As school carpenter Cory Webster replaced dozens of deteriorating rubber door stoppers that were installed to help keep Palos Verdes Peninsula classrooms safe in the event of a lockdown, he thought there must be a better way...
The 123 Lock-down Latch works much like a hotel door bumper: a teacher simply slides the metal lever to prevent a locked door from closing. When a lockdown happens, anyone inside the classroom can slide the lever back and the door closes and locks...
Because most classroom doors can only be locked from the outside with a key, the teacher can leave the door locked but with the latch engaged during passing period to allow students in and out easily. In the event of an active shooter, it’s not always safe for a teacher to step outside to lock the door. With the latch, there’s no need to fumble for keys or leave the classroom to secure the door. more
Wednesday, February 28, 2018
Austria: Bugging Devices Found... and then, a break-in!
The office of Austrian far-right leader and vice chancellor Heinz-Christian Strache was broken into this week, shortly after bugging devices were discovered there, and a criminal inquiry has been launched, prosecutors said on Thursday.
The break-in occurred on Wednesday night while Strache, whose Freedom Party entered the governing coalition after elections in October, was out for dinner, his spokesman said, confirming an earlier report by broadcaster Oe24.
The spokesman said the electronic surveillance devices had been discovered last week behind a mirrored wall by intelligence service specialists. “This was a routine check after moving into a new office,” he said. more
TSCM 101 - When you find one bug, don't stop looking. A post-discovery break-in may indicate the removal of additional, and more sophisticated bugs. Later discovery of these devices might implicate who planted them in the first place. ~Kevin
The break-in occurred on Wednesday night while Strache, whose Freedom Party entered the governing coalition after elections in October, was out for dinner, his spokesman said, confirming an earlier report by broadcaster Oe24.
The spokesman said the electronic surveillance devices had been discovered last week behind a mirrored wall by intelligence service specialists. “This was a routine check after moving into a new office,” he said. more
TSCM 101 - When you find one bug, don't stop looking. A post-discovery break-in may indicate the removal of additional, and more sophisticated bugs. Later discovery of these devices might implicate who planted them in the first place. ~Kevin
Tuesday, February 27, 2018
Smartphone Goes Dark at the Flip of a Switch
Cybersecurity firm DarkMatter has launched its first smartphone, designed to stop spy agencies listening to you.
An Android device called Katim, it was made available commercially Monday at Mobile World Congress in Barcelona, Spain, and has a 5.2-inch display, as well as a high level of encryption...
One security feature built by the Middle East-based firm is called "shield mode," which disconnects power from the microphone and camera on the device so that nobody can spy on your conversations. more
An Android device called Katim, it was made available commercially Monday at Mobile World Congress in Barcelona, Spain, and has a 5.2-inch display, as well as a high level of encryption...
One security feature built by the Middle East-based firm is called "shield mode," which disconnects power from the microphone and camera on the device so that nobody can spy on your conversations. more
The Case of the License Plate ICE Pick
The Immigration and Customs Enforcement (ICE) agency has officially gained agency-wide access to a nationwide license plate recognition database, according to a contract finalized earlier this month. The system gives the agency access to billions of license plate records and new powers of real-time location tracking, raising significant concerns from civil libertarians...
ICE agents would be able to query that database in two ways. A historical search would turn up every place a given license plate has been spotted in the last five years, a detailed record of the target’s movements. That data could be used to find a given subject’s residence or even identify associates if a given car is regularly spotted in a specific parking lot. more
As foreshadowed...
ICE agents would be able to query that database in two ways. A historical search would turn up every place a given license plate has been spotted in the last five years, a detailed record of the target’s movements. That data could be used to find a given subject’s residence or even identify associates if a given car is regularly spotted in a specific parking lot. more
As foreshadowed...
Personal Phone Calls at Work Can Put Employers in Jeopardy
This from a California court: Employers unwise to permit use of company
telephones for personal calls—at least if the employer plans to record
those calls.
Note: Many other states follow the more restrictive version of Federal law–two party consent–as well. ~Kevin
- Two-party consent means two-party consent: All parties to a call must be told the call is going to be recorded and must consent.
- Employers with recording systems should consider barring use of company telephones for personal calls and making sure that people receiving calls on a recorded line automatically are informed, up front, that the call will be recorded.
- Barring all personal calls is not necessary, but it may offer some protection against the legal consequences of a breakdown in the employer’s system of ensuring notice to all parties before the recording begins.
Note: Many other states follow the more restrictive version of Federal law–two party consent–as well. ~Kevin
Saturday, February 24, 2018
Extortionography and the Missouri Gov. Eric Greitens Felony Indictment
Missouri Gov. Eric Greitens, who was once considered a rising star in the Republican Party, has been under siege since January, when accusations emerged that he threatened to use a nude photo to blackmail his former hairstylist, with whom he was having an extramarital affair.
Greitens had allegedly threatened the woman by saying he would distribute a nude photo he had secretly taken of her if she exposed their relationship.
The accusations stemmed from a covert recording by the woman’s ex-husband published by KMOV in St. Louis, in which the woman is heard describing how Greitens invited her to his home in 2015 and, with her consent, taped her hands to exercise rings and blindfolded her. He then allegedly took a photo of her naked. more
What is extortionography?
Greitens had allegedly threatened the woman by saying he would distribute a nude photo he had secretly taken of her if she exposed their relationship.
The accusations stemmed from a covert recording by the woman’s ex-husband published by KMOV in St. Louis, in which the woman is heard describing how Greitens invited her to his home in 2015 and, with her consent, taped her hands to exercise rings and blindfolded her. He then allegedly took a photo of her naked. more
What is extortionography?
Mystery 911 Calls from Apple Repair Center
Apple is working with local police to remedy a surge in unintentional emergency calls to 911 that are originating from the company’s distribution and repair center in Elk Grove, California.
The influx of calls has been ongoing for months, averaging 20 accidental calls a day and totaling over 1,600 since October.
911 dispatchers hear silence and intermittent employee chatter when the calls come in. more
Thursday, February 22, 2018
FutureWatch: Tomorrow's Spys Today
"Help young people. Help small guys. Because small guys will be big. Young people will have the seeds you bury in their minds, and when they grow up, they will change the world."
~Jack Ma
Teens at the Library for grades 6-10: Spy Academy
Categories: Community
Date: Thursday, February 22, 2018
Start Time: 6:30 PM (GMT-05:00) Eastern Time (US & Canada)
End Time: 7:30 PM
Location Northeast Regional Library, 14401 Green Elm Ln, Raleigh, NC 27614
Google Calendar Yahoo! Calendar Windows Live Calendar iCal/Outlook
Put your sleuth skills to the test. Come for a night of code breaking, laser-beams, memory, and more!
For more information...
~Jack Ma
Teens at the Library for grades 6-10: Spy Academy
Categories: Community
Date: Thursday, February 22, 2018
Start Time: 6:30 PM (GMT-05:00) Eastern Time (US & Canada)
End Time: 7:30 PM
Location Northeast Regional Library, 14401 Green Elm Ln, Raleigh, NC 27614
Google Calendar Yahoo! Calendar Windows Live Calendar iCal/Outlook
Put your sleuth skills to the test. Come for a night of code breaking, laser-beams, memory, and more!
For more information...
Dronebusters
Two drones headed north above Capitol Boulevard toward the Idaho statehouse. Lt. Gov. Brad Little stood to Gov. Butch Otter’s right at the top of the Capitol steps and watched...
The demonstration by Black Sage Technologies showed off the Boise company’s system to immobilize drones that might be carry a bomb, drop contraband or weapons into prison recreation yards, or spy on sensitive operations.
Black Sage uses cameras, radar and other tools to detect drones. It can see them at least three and a half miles away. The company sometimes demonstrates its anti-drone system at military bases. Wednesday’s exhibition was one of the few times the public has gotten to see it. more
The demonstration by Black Sage Technologies showed off the Boise company’s system to immobilize drones that might be carry a bomb, drop contraband or weapons into prison recreation yards, or spy on sensitive operations.
Black Sage uses cameras, radar and other tools to detect drones. It can see them at least three and a half miles away. The company sometimes demonstrates its anti-drone system at military bases. Wednesday’s exhibition was one of the few times the public has gotten to see it. more
The Employee Competitor: Spy in the Yogurt
Click here. |
On Wednesday, Bloomberg reported that Dannon Co. sued its former senior vice president, Federico Muyshondt, alleging he divulged trade secrets to colleagues at his new job, which is with Chobani LLC. Both of these companies, obviously, are renowned for their yogurt.
According to the complaint—filed in a federal court in White Plains, New York—Muyshondt stands accused of pilfering details of Dannon’s business strategy, plans for forthcoming products, and lists of customers before he left the company in January to take a job with Chobani, which was not named as a defendant in the lawsuit. more
Report Reveals 50% of Organizations Don't Provide Employee Information Security Training
New cybersecurity reports just released by Cisco and Verizon Wireless
say that businesses are faced with more sophisticated security threats
from wireline and wireless devices running on their networks.
Perhaps the more disturbing revelation of Verizon’s study is that it’s not hacktivists, criminals or those engaging in corporate espionage that pose the greatest threat, but a company’s own employees. However, only 50% of all organizations provide IT training when a new employee joins a company. more
Observation: Interestingly, even fewer businesses proactively check for all the other methods of corporate espionage, e.g. regular information security surveys and technical surveillance countermeasures inspections.
Coincidentally, the few that are pro-active seem to be among the most successful and profitable companies in America. Just coincidence?
Perhaps the more disturbing revelation of Verizon’s study is that it’s not hacktivists, criminals or those engaging in corporate espionage that pose the greatest threat, but a company’s own employees. However, only 50% of all organizations provide IT training when a new employee joins a company. more
Observation: Interestingly, even fewer businesses proactively check for all the other methods of corporate espionage, e.g. regular information security surveys and technical surveillance countermeasures inspections.
Coincidentally, the few that are pro-active seem to be among the most successful and profitable companies in America. Just coincidence?
Wednesday, February 21, 2018
You Are Never a Stranger in Our City - Facial Recognition Street Cams
Nvidia has partnered with AI developer AnyVision to create facial recognition technology for "smart cities" around the world. The two companies will work to install automatic facial recognition into CCTV (closed-circuit television) surveillance cameras.
AnyVision claims the technology enables cameras that can continuously scan for faces 24/7, automatically identifying and tracking individuals within a large crowd with 99% accuracy.
Algorithms working with human monitors can then compare the faces identified against a database of known terrorists or criminals.
The company also says it's committed to protecting the personal data that CCTV cameras collect.
So... is this technology terrifying, and possibly everything Orwell warned us about? Absolutely.
But it could also save thousands of lives. The technology could be useful not only for catching at-large criminals, but also for quickly identifying suspects, and tracking down individuals who have gone missing. more
You may recall, this has been tried before and its comeback was predicted here in 2008.
AnyVision claims the technology enables cameras that can continuously scan for faces 24/7, automatically identifying and tracking individuals within a large crowd with 99% accuracy.
Algorithms working with human monitors can then compare the faces identified against a database of known terrorists or criminals.
The company also says it's committed to protecting the personal data that CCTV cameras collect.
So... is this technology terrifying, and possibly everything Orwell warned us about? Absolutely.
But it could also save thousands of lives. The technology could be useful not only for catching at-large criminals, but also for quickly identifying suspects, and tracking down individuals who have gone missing. more
You may recall, this has been tried before and its comeback was predicted here in 2008.
Monday, February 19, 2018
Slick and Wise Espionage Ethics Discussion
NM - Two former U.S. intelligence officials will discuss the cloak-and-dagger world of espionage and the difficult ethical dilemmas it poses for U.S. spies at a lecture in Albuquerque on Feb. 25.
Stephen Slick, director of the University of Texas at Austin’s Intelligence Studies Project, and Douglas Wise, retired senior CIA operations officer, will wrestle with the question of whether a profession that requires lying, cheating, stealing, manipulating, exploiting and deceiving should have ethical boundaries. In a Journal interview, Slick said every potential intelligence officer must answer that question for themselves, and that their ultimate responsibility is adhering to U.S. and international law.
The panel discussion – part of the Albuquerque International Association’s ongoing lecture series – is Sunday, Feb. 25, from 3 p.m. to 5 p.m. at the UNM Continuing Education Auditorium.
Slick said the subject of espionage and ethics is popular among his students, who are often contemplating careers in intelligence. more
Stephen Slick, director of the University of Texas at Austin’s Intelligence Studies Project, and Douglas Wise, retired senior CIA operations officer, will wrestle with the question of whether a profession that requires lying, cheating, stealing, manipulating, exploiting and deceiving should have ethical boundaries. In a Journal interview, Slick said every potential intelligence officer must answer that question for themselves, and that their ultimate responsibility is adhering to U.S. and international law.
The panel discussion – part of the Albuquerque International Association’s ongoing lecture series – is Sunday, Feb. 25, from 3 p.m. to 5 p.m. at the UNM Continuing Education Auditorium.
Slick said the subject of espionage and ethics is popular among his students, who are often contemplating careers in intelligence. more
Just when you thought there were no more places to hide a spycam...
FL - A 54-year-old Southside man is behind bars after a young woman found a tiny camera hidden inside a loofah as she was taking a shower in their home, according to the Jacksonville Sheriff’s Office.
Kelly Lloyd Birkley remains jailed on $25,000 bail after being charged Monday with video voyeurism of someone 19 or older. Responding officers found Birkley sitting in a car in the driveway, reporting that he told them “I’m a dirty old man” when they approached, according to his arrest report...
Court records show Birkley’s wife filed a temporary injunction for protection against him the same day he was arrested. more
Kelly Lloyd Birkley remains jailed on $25,000 bail after being charged Monday with video voyeurism of someone 19 or older. Responding officers found Birkley sitting in a car in the driveway, reporting that he told them “I’m a dirty old man” when they approached, according to his arrest report...
Court records show Birkley’s wife filed a temporary injunction for protection against him the same day he was arrested. more
Hacktivists - Hackers Who Hack For Privacy
Another day, another data breach – This time it is Retina-X Studios, a well know spyware developing firm.
There are different types of hackers, some hack for profit while some hack for good and then there are hacktivists who do it for the cause...
...the company suffered a security breach in April 2017 revealing that Retina’s software are also used to spy on customers to keep an eye on their partners without their consent which is unlawful...
Retina-X has once again suffered a data breach in which a hacker going by the online handle of Precise Buffalo on Mastodon server has targeted Retina-X and completely erased 1 terabyte of data from its cloud server including photos customers stole from unsuspecting users including kids who installed Retina-X’s Phonesheriff application on their smartphone...
“None of this should be online at all. “Aside from the technical flaws, I really find this category of software disturbing. In the US, it’s mainly targeted to parents,” the hacker said, explaining his motivations for going after Retina-X. “Edward Snowden has said that privacy is what gives you the ability to share with the world who you are on your own terms, and to protect for yourself the parts of you that you’re still experimenting with. I don’t want to live in a world where younger generations grow up without that right,” said the hacker.
This is not the first time when a spyware developer has been hacked. Previously mSpy was compromised when a hacker stole personal data of 400,000 users and leaked it online. more
There are different types of hackers, some hack for profit while some hack for good and then there are hacktivists who do it for the cause...
...the company suffered a security breach in April 2017 revealing that Retina’s software are also used to spy on customers to keep an eye on their partners without their consent which is unlawful...
Retina-X has once again suffered a data breach in which a hacker going by the online handle of Precise Buffalo on Mastodon server has targeted Retina-X and completely erased 1 terabyte of data from its cloud server including photos customers stole from unsuspecting users including kids who installed Retina-X’s Phonesheriff application on their smartphone...
“None of this should be online at all. “Aside from the technical flaws, I really find this category of software disturbing. In the US, it’s mainly targeted to parents,” the hacker said, explaining his motivations for going after Retina-X. “Edward Snowden has said that privacy is what gives you the ability to share with the world who you are on your own terms, and to protect for yourself the parts of you that you’re still experimenting with. I don’t want to live in a world where younger generations grow up without that right,” said the hacker.
This is not the first time when a spyware developer has been hacked. Previously mSpy was compromised when a hacker stole personal data of 400,000 users and leaked it online. more
Friday, February 16, 2018
EU Kills Nanny, and other covert cams used to spot theft and wrong-doing.
Translation |
In a recent legal case, a Spanish supermarket set up hidden CCTV cameras to monitor its employees after it uncovered theft at one of its stores. The footage collected showed five employees stealing items. The employees were confronted and admitted to theft, after which they were dismissed.
They pursued unfair dismissal claims, arguing that the use of the covert video evidence was an infringement of their privacy rights. The European Court of Human Rights agreed that the use of covert cameras constituted a violation of the employees' right to privacy and breached Spanish data protection law.
How does this apply in the UK? more
Minion nanny cams. Soon to be discounted.
Sunshine Disinfects Fortune Over iPhone Spyware, or Tobacco Rode... away.
Fifty dollars worth of spy gear just cost this Yale grad a fortune.
Brooklyn Heights dad Crocker Coulson forfeited any claim to his estranged wife’s tobacco fortune after he bugged her iPhone with $50 software that allowed him to record confidential meetings with her lawyer and shrink to gain an advantage in their divorce.
Brooklyn Supreme Court Justice Jeffrey Sunshine doled out the “drastic” punishment because of the “unprecedented, contumacious conduct” of the Yale-educated investment consultant. Sunshine added that the punishment was a signal to other divorcing spouses not to violate attorney-client and doctor-patient confidentiality by playing private eye. more
Concerned about your smartphone?
Brooklyn Heights dad Crocker Coulson forfeited any claim to his estranged wife’s tobacco fortune after he bugged her iPhone with $50 software that allowed him to record confidential meetings with her lawyer and shrink to gain an advantage in their divorce.
Brooklyn Supreme Court Justice Jeffrey Sunshine doled out the “drastic” punishment because of the “unprecedented, contumacious conduct” of the Yale-educated investment consultant. Sunshine added that the punishment was a signal to other divorcing spouses not to violate attorney-client and doctor-patient confidentiality by playing private eye. more
Concerned about your smartphone?
Spyscape Opens in New York City Today
Calling all spies: Announcing the opening of SPYSCAPE, a truly unique permanent destination that combines three distinct elements:
• a contemporary museum,
• an immersive experience,
• and a journey of personal discovery.
SPYSCAPE opens at 10am ET on Friday, February 16. (928 8th Avenue, New York, NY)
Students (with valid student ID) can reserve free admission online for the opening weekend (February 16-19).
The Experience:
Upon entry, visitors will receive a unique Identity Band, which uses RFID technology to personalize their experience. They then enter the Briefing, a high-tech theater which rises up through the building as it introduces the world of secret intelligence via an immersive film developed with the studio that creates VFX for films such as Avengers, Ex-Machina and Blade Runner 2049.
Their Spy Profiles are then analyzed in Debrief, where they discover which of the 10 archetypal Spy Roles they are best suited to. This authentic profiling system was developed with a former Head of Training at British Intelligence and top industrial psychologists. The Spy Roles are: Agent Handler, Cryptologist, Hacker, Intelligence Analyst, Intelligence Operative, Special Ops Officer, Spycatcher, Spymaster, Surveillance Officer, Technical Ops Officer. more
• a contemporary museum,
• an immersive experience,
• and a journey of personal discovery.
SPYSCAPE opens at 10am ET on Friday, February 16. (928 8th Avenue, New York, NY)
Students (with valid student ID) can reserve free admission online for the opening weekend (February 16-19).
The Experience:
Upon entry, visitors will receive a unique Identity Band, which uses RFID technology to personalize their experience. They then enter the Briefing, a high-tech theater which rises up through the building as it introduces the world of secret intelligence via an immersive film developed with the studio that creates VFX for films such as Avengers, Ex-Machina and Blade Runner 2049.
Their Spy Profiles are then analyzed in Debrief, where they discover which of the 10 archetypal Spy Roles they are best suited to. This authentic profiling system was developed with a former Head of Training at British Intelligence and top industrial psychologists. The Spy Roles are: Agent Handler, Cryptologist, Hacker, Intelligence Analyst, Intelligence Operative, Special Ops Officer, Spycatcher, Spymaster, Surveillance Officer, Technical Ops Officer. more
Thursday, February 15, 2018
Cuba - Concussion-like Symptoms Found in US Diplomats - Updates
Members of the US diplomatic community in Havana began visiting the embassy’s medical unit in late December 2016 with symptoms, such as headache and ear pain, that they said began after they encountered strange sounds or sensations...
In this preliminary report of a retrospective case series, persistent cognitive, vestibular, and oculomotor dysfunction, as well as sleep impairment and headaches, were observed among US government personnel in Havana, Cuba, associated with reports of directional audible and/or sensory phenomena of unclear origin. These individuals appeared to have sustained injury to widespread brain networks without an associated history of head trauma...
Neurological Manifestations Among US Government Personnel Reporting Directional Audible and Sensory Phenomena in Havana, Cuba
More Questions Raised by Concussion-like Symptoms Found in US Diplomats Who Served in Havana
Neurological Symptoms Among US Diplomats in Cuba
Health Alert – U.S. Embassy Havana, Cuba (February 14, 2018)
In this preliminary report of a retrospective case series, persistent cognitive, vestibular, and oculomotor dysfunction, as well as sleep impairment and headaches, were observed among US government personnel in Havana, Cuba, associated with reports of directional audible and/or sensory phenomena of unclear origin. These individuals appeared to have sustained injury to widespread brain networks without an associated history of head trauma...
Neurological Manifestations Among US Government Personnel Reporting Directional Audible and Sensory Phenomena in Havana, Cuba
More Questions Raised by Concussion-like Symptoms Found in US Diplomats Who Served in Havana
Neurological Symptoms Among US Diplomats in Cuba
Health Alert – U.S. Embassy Havana, Cuba (February 14, 2018)
Wednesday, February 14, 2018
Email Bugs Are Tracking You
Do you want to know exactly when a friend or colleague opens your
email? How about where they are when they do?
Free services now allow us to do a little spying through the email we send. But it's raising some questions about privacy.
A growing number of people are using this technology. One More Company OMC, a company that makes software to detect this kind of
email bugging, released a report last year. It says marketers put bugs
in virtually all of the email they send.
But surprisingly, last year 16 percent of all conversational email-- the messages you send to friends, family and colleagues-- was also tracked. And that's up from 10 percent the year before. video more
---
Counter Measures for Users
Possible measures to restrict the functioning of tracking pixels:
Free services now allow us to do a little spying through the email we send. But it's raising some questions about privacy.
But surprisingly, last year 16 percent of all conversational email-- the messages you send to friends, family and colleagues-- was also tracked. And that's up from 10 percent the year before. video more
---
Counter Measures for Users
Possible measures to restrict the functioning of tracking pixels:
- Set browser and email settings to be as restrictive as possible such that external graphics are only supported after permission, and HTML emails are not supported. Appropriate firewall settings can also be used to do this.
- Some browser extensions can be used to make tracking pixels visible.
- Anonymous surfing with the Tor Browser or use of proxy servers to prevent the download of tracking pixels.
- In order to prevent the collection of additional user data such as browser type or operating system, the support of scripts in the browser can be deactivated. This can however restrict other functions on the Internet under certain circumstances. more
Rango - Spy Mission in Iran
A former high-ranking Iranian military leader recently claimed that Israel used lizard spies that "attract atomic waves" in order to identify the location of Iranian uranium mines.
The remarks, by Hassan Firuzabadi, a military advisor to supreme leader Ayatollah Ali Khamenei, were made in response to the recent arrest of local environmentalists, The Times of Israel reported.
"We found out that their skin attracts atomic waves and that they were nuclear spies who wanted to find out where inside the Islamic Republic of Iran we have uranium mines and where we are engaged in atomic activities," Firuzabadi told the Iranian Labour News Agency...
...the bizarre claim is ridiculous, two reptile experts told Live Science. more
The remarks, by Hassan Firuzabadi, a military advisor to supreme leader Ayatollah Ali Khamenei, were made in response to the recent arrest of local environmentalists, The Times of Israel reported.
"We found out that their skin attracts atomic waves and that they were nuclear spies who wanted to find out where inside the Islamic Republic of Iran we have uranium mines and where we are engaged in atomic activities," Firuzabadi told the Iranian Labour News Agency...
...the bizarre claim is ridiculous, two reptile experts told Live Science. more
Seattle's $3,750,000.00 Lightpole Art Exhibit Closes, or Sightless in Seattle
Back in 2013, the Security Scrapbook featured Seattle's new citywide surveillance system.
"A New Apparatus Capable of Spying on You Has Been Installed Throughout Downtown Seattle. Very Few Citizens Know What It Is, and Officials Don’t Want to Talk About It."
2018...
Five years after activists forced Seattle's mayor to return the city's surveillance drones to their manufacturer, the city has announced that it is terminating its warrantless mass-surveillance program altogether.
The DHS gave the city a $3.6m grant to build out a mesh wireless network that could be enjoyed by the public and also provide communications services during emergencies -- but it was also specked to do continuous location-based surveillance as well as CCTV surveillance from lightpoles all over the city.
Activists worked with the ACLU to pressure the city to work with police to produce a privacy policy that would explain when this data would be gathered, how long it would be retained, and how it would be used. The devices were switched off while these questions were to be answered.
Five years on, the police and city were unable to articulate an answer to these questions, and so now they're spending $150,000 to tear all the gear (including the mesh networking access points) out, rather than accept any limitations on their use. more
"A New Apparatus Capable of Spying on You Has Been Installed Throughout Downtown Seattle. Very Few Citizens Know What It Is, and Officials Don’t Want to Talk About It."
2018...
Five years after activists forced Seattle's mayor to return the city's surveillance drones to their manufacturer, the city has announced that it is terminating its warrantless mass-surveillance program altogether.
The DHS gave the city a $3.6m grant to build out a mesh wireless network that could be enjoyed by the public and also provide communications services during emergencies -- but it was also specked to do continuous location-based surveillance as well as CCTV surveillance from lightpoles all over the city.
Activists worked with the ACLU to pressure the city to work with police to produce a privacy policy that would explain when this data would be gathered, how long it would be retained, and how it would be used. The devices were switched off while these questions were to be answered.
Five years on, the police and city were unable to articulate an answer to these questions, and so now they're spending $150,000 to tear all the gear (including the mesh networking access points) out, rather than accept any limitations on their use. more
Spying is Turning Us into a Stalking Society
Bugging and GPS-tracking used to be so expensive that they were only used by governments and private investigators, but a quick Amazon search offers up a hidden car-tracking device for US$27 (£19).
In the related items: a spy cam disguised as a USB charger, $52. These items are marketed as a “real-time teen-driving coach”, nanny cams or parental control software, but there is nothing to stop them being used for nefarious purposes.
Meanwhile, law enforcement struggles to keep up: victims of stalking or online harassment are frequently told simply to stop going online, which for a 19-year-old in 2018 is like being told not to breathe air.
As the National Stalking Helpline’s manager, Clare Elcombe Webber, points out, it feels like there are near-infinite technologies to help stalkers but few to help victims. more
In the related items: a spy cam disguised as a USB charger, $52. These items are marketed as a “real-time teen-driving coach”, nanny cams or parental control software, but there is nothing to stop them being used for nefarious purposes.
Meanwhile, law enforcement struggles to keep up: victims of stalking or online harassment are frequently told simply to stop going online, which for a 19-year-old in 2018 is like being told not to breathe air.
As the National Stalking Helpline’s manager, Clare Elcombe Webber, points out, it feels like there are near-infinite technologies to help stalkers but few to help victims. more
Tuesday, February 13, 2018
Quote of the Week
“If you're a company doing business with other countries, you can expect that you're being hacked – because they want to know your negotiating position,” Charles Widdis, Security Strategy and Planning Manager at CitiPower and Powercor
Monday, February 12, 2018
Number Stations, Spies... and The Sultans of Swing (?!?!)
Numbers stations: The 'spy radio' that anyone can hear...
For decades, people around the globe have been able to listen in to mysterious spy broadcasts from all over the world with just a radio.
Gordon Corera has been investigating the strange world of number stations. more
For decades, people around the globe have been able to listen in to mysterious spy broadcasts from all over the world with just a radio.
Gordon Corera has been investigating the strange world of number stations. more
The Next Generation of Corporate Spies Begins Training in May
The trailer for a career in spying used to come from movies and TV shows. In May 2018, it will come from gaming. The new game is called Assault Spy.
"The self-proclaimed elite corporate spy Asaru and his deadweight partner Kanoko are hired for a new job in a dreary world dominated by corporations. Their mission? Infiltrate the mega corporation, Negabot. Dash, evade, and smash your way to the truth in this fast paced action game. No secret is safe from THIS bombastic spy duo!"
"The self-proclaimed elite corporate spy Asaru and his deadweight partner Kanoko are hired for a new job in a dreary world dominated by corporations. Their mission? Infiltrate the mega corporation, Negabot. Dash, evade, and smash your way to the truth in this fast paced action game. No secret is safe from THIS bombastic spy duo!"
Well, Some Young Spies Still Learn From TV
Bart purchases a mini spy camera and manages to take a picture of Homer dancing next to stripper named Princess Kashmir at a co-worker's strip club party.
He gives copies of the picture to his friends, and eventually the picture starts to circulate around until eventually Marge sees it. She kicks Homer out of the house, but the next day explains that she is not upset about him dancing next to a woman, but rather that Bart saw it.
She demands that he take Bart and go apologize to Princess Kashmir. Homer agrees and says that he is ready to start respecting women.
He gives copies of the picture to his friends, and eventually the picture starts to circulate around until eventually Marge sees it. She kicks Homer out of the house, but the next day explains that she is not upset about him dancing next to a woman, but rather that Bart saw it.
She demands that he take Bart and go apologize to Princess Kashmir. Homer agrees and says that he is ready to start respecting women.
Saturday, February 10, 2018
Book Review - Loose Ends - David B. Watts, PI (really)
Ever read a really good book that you wish would become a feature-length Hollywood movie? Or, a television series, because you wanted to see the main characters in more of their adventures?
Loose Ends, by David B. Watts, is that book. I read it today in one sitting. It left me full of time well spent, yet hungry for more.
Loosely based on an actual case, solved by a real-life private investigator, it’s a multiple murder mystery set in New Jersey.
Geographically, it’s all true. You can almost smell the exhaust coming from the trucks on Route 22, in Union County; see the plushness of a wealthy defense lawyer’s conference room; hear the gasps in the courtroom as the surprise ending unfolds. This read creates a mental movie as the eyes pull the words off the pages.
Total verisimilitude, especially when it comes to private investigations, attorneys, police, prosecutors, and the courtroom.
If you are at loose ends for a great read, yes, tie up with Loose Ends.
Loose Ends, by David B. Watts, is that book. I read it today in one sitting. It left me full of time well spent, yet hungry for more.
Loosely based on an actual case, solved by a real-life private investigator, it’s a multiple murder mystery set in New Jersey.
Geographically, it’s all true. You can almost smell the exhaust coming from the trucks on Route 22, in Union County; see the plushness of a wealthy defense lawyer’s conference room; hear the gasps in the courtroom as the surprise ending unfolds. This read creates a mental movie as the eyes pull the words off the pages.
Total verisimilitude, especially when it comes to private investigations, attorneys, police, prosecutors, and the courtroom.
If you are at loose ends for a great read, yes, tie up with Loose Ends.
Friday, February 9, 2018
The Doctor is In - Twelve Ways Dr. Guri can get into your air-gapped computer.
Faraday rooms or “cages” designed to prevent electromagnetic signals from escaping can nevertheless be compromised and leak highly sensitive data, according to new studies...
In two newly released reports (the other ten are there as well), the team demonstrated how attackers can bypass Faraday enclosures and air gaps to leak data from the most highly secured computers. The Odini method, named after the escape artist Harry Houdini, exploits the magnetic field generated by a computer’s central processing unit (CPU) to circumvent even the most securely equipped room. Click here to watch the demonstration.
“While Faraday rooms may successfully block electromagnetic signals that emanate from computers, low frequency magnetic radiation disseminates through the air, penetrating metal shields within the rooms,” explains Dr. Guri. “That’s why a compass still works inside of a Faraday room. Attackers can use this covert magnetic channel to intercept sensitive data from virtually any desktop PCs, servers, laptops, embedded systems, and other devices.”
In another documented cyberattack dubbed Magneto, researchers utilized malware keystrokes and passwords on an air-gapped computer to transfer data to a nearby smartphone via its magnetic sensor. Attackers can intercept this leaked data even when a smartphone is sealed in a Faraday bag or set on “airplane mode” to prevent incoming and outgoing communications. more
In two newly released reports (the other ten are there as well), the team demonstrated how attackers can bypass Faraday enclosures and air gaps to leak data from the most highly secured computers. The Odini method, named after the escape artist Harry Houdini, exploits the magnetic field generated by a computer’s central processing unit (CPU) to circumvent even the most securely equipped room. Click here to watch the demonstration.
“While Faraday rooms may successfully block electromagnetic signals that emanate from computers, low frequency magnetic radiation disseminates through the air, penetrating metal shields within the rooms,” explains Dr. Guri. “That’s why a compass still works inside of a Faraday room. Attackers can use this covert magnetic channel to intercept sensitive data from virtually any desktop PCs, servers, laptops, embedded systems, and other devices.”
In another documented cyberattack dubbed Magneto, researchers utilized malware keystrokes and passwords on an air-gapped computer to transfer data to a nearby smartphone via its magnetic sensor. Attackers can intercept this leaked data even when a smartphone is sealed in a Faraday bag or set on “airplane mode” to prevent incoming and outgoing communications. more
Wednesday, February 7, 2018
Facial Recognition Glasses Used by Police to Identify Suspects
Chinese police are using dark sunglasses equipped with facial recognition technology to spot criminal suspects.
The glasses, which are being worn by police at a busy train station ahead of the Chinese New Year travel rush, are linked to a central database which contains details of criminal records.
Wearing the technology, police can almost instantly view an individual's personal details, including name, ethnicity, gender and address.
The scene would not look out of place in an episode of science fiction television drama Black Mirror, which often depicts dark scenarios of humans being overcome by technology.
China is deploying new technologies to monitor people in ways that would unnerve many in the West. more
The glasses, which are being worn by police at a busy train station ahead of the Chinese New Year travel rush, are linked to a central database which contains details of criminal records.
Wearing the technology, police can almost instantly view an individual's personal details, including name, ethnicity, gender and address.
The scene would not look out of place in an episode of science fiction television drama Black Mirror, which often depicts dark scenarios of humans being overcome by technology.
China is deploying new technologies to monitor people in ways that would unnerve many in the West. more
Drama Begins in Waymo v. Uber Trade Secrets Trial
The first day of the Waymo v. Uber trial over self-driving car trade secrets had it all: a packed courtroom, comical technical glitches and the creation of a fake Twitter account in the judge's name.
And that's aside from the testimony.
The high-profile Silicon Valley case pits Waymo -- the self-driving car unit of Google's parent company, Alphabet -- against Uber, the world's most highly valued startup. Waymo claims Uber's former star engineer stole 14,000 "highly confidential" files to develop its own technology. Uber calls the claim "baseless."
Monday was the first day of the trial, which is expected to last at least three weeks. Lawyers for the two companies presented their opening statements, aiming to toss barbs into each other's cases. more
And that's aside from the testimony.
The high-profile Silicon Valley case pits Waymo -- the self-driving car unit of Google's parent company, Alphabet -- against Uber, the world's most highly valued startup. Waymo claims Uber's former star engineer stole 14,000 "highly confidential" files to develop its own technology. Uber calls the claim "baseless."
Monday was the first day of the trial, which is expected to last at least three weeks. Lawyers for the two companies presented their opening statements, aiming to toss barbs into each other's cases. more
Your Cell Phone Sings "Every Step You Take..."
by Guevara Noubir, Professor of Computer and Information Science, Northeastern University
"My group’s recent research has shown how mobile phones can also track their users through stores and cities and around the world – even when users turn off their phones’ location-tracking services.
The vulnerability comes from the wide range of sensors phones are equipped with – not just GPS and communications interfaces, but gyroscopes and accelerometers that can tell whether a phone is being held upright or on its side and can measure other movements too. Apps on the phone can use those sensors to perform tasks users aren’t expecting – like following a user’s movements turn by turn along city streets.
Most people expect that turning their phone’s location services off disables this sort of mobile surveillance. But the research I conduct with my colleagues Sashank Narain, Triet Vo-Huu, Ken Block and Amirali Sanatinia at Northeastern University, in a field called “side-channel attacks,” uncovers ways that apps can avoid or escape those restrictions. We have revealed how a phone can listen in on a user’s finger-typing to discover a secret password – and how simply carrying a phone in your pocket can tell data companies where you are and where you’re going..." more
Monday, February 5, 2018
TSCM, or This Smells Characteristicly Moronic
Pakistan’s security agencies have not found anything suspicious in Chetna Jadhav’s shoes that were confiscated by the Pakistani agencies...
Sources said that Pakistan’s agencies minutely examined her shoes, searching for spying devices.
However, nothing could be found and Pakistan is now likely to attribute this “incident” to an over-enthusiastic security official...
Sources said that the Pakistan Foreign Office was having a hard time dealing with the “concocted” tale of Jadhav’s wife carrying a spying device in her shoe, as it was not being able to answer the questions of local journalists who were asking about the nature of the “spying device” allegedly recovered and why details of the same were not being shared with them. more
Give them a break. Perhaps they misinterpreted the acronym written inside the shoe. TSCM and TGIF look somewhat similar, but TGIF stands for Toes Go In First.
Sources said that Pakistan’s agencies minutely examined her shoes, searching for spying devices.
However, nothing could be found and Pakistan is now likely to attribute this “incident” to an over-enthusiastic security official...
Sources said that the Pakistan Foreign Office was having a hard time dealing with the “concocted” tale of Jadhav’s wife carrying a spying device in her shoe, as it was not being able to answer the questions of local journalists who were asking about the nature of the “spying device” allegedly recovered and why details of the same were not being shared with them. more
Give them a break. Perhaps they misinterpreted the acronym written inside the shoe. TSCM and TGIF look somewhat similar, but TGIF stands for Toes Go In First.
Switzerland - Spy Magnet - Not Welcome Sign
Switzerland has always been a favorite by writers of spy novels as a place where foreign agents from across the world meet and exchange secret information.
But it’s true – and the country is being used more and more by international spies to meet.
It’s a trend the intelligence service wants to stop.
The NZZ newspaper quotes an anonymous source says there’s a rising demand for information and agents are increasingly choosing Switzerland to meet – especially Geneva.
The international city makes it easy for people throughout the world meet without attracting attention due to all the international organizations and a low level of street surveillance.
But Swiss authorities are not happy about living up to the stereotype. The intelligence agency says it’s not in the country’s interest to be a place where information damaging to allies could be swapped and they hope friendly countries would also do the same for Switzerland. more
But it’s true – and the country is being used more and more by international spies to meet.
It’s a trend the intelligence service wants to stop.
The NZZ newspaper quotes an anonymous source says there’s a rising demand for information and agents are increasingly choosing Switzerland to meet – especially Geneva.
The international city makes it easy for people throughout the world meet without attracting attention due to all the international organizations and a low level of street surveillance.
But Swiss authorities are not happy about living up to the stereotype. The intelligence agency says it’s not in the country’s interest to be a place where information damaging to allies could be swapped and they hope friendly countries would also do the same for Switzerland. more
Derailed CEO Accused of Spying on Board Members
South Africa - Railway Safety Regulator board members had their movements monitored and their cars fitted with tracking devices - and their boss allegedly orchestrated the whole thing.
Times Select can reveal that embattled Railway Safety Regulator CEO Nkululeko Poya allegedly spied on board members. She is currently on precautionary suspension after being charged for a string of alleged irregularities, including irregular staff appointments...
The new allegations facing Poya stem from a whistle blower who revealed how he had been engaging in clandestine activities on Poya’s behalf... He that said he worked on Poya’s instructions to spy on board members and find dirt against them. more
Times Select can reveal that embattled Railway Safety Regulator CEO Nkululeko Poya allegedly spied on board members. She is currently on precautionary suspension after being charged for a string of alleged irregularities, including irregular staff appointments...
The new allegations facing Poya stem from a whistle blower who revealed how he had been engaging in clandestine activities on Poya’s behalf... He that said he worked on Poya’s instructions to spy on board members and find dirt against them. more
As Seen on TV - Spycams for Moms
Here's the pitch...
Introducing Smart Spy™
"The USB Wall Charger that is also a Secret Spy Camera! Smart Spy™ has a Micro SD card with 32 GB of memory that can record up to 8 hours of footage! It allows you to capture 1080P HD video footage discretely. Chargers are commonly plugged into walls, so it will never look like it is out of place! It even works as a universal USB wall charger. Now you can see what is going on when you’re not there!
Whether you need to keep an eye out on your kids, pets, hired help, intruders or any suspicious activity! It's so compact, you can even take it with you on the go! Smart Spy™ also has a motion activation feature so you don’t waste recording time when nobody is in the room. It’s so easy to use – just plug it in! When you want to review your recordings, simply plug it into your computer to play back." more
The TV commercial on the site says it all.
One Blue Blaze Irregular quipped, "If these get any cheaper, they will be giving them away in cereal boxes."
Subscribe to:
Posts (Atom)