Monday, May 3, 2010

How Your Competitors May Be Tracking You

Of course, you can use these tools, too. ~Kevin

Wise PR Ali

NYC - Disgraced publicity princess Ali Wise tip-tapped into a Manhattan courtroom in beige patent leather stilettos this morning, 'fessing up to a wacky voicemail snooping rampage in a deal that will keep her out of jail.

The beautiful former publicity director for Dolce & Gabbana took a felony plea to eavesdropping and computer trespassing. The feisty fashionista admitted she repeatedly hacked into the cell phone voicemails of two women she wanted to spy on last year -- including interior designer Nina Freudenberger.

Freudenberger and Wise have an ex-boyfriend in common -- Josh Deutsch, the CEO and founder of Downtown Records. (more)

Thursday, April 29, 2010

New: Cybercrime Investigations without Tapping

Qatar - An official at the Cyber Crime Unit at the Interior Ministry denied that Qatar was tapping phones, any other telecommunication devices or blocking political websites attacking the country.
  
Captain Ali al-Kobeisi, an officer at Cyber Crime Unit said that the Interior Ministry did not establish the Anti-Cyber Crimes Unit for eavesdropping on people, but to protect them.

We do not tap phones, Blackberry devices or discussion forum websites. We do not eavesdrop on anyone. This unit is not for tapping. (more)

SpyCam Story #575 - Not Feeling Lucky Anymore

India - The Swedish model Lucky Farmhouse, who used a spycam to expose her boyfriend Yaniv Benaim's links with Goa police, says she has enough to establish a clear nexus between the police and Goa's notorious drug mafia.

"I have not put out all the (spycam) recordings because I need to save those in case they will be coming after me. If they make any problem for me in the future, I will put it out," Lucky said in an email interview from Sweden on Monday.

The 33-year-old model, who was living-in with Atala, had shocked the Goa police after she posted her boyfriend's clippings on social networking website youtube.com. (more) (more)

Protect Your Social Notworking Privacy

The Paradox of Exposing Without Exposing...
Facebook Safety: A Primer 
Facebook: 5 Privacy Settings You Must Tweak Now
New Threat: Undetectable Facebook Scams
Your Facebook Profile May Be Sold by Russian Hacker
Facebook Hopes to Discuss Privacy With Sen. Schumer

Facebook Books...
Facebook For Dummies 
The Truth About Facebook - Privacy Settings Every Facebook User Should Know, and Much More - The Facts You Should Know
Facebook for Parents: Answers to the Top 25 Questions

SpyCam Story #574 - Bath Man

MI - A Pellston man facing multiple felony charges for allegedly using a hidden camera and computer in his home to obtain sexually explicit images... Jaimie Emanuel McDonald, 36, was arrested March 2 by the Emmet County Sheriff’s Department, after two individuals in his home discovered a hidden camera shooting through a two-way mirror in the bathroom they had been using.

An affidavit in district court states that McDonald’s video camera was attached to a nearby computer, which captured the images of three victims — one of whom is under the age of 18 — taking showers and using the toilet... McDonald had allegedly been capturing video for five months — September 2009 to February 2010.

Originally, McDonald faced seven felonies... however, three more charges were added against him in a separate case, relating to the same incident, when another victim came forward. (more)

Wednesday, April 28, 2010

New BlackBerry SpyWare

US software firm Retina-X Studios on Tuesday released a more vigilant version of its Mobile Spy program that captures every email and picture from BlackBerry smartphones...

The previous version of Mobile Spy software kept track of text messaging and telephone calls, providing online access to data by employers, parents or whoever else is paying for smartphone accounts.

New Mobile Spy 4.0 software also provides employers or parents with smartphone contacts, calendar events, memos and records of which mobile phone towers a device was within range range of, according to Retina-X...

Versions of Mobile Spy are available for iPhone devices as well as for smartphones running on Android, Symbian, or Windows Mobile software, according to the Retina-X website.

Monitoring by Mobile Spy software is designed to go unnoticed after the software is installed on smartphones, the company said. The monitoring service is available for an annual subscription of 100 dollars. (more)

When bugs, taps and spies just aren't enough...

China to Enforce New Encryption Rules
China is set to implement new rules that would require makers of certain electronic equipment to disclose key encryption information to be eligible for government procurement sales, creating a possible showdown with foreign companies that are unlikely to comply. 

Beginning Saturday, makers of six categories of technology products, including smart cards, firewall technology and Internet routers, will have to disclose encryption codes to authorities for certification to participate in bidding for government purchases. Such encryption information is closely guarded by companies, and industry officials say foreign companies that fall under the new rules are unlikely to comply, which could mean they are cut off from government contracts for those products...
 
Disclosing encryption information is "something companies cannot and will not do," said Jorg Wuttke, president of the European Union Chamber of Commerce in China at a briefing last week, because such codes are often kept secret by companies for both competitive and security reasons

Two companies that are likely to be affected by the rules are Gemalto NV, a maker of smart cards and other digital security products, and Cisco Systems Inc., the U.S. network-equipment giant. Cisco declined to comment on the new rules. Gemalto didn't immediately respond to a request for comment. (more)

Gordon Brown - Hot Miked

UK - Eight days before the U.K.'s hotly contested election, Prime Minister Gordon Brown committed the campaign's biggest gaffe on Wednesday when a live microphone caught him calling a voter "bigoted" after she confronted him over government policies including immigration... In an interview later with the British Broadcasting Corp., a visibly distressed Mr. Brown apologized to the voter over the incident... (more)

Tuesday, April 27, 2010

"But I didn't break a law." "No problem. We fix."

A month after the conviction of Australian citizen Stern Hu for taking kickbacks and stealing trade secrets, China has issued definitions of what constitutes commercial secrets...
They were published late on Monday. China's lack of clarification of state or commercial secrets, highlighted by the Rio employees' trials, has alarmed both Chinese and foreign investors. (more)

Monday, April 26, 2010

The Tale of the Trojan Kid

NY - A Granville man was charged with eavesdropping Saturday after his ex-girlfriend discovered a recording device hidden in a child's backpack, police said.

Donald A. Connolly, 34, of Route 22, was charged with felony eavesdropping after someone in the ex-girlfriend's home spotted a red light on a 4-year-old's backpack, Glens Falls Police Sgt. Keith Knoop said.

Knoop described the incident as follows:
Connolly and the ex-girlfriend have a 4-year-old child in common. Connolly had dropped the child off at the woman's Glens Falls home Saturday, and a short time later the light was spotted on the backpack. They found what appeared to be a recording device sewn into the backpack, and brought it to the Police Department. Police confirmed it was an audiorecorder. (more)

Electronic surveillance: Report of the National Commission for the Review of Federal and State Laws Relating to Wiretapping and Electronic Surveillance"The book provides a background briefing on surveillance technology as it existed in 1976 - although classified devices of the period are not covered. There is a comprehensive description of telephone tapping techniques, wireless transmitters and how their transmissions are concealed, non-audio eavesdropping and tape-recording technology. Coverage is thorough and includes numerous block diagrams but no circuits or schematics. There is a section on counter measures (TSCM) which mostly emphasises how difficult this task is and another on the falsification of recordings." reviewed by John A. Faulkner "signalsnatcher" (Sydney, NSW, Australia)

Smith & Jones - Back in Black

Forget you ever read this...
Men In Black director Barry Sonnenfeld has confirmed Will Smith and Tommy Lee Jones's involvement in the new sequel. The filmmaker added that the movie will also be made in 3D and could be the big blockbuster release for May 2011's Memorial Day weekend. (more)

Sunday, April 25, 2010

Bollygate I

India - ...a wiretap scandal is set to capture the attention of Parliament next week after media reports alleged that advanced tapping technology acquired by the government had been used to listen in on the conversations of opposition leaders as well as some Congress politicians.

The Indian version of the Watergate scandal surfaced in a report on Friday, claiming that sophisticated equipment meant to eavesdrop on and track terrorists and terror suspects had been used to spy on the conversations of the Congress's Digvijay Singh, NCP leader Sharad Pawar and CPM general secretary Prakash Karat. (more)

Bollygate II

India - Even as ... the alleged tapping of the phones of political leaders and senior bureaucrats is creating ripples in political circles, the fact remains that ordinary citizens are vulnerable to eavesdropping what with the advanced equipment used for the purpose. The new off-the-air GSM (Global System for Mobile Communications) monitoring device, which has been used to track calls in the present case as claimed by the magazine, can be deployed anywhere. The device needs no authorisation as the phone is not being tapped at the exchange; it is only the signals that are intercepted between the phone and the cellphone tower and recorded on a hard disk.

The equipment can track and tap into any cellphone conversation within a two-km radius.

If this is not impressive enough, there are technologies available in the market that can convert your cellphone into an intelligence system by activating special software, to spy on you... a leading provider of analysis and surveillance solutions, has a technology that allows one to listen in to all phone calls made or received by the target handset, and also forwards all incoming and outgoing messages (SMS) on the target handset to a pre-defined number...

Interestingly, the application allows one to listen to a room conversation from anywhere in the world. It enables the user from the pre-defined number to call the phone when it is switched off and listen to the conversations taking place around the phone. (more)