Showing posts with label ethics. Show all posts
Showing posts with label ethics. Show all posts

Thursday, November 12, 2015

Big Taps in The Big House

Thousands of confidential phone conversations between inmates and their lawyers have been recorded 
by a leading prison phone company that also serves New York City jails — a major data breach exposed by a hacker, according to a report.

The anonymous hacker believes the company, Securus Technologies, is violating prisoners’ constitutional rights by recording privileged conversations, The Intercept reported Wednesday.

Of 70 million phone-call records obtained by The Intercept, 14,000 were for legally protected calls made to prisoners’ attorneys, The Intercept said. more

Wednesday, September 9, 2015

Chess Cheat Caught Using Morse Code and Spy Camera

An Italian chess player has been removed from one of Italy’s most prestigious tournaments after allegedly using Morse code and a hidden camera to cheat. 

Arcangelo Ricciardi ranked at 51,366 in world when he entered the International Chess Festival of Imperia in Liguria, Italy and surprised his competitors when he easily escalated to the penultimate round...

Jean Coqueraut, the tournament's referee told La Stampa newspaper: “In chess, performances like that are impossible. I didn’t think he was a genius, I knew he had to be a cheat.”

He was “batting his eyelids in the most unnatural way,” added Mr Coqueraut. “Then I understood it. He was deciphering signals in Morse code.”

Mr Riccardi was forced to pass through a metal detector by the game organisers, revealing a sophisticated pendent hanging round his neck beneath his shirt, according to the Telegraph.

The pendant reportedly contained a small video camera, wires, which attached to his body, and a 4cm box under his arm pit.

To conceal the pendant around his neck, Mr Riccardi drank constantly from a glass of water and wiped his face with a handkerchief, according to Mr Coqueraut.

It is believed the camera was used to transmit the chess game to an accomplice or computer, which then suggested the moves Mr Riccardi should perform next. These moves were allegedly communicated to him through the box under his arm.

Mr Riccardi denies that he cheated and has claimed that the devices were good luck charms, according to reports. more

Wednesday, August 19, 2015

Security Director Alert - NLRB Bans Blanket Confidentiality Policies for Workplace Investigations

It is common practice for employers to prohibit their employees from discussing ongoing workplace investigations. 

Many employers believe that this restriction is necessary to ensure the integrity and fairness of investigations involving employee misconduct. As a result, employers often have policies that require confidentiality in all workplace investigations.

According to a 2015 decision by the National Labor Relations Board (NLRB), these policies are illegal. The decision, known as Banner Estrella, states that employers cannot enforce a blanket policy requiring confidentiality during workplace investigations. Because of this decision, many employers will need to update their policies and human resources (HR) practices. more

Wednesday, August 12, 2015

Four Signs Your Boss Is Spying on You

Chances are, your boss is keeping an eye on you. Forty-three percent of companies actively monitor employee emails, according to the American Management Association (AMA), and roughly the same number track the time you spend on the phone and who you call (16% go so far as to record those calls). Nearly half of companies say they use video to reduce theft and workplace sabotage...

1. You’re secretly planning to quit – and your boss already knows
More companies, including Credit Suisse and AOL, are mining big data to make predictions about which employees are likely to leave their job in the near future. VoloMetrix, Inc., an analytics firm, examined employee emails and calendar data and discovered that it could predict up to a year in advance who would be putting in their notice, the Wall Street Journal reported...

2. You’re called out for a conversation that you thought was private
If your boss reprimands you for a less-than-professional conversation or email exchange that you thought was private, there’s a chance you have a tattletale co-worker. Or your supervisor may be spying on you, perhaps by scanning your email, monitoring your phone conversations, or even looking at the text messages you send on your work-issued device. If they’re using a key-logging program or other monitoring software, they may even know what you’re saying in your personal emails.

3. Your boss knows what you did this weekend before you tell him
Does your boss seem to know an awful lot about your personal life? He or she could be checking out your Facebook, Twitter, Instagram, or other social media profiles, even if you haven’t added him to your network or given him your password (something that some employers really do ask for, though laws about that are changing). Stalking your public profiles is a bit creepy, but it’s not all that unusual...

4. There’s some suspicious software on your devices
If your company’s IT department is monitoring your computer use, it’s not always going to be immediately obvious. However, you can poke around on your desktop to see if there are any telltale signs of monitoring software (Online Tech Tips has some advice on how to do that, if you’re so inclined). The same goes for unusual apps installed on smartphones... more

Sunday, March 15, 2015

He Wiretapped His Way Into Her Heart

AR - A little wiretapping and a less than harmonious conversation with another man were the catalyst for romance in 1986 for Beth Guerin and the office telephone installation tech.

He had certainly noticed her. The really cute girl who was answering phones part time in the doctor's office? Yes, 19-year-old Darrin Adcock had noticed her. He was doing a job for a small telecommunications company in Hot Springs, and he likely would have left without exchanging a word with her had he not made a small mistake first.

"I had my test set and I accidentally clicked onto the line that she was on. And I listened. Maybe I shouldn't have, but I did," Darrin says. "I really didn't mean to do that, but in doing so I heard her talking to her then-boyfriend and realized her and her boyfriend were not getting along and I thought, 'Well, this is kind of neat.'" more

Thursday, February 5, 2015

Security Director Alert - DarkLeaks - The Espionage Bazaar

It looks like the days when concerned individuals share the inner secrets of corporations and governments only due to their nagging consciences are numbered, from here on in they will do so for nothing more than a fast buck. 

A new WikiLeaks-style website has recently been announced that will reward its contributors with Bitcoins in exchange for information.  

If the most valuable commodity is information then it is about to get its own hypermarket; DarkLeaks will allow uses to sell leaked data to the highest bidder in an anonymous blockchain-powered environment where anything goes.

DarkLeaks is being developed by unSystem who are behind DarkWallet, and DarkMarket an anonymous ebay-style marketplace which unlike Silk Road operates on the P2P model so that there is no central point of failure for law enforcement to take down.

The DarkLeaks system is so secure that it does not even allow communication between the seller and the buyer of information. Their website states: “The software uses bitcoin’s blockchain to encrypt files which are released when payment is claimed by the leaker. Files are split into segments and encrypted. These segments are unlocked only when the leaker reveals the key by claiming his bitcoins.”

There are also no limits on the type of content that can be bought and sold. Everything from evidence of corporate corruption to naked pictures of celebrities is up for grabs. UnSystem developer Amir Taaki has told CoinDesk that platforms like DarkLeaks provide a financial incentive for insiders to reveal information thereby “devaluing business models based around proprietary secrecy”.
(more)

This is going to be a BIG problem for corporations. 
Those without a counterespionage strategy will hurt first.

Thursday, January 15, 2015

What Do These 3 Spy Tools Have in Common?

SPIKE MIC
The Spike Mic Launcher is a remote listening device delivering audio surveillance. The Spike Mic dart has a built in microphone with two interchangeable tips: Sticky Dart and Suction Cup. Launch it or stick it to a surface and listen. With a live audio feed you’ll remain undetected as you hear conversations happening in far away locations. Digital transmission in the 2.4 GHz Wi-Fi band.

TRI-OPTICS VIDEO WATCH
Record up to 20 minutes of video using 3 unique lenses on the Tri-Optics Video Watch. Rotate the watch’s outer ring to switch between standard, wide or zoom lenses. Hide your watch in an unsuspecting location and let the internal motion detector auto-record video whenever it detects movement. Use the included USB cable to download your footage and charge the Tri-Optics Video Watch. Stream, record and capture live video and photos.

SPY WIRE MIC
Spy Wire Mic lets you record conversations covertly! Attach the recording device to your belt and line your jacket with the wired microphone. Press the record button to activate audio recording and capture conversation.

ANSWERS
• Low price (between $9.99 and $39.99)
• Available at Walmart.
• Recommended for ages 8+

Building a generation of adults predisposed to snooping one birthday at a time.

Tuesday, December 16, 2014

Elf on the Shelf - Naughty or nice – or maybe just creepy?

Since 2005, the Elf on the Shelf has been a holiday tradition in homes. Children love seeing the little elf pop up in unexpected places. But one Canadian professor says the doll is not all fun and games — it’s teaching children to accept people spying on them.

In her paper, published in the Canadian Center for Policy Alternatives, Laura Pinto... argues that the children with an elf in their home, often cater to and try to always be on their best behavior for the doll, a fictional representation of power, instead of “engaging in and honing understandings of social relationships with peers, parents, teachers, and ‘real life’ others.”

The professor tells the Toronto Star, “If you grow up thinking it’s cool for the elves to watch me and report back to Santa, well, then it’s cool for the NSA to watch me and report back to the government.(more)

Monday, October 13, 2014

Huff Butt Dial Blues

If a person accidentally calls someone from their cell phone, do they have a right to privacy protecting any conversation heard on the other end? The courts don’t think so.

Jim Huff, then chairman of the Kenton County (Kentucky) Airport Board, which manages Cincinnati’s international airport, was at a conference in Italy on October 24, 2013, when he unintentionally dialed airport offices while his phone was in his pocket and reached Carol Spaw. Spaw listened to Huff’s conversation for 90 minutes, even writing down some of his remarks and passing them along to a third party.

Huff claimed Spaw’s actions violated his right to privacy, since he never intended to “pocket dial” her in the first place.

But a federal judge didn’t agree, ruling individuals don’t have a reasonable expectation of privacy due to the common problem of pocket dialing and “butt calls.” (more) (sing-a-long)

Sunday, August 31, 2014

Broker, Trader, Lawyer, Spy: The Secret World of Corporate Espionage

In this penetrating work of investigative and historical journalism, Eamon Javers explores the dangerous and combustible power spies hold over international business.

Today's global economy has a dark underbelly: the world of corporate espionage. Using cutting-edge technology, age-old techniques of deceit and manipulation, and sheer talent, spies act as the hidden puppeteers of globalized businesses... Readers meet the spies who conduct surveillance operations, satellite analysts who peer down on corporate targets from the skies, veteran CIA officers who work for hedge funds, and even a Soviet military intelligence officer who now sells his services to American companies.

Intelligence companies and the spies they employ are setting up fake Web sites to elicit information, trailing individuals and mirroring travel itineraries, dumpster-diving in household and corporate trash, using ultrasophisticated satellite surveillance to spy on facilities, acting as impostors to take jobs within companies or to gain access to corporations, concocting elaborate schemes of fraud and deceit, and hacking e-mail and secure computer networks.


This globalized industry is not a recent phenomenon, but rather a continuation of a fascinating history. The story begins with Allan Pinkerton, the nation's first true "private eye," and extends through the annals of a rich history that includes tycoons and playboys, presidents and FBI operatives, CEOs and accountants, Cold War veterans and military personnel. (more)

Tuesday, April 15, 2014

Don't Be a Pawn: A Warning to Students Abroad

Former American college student Glenn Duffie Shriver studied abroad in Shanghai, People's Republic of China.

There, he became a target of Chinese intelligence services and crossed the line when he agreed to participate in espionage-type activity.

He pleaded guilty to conspiring to commit espionage for a foreign government and was sentenced to a four-year term in federal prison.

This video contains excerpts from a prison cell interview where Shriver tells his own story, and warns U.S. students about the foreign intelligence threat. (more)

Thursday, March 27, 2014

U.S. Notified 3,000 Companies About Cyberattacks in 2013

Federal agents notified more than 3,000 U.S. companies last year that their computer systems had been hacked, White House officials have told industry executives, marking the first time the government has revealed how often it tipped off the private sector to cyber intrusions.

The alerts went to firms large and small, from local banks to major defense contractors to national retailers...


“Three thousand companies is astounding,” said James A. Lewis, a senior fellow and cyberpolicy expert at the Center for Strategic and International Studies. “The problem is as big or bigger than we thought.”

The number reflects only a fraction of the true scale of cyberintrusions into the private sector by criminal groups and foreign governments and their proxies, particularly in China and Eastern Europe. The estimated cost to U.S. companies and consumers is up to $100 billion annually, analysts say. (more)

Monday, February 24, 2014

"My ankle bracelets are so good, I wear one myself!"

CA - FBI agents arrested a Mexican tycoon named Jose Susumo Azano Matsura at his Coronado, Calif. home on Wednesday as part of a political bribery investigation based on captured emails, seized banking records, and covertly recorded conversations.

The unfolding scandal is soaked in irony: Azano is a surveillance evangelist whose company won a secret, no-bid contract with the Mexican military for computer and mobile phone hacking and spying technology in 2011. He is chairman of a company called Security Tracking Devices SA de CV, and he is now chained to a tracking device—on house arrest. (more)

Privacy Art that Tells You a Story... really

This company (lithographs.com) turns the text of various books into a piece of appropriately themed text-art and makes lithographs, tees and tote-bags out of it. 

Cory Doctorow announced that the company has produced a line of Lithographs based on his novel Little Brother, with a gorgeous anti-surveillance design by Benjy Brooke. (more)

via wikipedia.com...
Little Brother is a novel by Cory Doctorow, published by Tor Books. It was released on April 29, 2008. The novel is about four teenagers in San Francisco who, in the aftermath of a terrorist attack on the San Francisco – Oakland Bay Bridge and BART system, defend themselves against the Department of Homeland Security's attacks on the Bill of Rights. The novel is available for free on the author's website under a Creative Commons license, keeping it accessible to all.

The book debuted at No. 9 on The New York Times Best Seller list, children's chapter book section, in May 2008. As of July 2, it had spent a total of six weeks on the list, rising to the No. 8 spot. Little Brother won the 2009 White Pine Award, the 2009 Prometheus Award. and the 2009 John W. Campbell Memorial Award. It also was a finalist for the Hugo Award for Best Novel. Little Brother received the Sunburst Award in the young adult category. 


The New York Times says, “Little Brother isn't shy about its intent to disseminate subversive ideas to a young audience. The novel comes with two afterword essays by cryptographer and computer security specialist Bruce Schneier, and hacker Andrew "bunnie" Huang, and has a bibliography of techno-countercultural writings, from Jack Kerouac's "On the Road" to Schneier’s "Applied Cryptography." (more)

Thursday, February 20, 2014

Hero: TSCM Bug Report Author Fired for Not Changing Report Under Political Pressure

Turkey - The former head of the Scientific and Technological Research Council of Turkey's (TÃœBÄ°TAK) Research Center for Advanced Technologies on Informatics and Information Security (BÄ°LGEM) has said he was forced to make changes in a report as part of an investigation into a "bugging device" found at the prime minister's office.

In a blistering statement over his dismissal from the top post at BÄ°LGEM, a critical department within TÃœBÄ°TAK that prepares expert reports for court cases and state agencies, Hasan Palaz said he was forced to make changes on a scientific report that was prepared as part of a criminal investigation into the installment of bugging devices at Prime Minister Recep Tayyip ErdoÄŸan's office in Parliament and his home in 2012...

In a stern warning, he said the government's interference in TÃœBÄ°TAK reports and politicians' meddling in scientific inquiries would be suicide for the science world.

The discovery of the bugging devices led to an outcry and fueled a debate over who is responsible for monitoring and bugging the prime minister's office. (more)


Note: Although this translated news story makes it sound as if he did make the change, a careful reading of the whole story indicates he did not, hence his dismissal. 

From the other side of the fence in Turkey today...

Turkey - Battling a corruption scandal, Turkish Prime Minister Tayyip Erdogan is seeking broader powers for his intelligence agency, including more scope for eavesdropping and legal immunity for its top agent, according to a draft law seen by Reuters. (more)

UPDATE: (2/22/14) - Turkish prime minister Recep Tayyip Erdogan has said that two suspects believed to be involved in a bugging scandal have fled the country. (more)