You think about securing your laptop, but what about your desk phone, monitor, or printer?
Ang Cui, who heads up Red Balloon Security in New York City, has a particularly innovative way of hacking these devices. Using a piece of malware called “funtenna,” he’s able to make devices transmit data over radio (RF) signals, and then pick them up with an antenna. He’s basically using software to turn this equipment into bugging devices. more
(If video space is blank, click here.)
This is one reason why businesses conduct regularly scheduled bug sweeps (TSCM) of their offices and conference rooms. If you are not plugging these information leaks yet, call me. I'll help you put a protection strategy in place. ~Kevin
Friday, July 29, 2016
Your Weekend Spy Flick—Bourne... again
‘Jason Bourne’: A welcome return for Matt Damon’s spirited spy.
What with all their international adventures through the years, it seems like only a matter of time before Jason Bourne and Ethan Hunt cross paths, whether it be in a crowded town square in Greece or a winding boulevard in Paris — or maybe while the two of them happen to be involved in crazy high-speed chases at the same time.
Hey man. What are YOU doing here?
Just as Tom Cruise continues to carry the “Mission: Impossible” action franchise in his 50s, the 45-year-old Matt Damon still kicks butt in serious fashion in his fourth appearance (and first since 2007) as Jason Bourne in the film of the same name. more trailer movie times
What with all their international adventures through the years, it seems like only a matter of time before Jason Bourne and Ethan Hunt cross paths, whether it be in a crowded town square in Greece or a winding boulevard in Paris — or maybe while the two of them happen to be involved in crazy high-speed chases at the same time.
Hey man. What are YOU doing here?
Just as Tom Cruise continues to carry the “Mission: Impossible” action franchise in his 50s, the 45-year-old Matt Damon still kicks butt in serious fashion in his fourth appearance (and first since 2007) as Jason Bourne in the film of the same name. more trailer movie times
The Cartoon You Won't See in Your Paper Today
"Today's strip that did not run in papers.
Seems harmless to me, but I guess these are sensitive times."
Stephan Pastis
@stephanpastis
Syndicated Cartoonist, Creator of Pearls Before Swine Comic Strip,
Author of Timmy Failure book series
Seems harmless to me, but I guess these are sensitive times."
Stephan Pastis
@stephanpastis
Syndicated Cartoonist, Creator of Pearls Before Swine Comic Strip,
Author of Timmy Failure book series
Click to enlarge. |
Thursday, July 28, 2016
Stormy Weather, or Subterranean Homesick Blues at the National Weather Service
If it’s on Facebook, can it be secret?
Members of the National Weather Service Employees Organization (NWSEO) thought they had a secret Facebook page that was available only to them.
But not only did National Weather Service (NWS) management officials know about the page, they accessed it and made scornful comments about the postings, according to the union.
That amounts to “illegal surveillance” of union activities, according to the labor organization’s complaint filed Wednesday with the Federal Labor Relations Authority.
In the past six months, Weather Service officials “engaged in the surveillance of internal union communications about and discussions of protected activities” on the labor organization’s “ ‘secret’ (that is, ‘members only’) Facebook page,” according to the complaint. more sing-a-long
Members of the National Weather Service Employees Organization (NWSEO) thought they had a secret Facebook page that was available only to them.
But not only did National Weather Service (NWS) management officials know about the page, they accessed it and made scornful comments about the postings, according to the union.
That amounts to “illegal surveillance” of union activities, according to the labor organization’s complaint filed Wednesday with the Federal Labor Relations Authority.
In the past six months, Weather Service officials “engaged in the surveillance of internal union communications about and discussions of protected activities” on the labor organization’s “ ‘secret’ (that is, ‘members only’) Facebook page,” according to the complaint. more sing-a-long
Wednesday, July 27, 2016
Brand-Name Wireless Keyboards Open to Silent Eavesdropping
Wireless keyboards from popular hardware vendors are wide open to silent interception at long distances, researchers have found, without users being aware that attackers can see everything they type.
Bastille Research said the keyboards transmit keystrokes across unencrypted radio signals in the 2.4 GHz band, unlike high-end and Bluetooth protocol keyboards, which transmit data in an encrypted format, making it more difficult for attackers to intercept the scrambled keystrokes.
It means attackers armed with cheap eavesdropping devices can silently intercept what users type at distances of 50 to 100 metres away.
Such interception could reveal users' passwords, credit card numbers, security question replies and other personally sensitive information, Bastille said. Users would have no indication that the traffic between the keyboard and the host computer was intercepted.
Furthermore, attackers could inject keystrokes of their own into the signals, and type directly onto users' computers. Again, the attack would be unnoticeable to users in most cases.
Bastille tested eight keyboards from well-known vendors... more
Longtime Security Scrapbook readers may remember my warnings about this beginning in 2007...
https://spybusters.blogspot.com/2007/12/wireless-keyboard-interception.html
https://spybusters.blogspot.com/2007/12/program-discovers-at-risk-wireless.html
https://spybusters.blogspot.com/2009/01/old-news-still-scary-bugged-keyboards.html
Bastille Research said the keyboards transmit keystrokes across unencrypted radio signals in the 2.4 GHz band, unlike high-end and Bluetooth protocol keyboards, which transmit data in an encrypted format, making it more difficult for attackers to intercept the scrambled keystrokes.
It means attackers armed with cheap eavesdropping devices can silently intercept what users type at distances of 50 to 100 metres away.
Such interception could reveal users' passwords, credit card numbers, security question replies and other personally sensitive information, Bastille said. Users would have no indication that the traffic between the keyboard and the host computer was intercepted.
Furthermore, attackers could inject keystrokes of their own into the signals, and type directly onto users' computers. Again, the attack would be unnoticeable to users in most cases.
Bastille tested eight keyboards from well-known vendors... more
Longtime Security Scrapbook readers may remember my warnings about this beginning in 2007...
https://spybusters.blogspot.com/2007/12/wireless-keyboard-interception.html
https://spybusters.blogspot.com/2007/12/program-discovers-at-risk-wireless.html
https://spybusters.blogspot.com/2009/01/old-news-still-scary-bugged-keyboards.html
The DNC Hack — Worse than Watergate
A foreign government has hacked a political party’s computers—and possibly an election. It has stolen documents and timed their release to explode with maximum damage. It is a strike against our civic infrastructure. And though nobody died—and there was no economic toll exacted—the Russians were aiming for a tender spot, a central node of our democracy...
What’s galling about the WikiLeaks dump is the way in which the organization has blurred the distinction between leaks and hacks. Leaks are an important tool of journalism and accountability. When an insider uncovers malfeasance, he brings information to the public in order to stop the wrongdoing. That’s not what happened here.
The better analogy for these hacks is Watergate. To help win an election, the Russians broke into the virtual headquarters of the Democratic Party. The hackers installed the cyber-version of the bugging equipment that Nixon’s goons used—sitting on the DNC computers for a year, eavesdropping on everything, collecting as many scraps as possible.
This is trespassing, it’s thievery, it’s a breathtaking transgression of privacy. more
What’s galling about the WikiLeaks dump is the way in which the organization has blurred the distinction between leaks and hacks. Leaks are an important tool of journalism and accountability. When an insider uncovers malfeasance, he brings information to the public in order to stop the wrongdoing. That’s not what happened here.
The better analogy for these hacks is Watergate. To help win an election, the Russians broke into the virtual headquarters of the Democratic Party. The hackers installed the cyber-version of the bugging equipment that Nixon’s goons used—sitting on the DNC computers for a year, eavesdropping on everything, collecting as many scraps as possible.
This is trespassing, it’s thievery, it’s a breathtaking transgression of privacy. more
Tuesday, July 26, 2016
Judge Flicks Off Uber and its Phony Private Eye
A strange side-show battle over snooping charges came to an end Monday when a judge in federal court ruled that Uber Technologies and its CEO Travis Kalanick could not use background information it dug up on a passenger who brought a price-fixing suit against Kalanick.
Judge Jed Rakoff said Ergo, the Manhattan-based firm Uber hired to conduct the investigation into the plaintiff and his lawyer, "engaged in fraudulent and arguably criminal conduct." Ergo was not licensed to conduct private investigations in New York state and its operative interviewed subjects under phony pretexts. He may also have violated state laws by taping the interviews without subjects' consent.
"It is a sad day," Rakoff began the 31-page opinion, "when, in response to the filing of a commercial lawsuit, a corporate defendant feels compelled to hire unlicensed private investigators to conduct secret personal background investigations of both the plaintiff and his counsel."
Uber declined to comment. more
Courtesy of Thinkgeek |
"It is a sad day," Rakoff began the 31-page opinion, "when, in response to the filing of a commercial lawsuit, a corporate defendant feels compelled to hire unlicensed private investigators to conduct secret personal background investigations of both the plaintiff and his counsel."
Uber declined to comment. more
Saturday, July 23, 2016
Tristan Payton: Highly touted wide receiver — and criminal hunter?
That seemed to be the case this week after the Central Florida wide receiver chased down a man accused of filming teenaged girls in a bathroom on campus, CBS Sports reported.
The girls were attending a cheerleading camp Wednesday at UCF's basketball facilities on campus when they saw a phone recording them inside a bathroom stall.
They told their coach and staff members, saw the man with the phone and chased him, with UCF police soon joining the pursuit.
The man, identified as 21-year-old Jonathan J. Hui, evaded police and the staff but was soon caught by Payton, who saw the commotion and joined the chase.
Payton quickly snagged Hui's phone before he could delete any information on it. more
The girls were attending a cheerleading camp Wednesday at UCF's basketball facilities on campus when they saw a phone recording them inside a bathroom stall.
They told their coach and staff members, saw the man with the phone and chased him, with UCF police soon joining the pursuit.
The man, identified as 21-year-old Jonathan J. Hui, evaded police and the staff but was soon caught by Payton, who saw the commotion and joined the chase.
Payton quickly snagged Hui's phone before he could delete any information on it. more
Professor Accused of Spying on Students Found Dead
An NYIT professor accused of spying on students in the bathroom has been found dead days after his arrest.
Law enforcement sources tell News 12 the body of Professor Jackie Conrad was found in his Harlem home last night.
The 39-year-old had been arrested last week after police say a camera was found hidden inside a handicapped stall at the school’s health care center in Old Westbury. more
An autopsy will determine his cause of death, but police suspect he killed himself, according to sources.
Conrad, a professor at New York Institute of Technology, planted a camera disguised as a pen in a handicapped-accessible bathroom at the school’s Old Westbury campus in Nassau County on July 13, according to a criminal complaint. more
Law enforcement sources tell News 12 the body of Professor Jackie Conrad was found in his Harlem home last night.
The 39-year-old had been arrested last week after police say a camera was found hidden inside a handicapped stall at the school’s health care center in Old Westbury. more
An autopsy will determine his cause of death, but police suspect he killed himself, according to sources.
Conrad, a professor at New York Institute of Technology, planted a camera disguised as a pen in a handicapped-accessible bathroom at the school’s Old Westbury campus in Nassau County on July 13, according to a criminal complaint. more
The Complete Guide to Facebook Privacy
The Techlicious folks have the tips on how to keep your privacy on Facebook...
Privacy concerns and privacy controls on Facebook are ever changing. When you post a picture of your kids at a family gathering, which one of your Facebook friends can share it? What private information are those Facebook game apps collecting on you for "third-party uses"? How do you make sure that live video stream is seen only by people you choose? Every action you take on Facebook has privacy and sharing implications that need to be considered before you upload that next selfie.
Fortunately, thanks to vocal demands for transparency from both Facebook users and government regulators around the world, Facebook has been making the process of managing your privacy easier. Below is our step-by-step guide to taking full control of your Facebook privacy settings... more
Privacy concerns and privacy controls on Facebook are ever changing. When you post a picture of your kids at a family gathering, which one of your Facebook friends can share it? What private information are those Facebook game apps collecting on you for "third-party uses"? How do you make sure that live video stream is seen only by people you choose? Every action you take on Facebook has privacy and sharing implications that need to be considered before you upload that next selfie.
Fortunately, thanks to vocal demands for transparency from both Facebook users and government regulators around the world, Facebook has been making the process of managing your privacy easier. Below is our step-by-step guide to taking full control of your Facebook privacy settings... more
Summer Reading: Gulity Minds, by Joe Finder
New York Times bestselling author Joseph Finder delivers an exhilarating and timely thriller exploring how even the most powerful among us can be brought down by a carefully crafted lie and how the secrets we keep can never truly stay buried in Guilty Minds.
Nick Heller is a private spy—an intelligence operative based in Boston, hired by lawyers, politicians, and even foreign governments. A high-powered investigator with a penchant for doing things his own way, he’s called to Washington, DC, to help out with a delicate, potentially explosive situation.
The chief justice of the Supreme Court is about to be defamed, his career destroyed, by a powerful gossip website that specializes in dirt on celebs and politicians. Their top reporter has written an exposé claiming that he had liaisons with an escort, a young woman prepared to tell the world her salacious tale. But the chief justice is not without allies and his greatest supporter is determined to stop the story in its tracks.
Nick has just forty-eight hours to disprove the story about the chief justice. But when the call girl is found murdered, the case takes a dangerous turn, and Nick resolves to find the mastermind behind the conspiracy before anyone else falls victim to the maelstrom of political scandal and ruined reputations predicated upon one long-buried secret.
(The story may be fiction, but the technical surveillance/security details are accurate. Joe consults with several well-known specialists, including: Kevin D. Murray, and Adam Hernandez, to give his novel the ring of authenticity. This attention to detail is just one of the things that sets Joe Finder apart from other authors... not to mention his gripping plots.)
Nick Heller is a private spy—an intelligence operative based in Boston, hired by lawyers, politicians, and even foreign governments. A high-powered investigator with a penchant for doing things his own way, he’s called to Washington, DC, to help out with a delicate, potentially explosive situation.
The chief justice of the Supreme Court is about to be defamed, his career destroyed, by a powerful gossip website that specializes in dirt on celebs and politicians. Their top reporter has written an exposé claiming that he had liaisons with an escort, a young woman prepared to tell the world her salacious tale. But the chief justice is not without allies and his greatest supporter is determined to stop the story in its tracks.
Nick has just forty-eight hours to disprove the story about the chief justice. But when the call girl is found murdered, the case takes a dangerous turn, and Nick resolves to find the mastermind behind the conspiracy before anyone else falls victim to the maelstrom of political scandal and ruined reputations predicated upon one long-buried secret.
(The story may be fiction, but the technical surveillance/security details are accurate. Joe consults with several well-known specialists, including: Kevin D. Murray, and Adam Hernandez, to give his novel the ring of authenticity. This attention to detail is just one of the things that sets Joe Finder apart from other authors... not to mention his gripping plots.)
Compilation of State and Federal Privacy Laws (US & Canada)
The 2016 Supplement to Privacy Journal's "Compilation of State and Federal Privacy Laws" (2013) has been published, adding 30 more laws enacted by states and provinces in the past 12 months.
The Compilation of State and Federal Privacy Laws (ISBN 978-0-930072-56-8) cites and describes more than 700 state, provincial, and federal laws affecting the confidentiality of personal information and electronic surveillance. The laws are listed by state, grouped in categories like medical, credit, financial, security breaches, tracking technologies, employment, government, school records, Social Security numbers, marketing, telephone privacy and many more. Canadian laws too.
PRIVACY JOURNAL
PO Box 28577
Providence RI 02908
Phone: 401/274-7861
Fax: 401/274-4747
www.privacyjournal.net
The Compilation of State and Federal Privacy Laws (ISBN 978-0-930072-56-8) cites and describes more than 700 state, provincial, and federal laws affecting the confidentiality of personal information and electronic surveillance. The laws are listed by state, grouped in categories like medical, credit, financial, security breaches, tracking technologies, employment, government, school records, Social Security numbers, marketing, telephone privacy and many more. Canadian laws too.
PRIVACY JOURNAL
PO Box 28577
Providence RI 02908
Phone: 401/274-7861
Fax: 401/274-4747
www.privacyjournal.net
Friday, July 22, 2016
Amazon Mute on Echo Eavesdropping
We may never know if the feds have hijacked Amazon Echo.
Amazon has so far issued two transparency reports since it began declaring how many government data demands and wiretap orders it receives.
Both reports outlined how many subpoenas, search warrants, and court orders the company received to cloud service Amazon Web Services. While its cloud makes up a significant portion of the data that it gathers, the company also collects vast amounts of data from its retail businesses, mobile services, book purchases, and requests made to Echo.
But an Amazon spokesperson wouldn't comment on whether the company will expand its transparency report. more
Amazon has so far issued two transparency reports since it began declaring how many government data demands and wiretap orders it receives.
Both reports outlined how many subpoenas, search warrants, and court orders the company received to cloud service Amazon Web Services. While its cloud makes up a significant portion of the data that it gathers, the company also collects vast amounts of data from its retail businesses, mobile services, book purchases, and requests made to Echo.
But an Amazon spokesperson wouldn't comment on whether the company will expand its transparency report. more
Kim Kardashian Could Get a Swift Kick for Eavesdropping
Kim Kardashian was apparently bluffing when she said that she has a video of Taylor Swift approving the lyric “I made that bitch famous,” even if the reality star had released a video on Sunday night on her Snapchat.
A legal expert said that the turn of events could lead to a major legal battle between Swift on one hand, and Kanye West and Kim Kardashian on the other hand.
For releasing the recording of West’s conversation with Swift – even minus the alleged approval by Swift of the controversial lyric – because the singer was unaware their conversation was being recorded, West and Kardashian breached California’s law on eavesdropping, noted E! News. more
A legal expert said that the turn of events could lead to a major legal battle between Swift on one hand, and Kanye West and Kim Kardashian on the other hand.
For releasing the recording of West’s conversation with Swift – even minus the alleged approval by Swift of the controversial lyric – because the singer was unaware their conversation was being recorded, West and Kardashian breached California’s law on eavesdropping, noted E! News. more
North Korea Revives Coded Spy Numbers Broadcasts
In an era of sophisticated spycraft, North Korea appears to be returning to the days of shortwave radio.
The North broadcast a series of seemingly random numbers on Pyongyang Radio twice recently, an eerie reminder of the days when the North encrypted messages to its spies in South Korea.
In the latest episode last Friday, an announcer read what she described as “a mathematics review assignment for investigative agent No. 27,” engaged in a “distance learning” program.
“Turn to Page 459, No. 35; Page 913, No. 55; Page 135, No. 86,” she said, continuing to cite numbers for 14 minutes.Decades ago, it was not unusual for late-night radio listeners in the South to hear mysterious numbers arriving on static-filled signals from the North. more
Click to enlarge. |
In the latest episode last Friday, an announcer read what she described as “a mathematics review assignment for investigative agent No. 27,” engaged in a “distance learning” program.
“Turn to Page 459, No. 35; Page 913, No. 55; Page 135, No. 86,” she said, continuing to cite numbers for 14 minutes.Decades ago, it was not unusual for late-night radio listeners in the South to hear mysterious numbers arriving on static-filled signals from the North. more
Survey: Do Swiss Spy?
The survey, conducted by a research company on behalf of comparis.ch, asked more than 1,000 people across Switzerland their views on spying and being spied on.
Some 22 percent admitted to keeping an eye on their neighbours using binoculars, cameras and cameraphones, or through the spyhole of their front door.
The most popular reason for spying was to check out a neighbour’s plants (28 percent), followed by how they renovate their home (24 percent), and the way in which they behave with their children (18 percent) and partner (13 percent).
Those that do the most spying are in the 15-29 age bracket, while those aged between 60-74 are the least bothered by what their neighbours are up to.
The survey also asked respondents if they felt observed, with 48 percent of young people saying they do, against a national average of 40 percent. more
Some 22 percent admitted to keeping an eye on their neighbours using binoculars, cameras and cameraphones, or through the spyhole of their front door.
The most popular reason for spying was to check out a neighbour’s plants (28 percent), followed by how they renovate their home (24 percent), and the way in which they behave with their children (18 percent) and partner (13 percent).
Those that do the most spying are in the 15-29 age bracket, while those aged between 60-74 are the least bothered by what their neighbours are up to.
The survey also asked respondents if they felt observed, with 48 percent of young people saying they do, against a national average of 40 percent. more
Monday, July 18, 2016
IT Security Alert - Got Juniper Equipment? Better get the patch.
Juniper Networks patched a crypto bug tied to its public key infrastructure that could have allowed hackers to access the company’s routers, switches and security devices and eavesdrop on sensitive communications. The flaw was tied to Juniper products and platforms running Junos, the Juniper Network Operating System.
The bug (CVE-2016-1280) was reported and patched by Juniper on Wednesday, with public disclosure Friday. Juniper also posted its own information on the security vulnerability, which was found internally.
...The vulnerability allowed attackers to create specially crafted self-signed certificates that can bypass certificate validation within Juniper hardware running the Junos OS. If exploited, the vulnerability could have allowed an attacker in a man-in-the-middle position on the victim’s network to read supposedly secure communications. more
The bug (CVE-2016-1280) was reported and patched by Juniper on Wednesday, with public disclosure Friday. Juniper also posted its own information on the security vulnerability, which was found internally.
...The vulnerability allowed attackers to create specially crafted self-signed certificates that can bypass certificate validation within Juniper hardware running the Junos OS. If exploited, the vulnerability could have allowed an attacker in a man-in-the-middle position on the victim’s network to read supposedly secure communications. more
Quote of the Week
"Lord knows how much industrial espionage has gone on." —Bill Curtis, a Fellow of the IEEE more
The Man with the Butterfly Net was a Spy... and then founded the Boy Scouts
Just a few years into his military service, Robert Baden-Powell had served in South Africa and was transferred to Malta, where he began his spy career as an intelligence officer for the director of military intelligence. One of his favorite disguises was that of an entomologist who studied butterflies, a cover that allowed him to move around freely without looking suspicious. He revealed his scientific subterfuge in his book "My Adventures as a Spy."
"Carrying this book and a colour-box and a butterfly net in my hand, I was above all suspicion to anyone who met me on the lonely mountain side, even in the neighbourhood of the forts," Baden-Powell wrote. And not only did he disguise himself as a butterfly collector; he hid secret information about those forts, as well as other military secrets in drawings of insects and other natural ephemera, which you can see scattered throughout this post.
In Baden-Powell's illustrations, natural patterns are used to transmit messages and information within a drawing; a leaf's pattern could reveal the contours of an area to be invaded, as above. Once a recipient knew how to read the illustrations, it was possible to convey the information easily, without much translation or complex code-breaking needed. more
Click to enlarge. |
In Baden-Powell's illustrations, natural patterns are used to transmit messages and information within a drawing; a leaf's pattern could reveal the contours of an area to be invaded, as above. Once a recipient knew how to read the illustrations, it was possible to convey the information easily, without much translation or complex code-breaking needed. more
Labels:
art,
espionage,
historical,
spy school,
steganography,
weird
Saturday, July 16, 2016
Business Espionage: FBI's 6-Step Advice
Via REI press release: Corporate Espionage Continues to Grow
Companies should be on guard and take the following steps to protect business related information, as stated on the FBI´s website:
1. Recognize there is an insider and outsider threat to your company.
2. Identify and valuate trade secrets.
3. Implement a proactive plan for safeguarding trade secrets. (call here for assistance)
4. Secure physical and electronic versions of your trade secrets.
5. Confine intellectual knowledge on a “need-to-know” basis.
6. Provide training to employees about your company’s intellectual property plan and security.
Companies should be on guard and take the following steps to protect business related information, as stated on the FBI´s website:
1. Recognize there is an insider and outsider threat to your company.
2. Identify and valuate trade secrets.
3. Implement a proactive plan for safeguarding trade secrets. (call here for assistance)
4. Secure physical and electronic versions of your trade secrets.
5. Confine intellectual knowledge on a “need-to-know” basis.
6. Provide training to employees about your company’s intellectual property plan and security.
PokemonGo - A data-gathering opportunity for spies.
A retired senior Russian intelligence official is warning his colleagues in the spying game to stay away from PokemonGo.
Alexander Mikhailov, a former Major-General in Russia’s Federal Security Service, or FSB (the successor to the Soviet KGB), says the game poses a serious national security threat in the hands of oblivious government officials or military personnel.
“Imagine, that these ‘animals,’ appear not in a park but in a secret location where the user who is a soldier or a security official takes a photo of it,” he tells RIA Novosti... “It is unlikely that intelligence agencies will pass up the chance to exploit this data-gathering opportunity,” he said...
So far at least four New York City police officers have been filmed catching Pokemon, around the city. more
Alexander Mikhailov, a former Major-General in Russia’s Federal Security Service, or FSB (the successor to the Soviet KGB), says the game poses a serious national security threat in the hands of oblivious government officials or military personnel.
“Imagine, that these ‘animals,’ appear not in a park but in a secret location where the user who is a soldier or a security official takes a photo of it,” he tells RIA Novosti... “It is unlikely that intelligence agencies will pass up the chance to exploit this data-gathering opportunity,” he said...
So far at least four New York City police officers have been filmed catching Pokemon, around the city. more
Privacy Scarf Foils Paparazzi Pics
There's a stylish way to keep paparazzi at bay — the anti-flash scarf.
The ISHU scarf, created by 28-year-old Saif Siddiqui, is made from a special fabric that reflects light.
Siddiqui, who runs the London and Amsterdam-based company, told BuzzFeed that the scarf's purpose is to provide some privacy.
"The main intention is to make people aware of how important privacy actually is," he said. "Everyone has a 'brand' online, and with the ISHU Scarf, people are back in control of their privacy." more
The ISHU scarf, created by 28-year-old Saif Siddiqui, is made from a special fabric that reflects light.
Siddiqui, who runs the London and Amsterdam-based company, told BuzzFeed that the scarf's purpose is to provide some privacy.
"The main intention is to make people aware of how important privacy actually is," he said. "Everyone has a 'brand' online, and with the ISHU Scarf, people are back in control of their privacy." more
Friday, July 15, 2016
How a YouTube Video Could Infect Your Phone with Spyware
Researchers from Georgetown University and the University of California, Berkeley say cybercriminals could use hidden voice commands via popular YouTube videos to infect Androids and iPhones with malware.
Micah Sherr, a computer science department professor at Georgetown, says the research was inspired by the proliferation of voice-controlled systems. "Amazon Echo was coming out when we started this work," Sherr notes.
Since then, Google has launched Google Home, a similar always-listening device, and electronic devices lost in a messy bedroom can now be recovered by speaking “Okay Google” or “Hey Siri.”
The new research shows how keeping such devices on always-listen mode could lead to a cyberattack. Sherr says a cybercriminal could attempt to plant malware on the device using a hidden voice command. more
Micah Sherr, a computer science department professor at Georgetown, says the research was inspired by the proliferation of voice-controlled systems. "Amazon Echo was coming out when we started this work," Sherr notes.
Since then, Google has launched Google Home, a similar always-listening device, and electronic devices lost in a messy bedroom can now be recovered by speaking “Okay Google” or “Hey Siri.”
The new research shows how keeping such devices on always-listen mode could lead to a cyberattack. Sherr says a cybercriminal could attempt to plant malware on the device using a hidden voice command. more
Tuesday, July 12, 2016
1970's CIA Dragonfly Spy - Ripley's Believe It or Not
In the 1970s, the CIA developed the Insectothopter, an unmanned surveillance drone disguised as a dragonfly.
video |
- The Insectothopter was the size of a dragonfly
- It was painted to look like a dragonfly
- It was powered by a small gasoline engine made by a watchmaker
- And jets of gas were used to propel it forward
- Because it was too difficult to control in even a slight crosswind, the project was abandoned
Former Basketball Coach / Choir Teacher - Locker Room Spy Pen
A former basketball coach is facing multiple felony counts after authorities say he was caught filming athletes in the shower using a camera disguised as a pen according to the Mankato Free Press.
Zachary Patrick Roberts was employed at Janesville-Waldorf-Pemberton High School as the choir teacher for six years before resigning in January...
According to the criminal complaint, an athlete discovered the pen following a game in December when he wanted to write down a play.
Teammates tried to access the files saved on the camera, but were unsuccessful. After the players turned the pen over to school officials, it was given to the police for investigation. more
Zachary Patrick Roberts was employed at Janesville-Waldorf-Pemberton High School as the choir teacher for six years before resigning in January...
According to the criminal complaint, an athlete discovered the pen following a game in December when he wanted to write down a play.
Teammates tried to access the files saved on the camera, but were unsuccessful. After the players turned the pen over to school officials, it was given to the police for investigation. more
Monday, July 11, 2016
The Open Microphone Strikes Again
The only thing more embarrassing than having to resign after a political gambit (the Brexit) blew up in your face? Getting caught on a hot mic singing a goofy tune immediately after you resign. Godspeed, David Cameron. more
Moral: Treat microphones like a poisonous snakes. Always know where they are and what they are doing. Always.
P.S. It has happened to him before, and before.
Moral: Treat microphones like a poisonous snakes. Always know where they are and what they are doing. Always.
P.S. It has happened to him before, and before.
Scientists Create a Real 'Cone of Silence' UPDATE
A while back the original post, Scientists Create a Real 'Cone of Silence', highlighted the advancement in sound mitigation by Steven Cummer, professor of electrical and computer engineering, and his colleagues at Duke University.
Jeremy Luscombe, of resonics.co.uk, wrote in to tell me about, "a more comprehensive look at future acoustic and soundproofing technologies."
Great progress is being made on many fronts, and Jeremy has written about seven of them. It is a fascinating read.
My favorite is the "Air Transparent Soundproof Window" (below).
While these technologies are being developed mainly for commercial use, the materials and techniques also have counterespionage potential.
Jeremy Luscombe, of resonics.co.uk, wrote in to tell me about, "a more comprehensive look at future acoustic and soundproofing technologies."
Great progress is being made on many fronts, and Jeremy has written about seven of them. It is a fascinating read.
My favorite is the "Air Transparent Soundproof Window" (below).
While these technologies are being developed mainly for commercial use, the materials and techniques also have counterespionage potential.
Saturday, July 9, 2016
World's Biggest Bug (You need it if you want to bug aliens.)
China Wants To ‘Eavesdrop’ On Aliens With This Giant Radio Telescope
China hoisted the final piece into position on what will be the world's largest radio telescope, which it will use to explore space and help in the hunt for extraterrestrial life, state media said.
The Five-hundred-meter Aperture Spherical Telescope, or FAST, is the size of 30 football fields and has been hewed out of a mountain in the poor southwestern province of Guizhou. more
Click to enlarge |
The Five-hundred-meter Aperture Spherical Telescope, or FAST, is the size of 30 football fields and has been hewed out of a mountain in the poor southwestern province of Guizhou. more
Spies Gone Wild, or "Dude, where's MY car?"
This is the moment newly qualified Russian spies parade a cortege of black Mercedes Gelandewagens through the streets of Moscow while blasting their horns.
The cavalcade by recently-qualified 007s from Vladimir Putin's espionage ranks has stunned Cold War specialists schooled in staying in the shadows.
Veteran spies in Russia have reacted in horror after the show of strength by newly graduated agents from the foreign intelligence section of the FSB spy academy.
The FSB was once headed by Putin, who was also a KGB agent in Germany during the Cold War. more
The cavalcade by recently-qualified 007s from Vladimir Putin's espionage ranks has stunned Cold War specialists schooled in staying in the shadows.
Veteran spies in Russia have reacted in horror after the show of strength by newly graduated agents from the foreign intelligence section of the FSB spy academy.
The FSB was once headed by Putin, who was also a KGB agent in Germany during the Cold War. more
US Federal Wiretap Report 2015
This report covers intercepts concluded between January 1, 2015,
and December 31, 2015, and provides supplementary information on arrests and convictions resulting from intercepts concluded in prior years.
Forty-eight jurisdictions (the federal government, the District of Columbia, the Virgin Islands, Puerto Rico, and 44 states) currently have laws that authorize courts to issue orders permitting wire, oral, or electronic surveillance. Table 1 shows that a total of 28 jurisdictions reported using at least one of these types of surveillance as an investigative tool during 2015. more
and December 31, 2015, and provides supplementary information on arrests and convictions resulting from intercepts concluded in prior years.
Forty-eight jurisdictions (the federal government, the District of Columbia, the Virgin Islands, Puerto Rico, and 44 states) currently have laws that authorize courts to issue orders permitting wire, oral, or electronic surveillance. Table 1 shows that a total of 28 jurisdictions reported using at least one of these types of surveillance as an investigative tool during 2015. more
"Spy it out for three months. If you like, we get you court order."
Polish spies could be secretly eyeballing world leaders attending the NATO summit in Warsaw.
.. all thanks to a new law that came into force just last week.
The new anti-terrorism legislation was signed by Polish president Andrzej Duda on June 22. It came into force one week later. Under the law, secret surveillance may be carried out on any foreigner for up to three months without a court order. This includes undercover audio and video taping, bugging private premises, and accessing private electronic and phone communications. more
.. all thanks to a new law that came into force just last week.
The new anti-terrorism legislation was signed by Polish president Andrzej Duda on June 22. It came into force one week later. Under the law, secret surveillance may be carried out on any foreigner for up to three months without a court order. This includes undercover audio and video taping, bugging private premises, and accessing private electronic and phone communications. more
Spy Compound For Sale - "one million dollars..."
The Navy built Sugar Grove Station back in the 1960s out in the Allegheny Mountains of West Virginia. Now they want to get it off their hands and sell it to the highest bidder.
The 120-acre spy base compound housed up to 400 Navy personnel and their families.
A press release for this expansive property more subtly calls it a “United States Spy Compound” for “advanced communications research.” After over 50 years of activity, the base closed down operations in September 2015.
The starting bid is $1,000,000. However, with all that powerful history and stellar views behind it, the final price could be substantially higher. The views of the surrounding hills alone could make this place worth the investment. more
The 120-acre spy base compound housed up to 400 Navy personnel and their families.
A press release for this expansive property more subtly calls it a “United States Spy Compound” for “advanced communications research.” After over 50 years of activity, the base closed down operations in September 2015.
The starting bid is $1,000,000. However, with all that powerful history and stellar views behind it, the final price could be substantially higher. The views of the surrounding hills alone could make this place worth the investment. more
Friday, July 8, 2016
Court: Using a Shared Password is Deemed Hacking.
A federal appeals court has affirmed the computer-hacking conviction of a former executive at a recruiting firm accused of using a shared password to steal headhunting leads from the company’s internal network after he left his job to launch a rival business. more
Spybusters Textbook Tip: Be Careful What You Say in Public
A man has exposed the cheating antics of a relative stranger after overhearing her making arrangements for a liaison with her lover in a petrol station.
Stevie Wilcock, 22, posted a description of the woman, her car and her license plate online in a post that has gone viral... (he) was on his way to work when he was in a queue for coffee in Chester's Shell garage when he overheard the conversation.
But while Mr Wilcock said he was acting in good will his decision to publicly shame the woman appears to have backfired with some.
One user said: "Maybe Dave is an absolute horror and she needs a little TLC. Or maybe Dave would like to try and repair the relationship. But he won't get the chance now because some' fine upstanding citizen' has decided to put Dave's private business out there for everyone to comment on."
Nevertheless Mr Wilcock stands behind his decision to take action. more
PS - Your confidential business discussions are also vulnerable every time you talk in public. Think your office is a safe location? When was the last time you had it swept?
Stevie Wilcock, 22, posted a description of the woman, her car and her license plate online in a post that has gone viral... (he) was on his way to work when he was in a queue for coffee in Chester's Shell garage when he overheard the conversation.
But while Mr Wilcock said he was acting in good will his decision to publicly shame the woman appears to have backfired with some.
One user said: "Maybe Dave is an absolute horror and she needs a little TLC. Or maybe Dave would like to try and repair the relationship. But he won't get the chance now because some' fine upstanding citizen' has decided to put Dave's private business out there for everyone to comment on."
Nevertheless Mr Wilcock stands behind his decision to take action. more
PS - Your confidential business discussions are also vulnerable every time you talk in public. Think your office is a safe location? When was the last time you had it swept?
Spy Demise? You Decide.
Russian intelligence officer, Aleksandr Poteyev, who was sentenced for treason in absentia by Russia after blowing the cover of a spy ring in the US, has reportedly died. Moscow, however, is not confirming the news or taking the defector of its wanted list. more
Thursday, July 7, 2016
The Most Dangerous U.S. Spy You Never Heard of... until now
She put American combat troops in harm's way, betrayed her own people and handed over so many secrets that experts say the U.S. may never know the full extent of the damage.
Ana Montes was the Queen of Cuba, an American who from 1985 to the September 11, 2001 attacks handed over U.S. military secrets to Havana while working as a top analyst for the Pentagon's Defense Intelligence Agency.
But despite her crimes, Montes remains largely unknown.
You might not think Cuba could do much harm to a superpower like the U.S., said retired DIA official Chris Simmons, appearing on CNN's "Declassified." But you'd be wrong... more
Programming note: Explore untold stories of American spies: CNN Original Series "Declassified" airs Sundays at 10 p.m. ET/PT only on CNN.
Ana Montes was the Queen of Cuba, an American who from 1985 to the September 11, 2001 attacks handed over U.S. military secrets to Havana while working as a top analyst for the Pentagon's Defense Intelligence Agency.
But despite her crimes, Montes remains largely unknown.
You might not think Cuba could do much harm to a superpower like the U.S., said retired DIA official Chris Simmons, appearing on CNN's "Declassified." But you'd be wrong... more
Programming note: Explore untold stories of American spies: CNN Original Series "Declassified" airs Sundays at 10 p.m. ET/PT only on CNN.
Business Espionage: A Brief History
by Daniel Corbett and Michael Disotell
...another early example of industrial espionage came about in the late eighteenth century, when France found itself attempting to compete with the emerging industrial strength of Great Britain. The French government surreptitiously placed apprentices in English iron and steel yards to abscond with production formulas. To maintain its market dominance, Britain became the first country to pass legislation aimed at preventing industrial espionage.
In the United States, American businesses employed former Pinkerton detectives to uncover employee theft after the Civil War. And during the 1920s, anxiety over Communist and unionist upheaval caused companies to hire double agents to expose internal threats. According to a report by the U.S. Senate Committee on Education and Labor, a majority of American companies had placed labor spies in their plants and unions around that time.
As labor-management tensions started to ease after World War II, American companies shifted their focus away from themselves and began spying on competitors. Industrial espionage began to follow one of two familiar patterns: (1) a former employee would misappropriate confidential information before departing for a competitor, or (2) a competitor would place a “mole” inside an organization to gain access to corporate secrets.
Industrial espionage became a global affair during the Cold War, as U.S. businesses faced threats from Soviet spies and multinational competitors alike. For example, in 1982 six executives from the Japanese firms Hitachi and Mitsubishi were arrested in Santa Clara, California, for allegedly trying to steal computer parts from IBM. Companies also became increasingly worried about executives overseas defecting to competitors. A dispute between General Motors and Volkswagen arose when a group of GM executives in Germany left GM to join VW. Upon seeing similar designs in VW’s car models, GM accused VW of using proprietary information gained from its former executives. In one of the largest industrial espionage cases ever, VW settled with GM for $100 million and agreed to buy at least $1 billion worth of car parts from the company. more
...another early example of industrial espionage came about in the late eighteenth century, when France found itself attempting to compete with the emerging industrial strength of Great Britain. The French government surreptitiously placed apprentices in English iron and steel yards to abscond with production formulas. To maintain its market dominance, Britain became the first country to pass legislation aimed at preventing industrial espionage.
In the United States, American businesses employed former Pinkerton detectives to uncover employee theft after the Civil War. And during the 1920s, anxiety over Communist and unionist upheaval caused companies to hire double agents to expose internal threats. According to a report by the U.S. Senate Committee on Education and Labor, a majority of American companies had placed labor spies in their plants and unions around that time.
As labor-management tensions started to ease after World War II, American companies shifted their focus away from themselves and began spying on competitors. Industrial espionage began to follow one of two familiar patterns: (1) a former employee would misappropriate confidential information before departing for a competitor, or (2) a competitor would place a “mole” inside an organization to gain access to corporate secrets.
Industrial espionage became a global affair during the Cold War, as U.S. businesses faced threats from Soviet spies and multinational competitors alike. For example, in 1982 six executives from the Japanese firms Hitachi and Mitsubishi were arrested in Santa Clara, California, for allegedly trying to steal computer parts from IBM. Companies also became increasingly worried about executives overseas defecting to competitors. A dispute between General Motors and Volkswagen arose when a group of GM executives in Germany left GM to join VW. Upon seeing similar designs in VW’s car models, GM accused VW of using proprietary information gained from its former executives. In one of the largest industrial espionage cases ever, VW settled with GM for $100 million and agreed to buy at least $1 billion worth of car parts from the company. more
Ranking Chart of Mobile Devices Perceived as Most Secure
According to a Tech Pro Research survey, Apple is viewed by tech decision-makers as the most secure mobile device option. Samsung is threatening Apple's lead, and Microsoft ranks well on tablets thanks to the Surface. more
Click to enlarge. |
Sunday, July 3, 2016
Why Every Business Needs a Spycam Detection Program & Recording in the Workplace Policy
The American Family Association (AFA) has renewed its call to #BoycottTarget after a man was reportedly arrested for recording girls trying clothes on in a dressing room at the store's branch in Bedford, New Hampshire.
Last week, 22-year-old Zachery Bishop was arrested by the Bedford Police Department following reports that a man was videotaping young girls undressing inside Target's dressing room. In response to the report, AFA president Tim Wildmon released a statement calling on the 1.3 million people who have already signed the #BoycottTarget petition to invite one person each to sign it also, The Christian Post details.
"Over the Independence Day holiday and throughout the month of July, we're asking all those who have signed the #BoycottTarget pledge to work diligently to get just one other person in their circle of influence to sign it as well," said Wildmon in his statement. "We want to give another boost to the boycott against Target's unsafe and family unfriendly bathroom and fitting room policy." more
Get your Spycam Detection Program & Recording in the Workplace Policy here.
Last week, 22-year-old Zachery Bishop was arrested by the Bedford Police Department following reports that a man was videotaping young girls undressing inside Target's dressing room. In response to the report, AFA president Tim Wildmon released a statement calling on the 1.3 million people who have already signed the #BoycottTarget petition to invite one person each to sign it also, The Christian Post details.
"Over the Independence Day holiday and throughout the month of July, we're asking all those who have signed the #BoycottTarget pledge to work diligently to get just one other person in their circle of influence to sign it as well," said Wildmon in his statement. "We want to give another boost to the boycott against Target's unsafe and family unfriendly bathroom and fitting room policy." more
Get your Spycam Detection Program & Recording in the Workplace Policy here.
Wiretaps Stymied By Encryption Decreased in 2015
by Cory Bennett
Wiretaps encountering encryption dropped from 22 in 2014 to seven in 2015, according to a new report from the Administrative Office of the U.S. Courts. The report also found that despite this decline, wiretaps overall went up 16 percent during that same time span, from 3,554 in 2014 to 4,148 last year. more (requires sign-in)
Wiretaps encountering encryption dropped from 22 in 2014 to seven in 2015, according to a new report from the Administrative Office of the U.S. Courts. The report also found that despite this decline, wiretaps overall went up 16 percent during that same time span, from 3,554 in 2014 to 4,148 last year. more (requires sign-in)
Subscribe to:
Posts (Atom)