gubernatorial runoff next month.
The animus between the two elected officials traces its roots to a similar split between Vitter and the late Harry Lee, Normand’s combative predecessor. And the relationship appears to have reached a nadir after Normand caught a private investigator hired by Vitter’s campaign secretly recording the sheriff’s regular coffee gathering at the Royal Blend cafe in Old Metairie. more
Monday, October 26, 2015
A Tale of Two Law Suits - Eavesdroppers Won, Targets Zero
Facebook Wins Dismissal Of $15 Billion Privacy Lawsuit
It’s been more than three years since a federal judge in California heard arguments in a large class-action lawsuit filed against Facebook over its questionable privacy practices. Finally, on Friday that judge sided with the social network and threw out the case — while leaving open the option for plaintiffs to revise and re-file their case.
The complaint involves Facebook’s tracking of users both while they are logged in as Facebook users and after they log off.
The plaintiffs argued that, in exchange for offering free access to Facebook, the company “conditions its membership upon users providing sensitive and personal information… including name, birth date, gender and e-mail address,” and requires that users accept numerous Facebook “cookies” on their web browsers that allow Facebook to track that a user’s Internet browsing history — which is then marketed to advertisers.
Of particular concern to the plaintiffs was Facebook’s continued tracking of users even after they had logged out of Facebook. more
ACLU lawsuit against NSA mass spying dropped in federal court
A federal district court on Friday dismissed a lawsuit brought by the American Civil Liberties Union against the National Security Agency over its mass surveillance program.
Ashley Gorski, a staff attorney with the ACLU national security project told The Guardian the mass spying program was innately harmful, arguing it violates “our clients’ constitutional rights to privacy, freedom of speech, and freedom of association, and it poses a grave threat to a free internet and a free society.” more
It’s been more than three years since a federal judge in California heard arguments in a large class-action lawsuit filed against Facebook over its questionable privacy practices. Finally, on Friday that judge sided with the social network and threw out the case — while leaving open the option for plaintiffs to revise and re-file their case.
The complaint involves Facebook’s tracking of users both while they are logged in as Facebook users and after they log off.
The plaintiffs argued that, in exchange for offering free access to Facebook, the company “conditions its membership upon users providing sensitive and personal information… including name, birth date, gender and e-mail address,” and requires that users accept numerous Facebook “cookies” on their web browsers that allow Facebook to track that a user’s Internet browsing history — which is then marketed to advertisers.
Of particular concern to the plaintiffs was Facebook’s continued tracking of users even after they had logged out of Facebook. more
ACLU lawsuit against NSA mass spying dropped in federal court
A federal district court on Friday dismissed a lawsuit brought by the American Civil Liberties Union against the National Security Agency over its mass surveillance program.
Ashley Gorski, a staff attorney with the ACLU national security project told The Guardian the mass spying program was innately harmful, arguing it violates “our clients’ constitutional rights to privacy, freedom of speech, and freedom of association, and it poses a grave threat to a free internet and a free society.” more
A Downer for Drones
There's recently been a run of new anti-drone systems introduced to deal
with potential threats from UAVs, but these have been on the large and
expensive side. To provide an affordable alternatives to plug the gap
between shotguns and truck-mounted systems, national security research
and development firm Battelle is introducing DroneDefender. Billed as
the first portable, accurate, rapid-to-use UAV counter-weapon, it's a
rifle-like raygun device that uses a radio beam to jam drone control
systems and stop them in midair. more
Get Ready for Spectre - Battle of the Bonds Infographic
Battle of the Bonds: Kisses, Cocktails, Kills, Cars & Cash – An infographic by the team at GB Show Plates
Monday, October 5, 2015
Jealous Wives and Girlfriends Can Now Snoop on their Partner using a Spy Belt
Jealous wives and girlfriends can snoop on their fellas with a spy gadget disguised as a belt.
A tracking device hidden in the leather monitors the wearer’s location every 60 seconds. And it can be controlled remotely through Android and iPhone apps without the wearer noticing.
Unwary men could receive one as a present without knowing what they have let themselves in for.
The Belt Tracker, sold by Spymaster, in Marylebone, London, has a 12-hour battery life and can be used in 220 countries without incurring data roaming charges. It even has a flight safe mode to comply with airline regulations.
The GPS device was originally designed to monitor people working in dangerous environments, such as undercover police. And it can be used to track children and give peace of mind to parents. more
A tracking device hidden in the leather monitors the wearer’s location every 60 seconds. And it can be controlled remotely through Android and iPhone apps without the wearer noticing.
Unwary men could receive one as a present without knowing what they have let themselves in for.
The Belt Tracker, sold by Spymaster, in Marylebone, London, has a 12-hour battery life and can be used in 220 countries without incurring data roaming charges. It even has a flight safe mode to comply with airline regulations.
The GPS device was originally designed to monitor people working in dangerous environments, such as undercover police. And it can be used to track children and give peace of mind to parents. more
Scientist Pleads Guilty to Corporate Espionage
Researcher Xiwen Huang pleaded guilty Friday to one count of stealing trade secrets. But the legal battle over the punishment the former Charlotte resident receives already is underway.
Federal prosecutors say the 55-year-old chemical engineer stole proprietary technology and hundreds of pages of documents over the last decade from his government and civilian employers, including a company in Charlotte. Huang’s goal, according to court documents, was to aid both the Chinese government and his own company, which he started in North Carolina to do business in his Asian homeland.
Huang faces a maximum penalty of 10 years in prison and a $250,000 fine. He will be sentenced at a later date. Imprisonment is all but certain. more
Federal prosecutors say the 55-year-old chemical engineer stole proprietary technology and hundreds of pages of documents over the last decade from his government and civilian employers, including a company in Charlotte. Huang’s goal, according to court documents, was to aid both the Chinese government and his own company, which he started in North Carolina to do business in his Asian homeland.
Huang faces a maximum penalty of 10 years in prison and a $250,000 fine. He will be sentenced at a later date. Imprisonment is all but certain. more
Ai Weiwei Discovers Eavesdropping Devices in His Studio
Ai Weiwei has posted a number of pictures of what he says are listening devices found in his Beijing studio.
The Chinese dissident artist captioned one photo of a bug on Instagram with "There will always be surprises".
His friend Liu Xiaoyuan confirmed the bugs were found after the artist returned from a trip to Germany.
Xiaoyuan tweeted that they were found when redecoration started on Ai's home and were found in the office and a living room.
The artist also posted a video clip of firecrackers being set off in a metal bucket next to one of the devices. He wrote "Did you hear it?" next to the video. more
The Chinese dissident artist captioned one photo of a bug on Instagram with "There will always be surprises".
His friend Liu Xiaoyuan confirmed the bugs were found after the artist returned from a trip to Germany.
Xiaoyuan tweeted that they were found when redecoration started on Ai's home and were found in the office and a living room.
The artist also posted a video clip of firecrackers being set off in a metal bucket next to one of the devices. He wrote "Did you hear it?" next to the video. more
Gang Using Spy Cam, Bluetooth for Exam Paper Leaks Busted
India - Police have busted a New Delhi-based gang involved in assembling spy cameras and bluetooth devices in undergarments and shirts to facilitate question paper leaks in important competitive exams across the country.
...the accused used to assemble spy cams and bluetooth devices in shirts, briefs and vests, mobile hardware kits, and other equipment to get the question papers leaked out from the exam centres...
...the kit included an android smartphone which was connected with a spy cam in cuff of a shirt. The question paper was clicked by some candidate or a staff member through spy camp and smuggled outside the examination centre through drop box application.
The paper was then distributed through e-mails or WhatsApp to a team of six to eight teachers, who solved the paper. The candidates, who paid for the solved paper, were given a bluetooth ear device which did not require mobile handset and acted just as receiver. The accused had assembled a set with 40 mobile phones through which the answers were dictated to the candidates... more
...the accused used to assemble spy cams and bluetooth devices in shirts, briefs and vests, mobile hardware kits, and other equipment to get the question papers leaked out from the exam centres...
...the kit included an android smartphone which was connected with a spy cam in cuff of a shirt. The question paper was clicked by some candidate or a staff member through spy camp and smuggled outside the examination centre through drop box application.
The paper was then distributed through e-mails or WhatsApp to a team of six to eight teachers, who solved the paper. The candidates, who paid for the solved paper, were given a bluetooth ear device which did not require mobile handset and acted just as receiver. The accused had assembled a set with 40 mobile phones through which the answers were dictated to the candidates... more
Phone on Drone Hacks Wireless Printer
You might think that working
on a secured floor in a 30-story office tower puts you out of reach of
Wi-Fi hackers out to steal your confidential documents.
But researchers in Singapore have demonstrated how attackers using a drone plus a mobile phone could easily intercept documents sent to a seemingly inaccessible Wi-Fi printer. The method they devised is actually intended to help organizations determine cheaply and easily if they have vulnerable open Wi-Fi devices that can be accessed from the sky. But the same technique could also be used by corporate spies intent on economic espionage. more
But researchers in Singapore have demonstrated how attackers using a drone plus a mobile phone could easily intercept documents sent to a seemingly inaccessible Wi-Fi printer. The method they devised is actually intended to help organizations determine cheaply and easily if they have vulnerable open Wi-Fi devices that can be accessed from the sky. But the same technique could also be used by corporate spies intent on economic espionage. more
Sunday, October 4, 2015
Operation Armchair - Son of The Thing, or...
...how a small Dutch company, helped the CIA to eavesdrop on the Russians.
"A small company from Noordwijk, Dutch Radar Research Station, worked for the CIA for decades. It built sophisticated listening devices that the Americans used against the Soviet Union. I came across this story when a schoolmate gave me papers of his grandfather. Along with intelligence expert, Cees Wiebes, I reconstructed in eighteen months the never told key role that this Dutch company played during the Cold War." ~ Maurits Martijn
(A long, but interesting story.)
"A small company from Noordwijk, Dutch Radar Research Station, worked for the CIA for decades. It built sophisticated listening devices that the Americans used against the Soviet Union. I came across this story when a schoolmate gave me papers of his grandfather. Along with intelligence expert, Cees Wiebes, I reconstructed in eighteen months the never told key role that this Dutch company played during the Cold War." ~ Maurits Martijn
(A long, but interesting story.)
Friday, October 2, 2015
IP Protection: Don’t Expect Government Help
If actions – or in this case inaction – speak louder than words, the message from the U.S. government to the private sector regarding defense against cyber economic espionage by China is clear: “You’re on your own.”
That remains true, in the view of multiple experts, even after Chinese President Xi Jinping and U.S. President Barack Obama announced an agreement last week that, according to a White House press secretary Fact Sheet, “neither country’s government will conduct or knowingly support cyber-enabled theft of intellectual property, including trade secrets or other confidential business information, with the intent of providing competitive advantages to companies or commercial sectors.”
...the agreement refers only to the governments of both countries – not their private sectors...
Kevin Murray, director at Murray Associates, said the reality is that, “both leaders know economics comes first. “Waving an ‘agreement’ in the air may mollify some of their constituents,” he said, but the subtext of promising that “governments” won’t do it acknowledges the reality that they, “can't control all the rogue hackers out there. All they can say is that their governments are not behind it, and they don't condone it. Meanwhile, cutouts will manage the "consultants" who make money with their data-vacuums." more
That remains true, in the view of multiple experts, even after Chinese President Xi Jinping and U.S. President Barack Obama announced an agreement last week that, according to a White House press secretary Fact Sheet, “neither country’s government will conduct or knowingly support cyber-enabled theft of intellectual property, including trade secrets or other confidential business information, with the intent of providing competitive advantages to companies or commercial sectors.”
...the agreement refers only to the governments of both countries – not their private sectors...
Kevin Murray, director at Murray Associates, said the reality is that, “both leaders know economics comes first. “Waving an ‘agreement’ in the air may mollify some of their constituents,” he said, but the subtext of promising that “governments” won’t do it acknowledges the reality that they, “can't control all the rogue hackers out there. All they can say is that their governments are not behind it, and they don't condone it. Meanwhile, cutouts will manage the "consultants" who make money with their data-vacuums." more
Subscribe to:
Posts (Atom)