Wednesday, January 3, 2007

Art Imitates Life... again.

The Secret Show is a new animated series, commissioned and produced by British media outlets and British animators, scheduled for a North American premiere in late January. Animated in flash with flat, curious characters moving around a frenetically plotted spy-like environment, The Secret Show is an entertaining new program that is quite like what a lot of animation fans are probably in need of: a series you don't have to think about, because it's madcap fun from beginning to end. More or less, this is an animated television program about a couple of spies in a government organization; but the catch however, is that The Secret Show has as much fun with the subject matter as is possible in the medium. This series is about embracing the oft-absurd nature of spy secrecy to the point where everything is a secret and everything is a joke. ... The animation for The Secret Show is slightly unusual... (more)

Japan to set up spy agency

Local media in Japan are reporting the country will set up a new human intelligence unit. The spy service will be the first for any branch of the nation's military.

According to reports, the human intelligence group is expected to have around 70 members. Japan's Ground Self-Defense Forces have a centralized intelligence unit. But the unit has reportedly been unable to use people to gather information, relying instead on satellite images and radio signals. (more) (video)

Shhhh! De Niro’s Spy Flick Keeps It to a Whisper

Robert De Niro’s The Good Shepherd, from a screenplay by Eric Roth, has been described as “The Godfather of spy movies,” which is reasonably accurate as far as the depiction of violence is concerned, as well as the emphasis on ethnicity, which in The Good Shepherd is mostly multi-generational American ruling-class WASP, while in The Godfather it was mostly the Italian-American (or, more specifically, Sicilian-American) lineage that was on the line. But the differences between the two films are more striking.

...no previous American film has ventured into this still largely unknown territory with such authority and emotional detachment. For this reason alone, The Good Shepherd is must-see viewing. (
more)

I was spy for Fijians

Australia - After almost crippling Britain's Blair Government with a corruption scandal, Gold Coast conman Peter Foster has gone undercover for the Fijian military to expose alleged vote rigging and corruption.

With a male clutch bag concealing a mini video camera and a microphone taped to his chest, Foster met with senior leaders of Fiji's SDL party which controlled the Government until overthrown in a military coup in December.

At the time, Foster was facing forgery charges and was under house arrest in Suva.

"Why did I do it? There is this perception of me as someone who takes from society and doesn't give anything back. Maybe I am just trying to make amends for my sins of the past by being a good citizen, by going out there and putting my neck on the line and saying you know. I want to be on the side of the good guys for a change," Foster said yesterday.

Countering Foster's claims were allegations yesterday that the Australian conman tried to bankroll the SDL election campaign.

But in carrying out the sting operation, Foster has upset some powerful people in Fiji where he had been working to build an island resort.

Local sources yesterday said it's unlikely he will ever be able to regain credibility on the Pacific island nation. (more)

Foreign spy activity surges to fill technology gap

Several U.S. defense contractors have reported that between October 2005 and January 2006 they found radio-frequency transmitters hidden in Canadian coins that were planted on them after they traveled through Canada, according to the report....

Foreign spies are stepping up efforts to obtain secret U.S. technology through methods ranging from sexual entrapment to Internet hacking
(electronic eavesdropping and wiretapping fall in between), with China and other Asian countries leading the targeting of U.S. defense contractors.

"The apparent across-the-board surge in activity from East Asia and Pacific countries will continue in the short term as gaps in technological capability become apparent in their weapons-development processes," the latest annual report by the Defense Security Service counterintelligence office stated.

Other methods included offering marketing services to contractors, spying during visits to U.S. companies and the use of "cultural commonality" to obtain technology.

The report did not identify the 106 countries that are engaged in the collection activity, but other defense officials said the most active technology spies are working for China, Russia and Iran. Other collectors of U.S. technology were identified as agents working secretly for Israel, Japan, Britain, France, Germany, Egypt and United Arab Emirates, the officials said. (more)

There is something wrong with this story. It does not make sense - technically or practically. Transmitter... no. RFID tag... maybe. Purpose... ??? More likely, souvenir challenge coins were given as gifts to these contractors and someone joked that they were bugged. ~Kevin

LA: More Free Wi-Fi! And Spy Cameras!

from LAVoice.org...

Los Angeles - "The city's considering spending $165,000 expanding downtown's free-wireless nodes to include Bunker Hill, the financial district, the historic core and Little Tokyo.

The Community Redevelopment Agency wrapped the hardware expense into a larger new appropriation for its "official" ExperienceLA calendar site and, oh, just happened to tack on some money for more wi-fi surveillance cameras ...


The cameras are to be installed at Angels Knoll Interim Park and Little Tokyo for the purpose of feeding your downtown activities (and, of course, those of street criminals) to video monitors inside LAPD.

Make of that what you will." (more)

US / EU Spy Deal (Hello Brazil)

The EU has negotiated a deal to allow the U.S. to spy on travelers coming from Europe or Britain, according to the Telegraph, and All Headline News. Details of the deal were made available through a Freedom of Information request to the Department of Transport.

Under the terms of the deal, the U.S. authorities can demand 34 different types of records for inspection including bank and credit card statements of travelers. They can also demand access to email messages sent or received through an email address given to airlines and complete flight history, including itineraries, religious, and dietary restrictions. (more)

Chinese Spies Difficult to Contain

A Cautionary Tale for US Business

Former CIA operative and later US Ambassador to China, James Lilley said the Chinese regime used very different techniques and were accordingly difficult to monitor.

Speaking on US news program, Frontline, Mr Lilley said that only a small percentage of Chinese spies did "clandestine work". The rest, he said, gathered enormous amounts of bite sized information which were then assembled into a bigger picture. ...

"Ultimately we weren't successful in identifying a lot of their activities and a lot of their targets," he said, adding that Chinese espionage was so subtle it was often difficult to "explain and justify budget for continuing operations."

Dan Stober, American author of a book on Chinese espionage, explained that Chinese agents target specific industries then work on building relationships with senior executives or experts in the field... (more)

q.v. A real-life example.

GSM Cell Phone Encryption

I received a email from Silentel, s.r.o. in Slovakia with information about their novel new product designed to protect GSM cell phone calls against eavesdropping.

Interesting concept...
You provide the phone (any standard Smartphone using the Symbian OS). They provide the software and a hardware module with headset (pictured). The hardware connects to your cell phone using Bluetooth! Cool concept. Looks portable and covert.

Here is what they say...
"Silentel SecureCall is a system that encrypts your call through the GSM mobile phone and absolutely thwarts
its tapping. Encryption uses the AES 256 algorithm which is currently the highest security standard worldwide. It is the system with the end-to-end security. The whole conversation from one user to the other is encrypted." (more)

Tuesday, January 2, 2007

Police at risk of bugging charges

Australia - Detectives could face charges over the improper bugging of homes and telephones during a high-profile murder investigation when the results of a new police inquiry into the case are handed to Victoria's Office of Public Prosecutions early next year.

The new inquiry targeted Taskforce Kale, which investigated the deaths of transsexual prostitute Adele Bailey in 1978 and Jennifer Tanner, the sister-in-law of former police detective Denis Tanner, in 1984.

Police sources told The Australian that the brief of evidence to be handed to the OPP included details of whether police improperly obtained warrants for electronic surveillance on people including Mr Tanner and senior detective Gerry McHugh.

It was revealed yesterday that Victoria Police reportedly paid $400,000 in compensation to Mr McHugh, after he was wrongfully implicated in the murder investigation and his Mildura home was bugged. (more)

Comparative Wiretapping Book

On Wiretapping! (Teknik Dinlemeye Dair!)
by Ali Ozdogan, American University

This book has two parts. The first part covers the historical evolution of the American wiretapping legislation, summary of the American Wiretapping Criminal Procedure, the summary of Communication Assistance for Law Enforcement Act of 1994 (CALEA), and the privacy and property right problems in the CALEA and the corresponding suggestions.

The second part of the book covers analytical summary and comparative analyses of legal positions of wiretapping in Britain, Canada, Germany, France, Israel, and Turkey.

(Note that the manuscript is currently in Turkish. For the English version of the manuscript, please contact to author.)

Art Imitates Life... well, some of it.

"All My Children"
(
an American daytime TV show)

Certain that Krystal is carrying Tad's baby, Dixie was desperate to find a despondent Tad. Zach and Zarf each accused the other of having killed a woman. Zach confided to Tad that he is tied to the murders somehow, and is convinced that the killer has knowledge of his past. After Josh managed to get DNA samples from Ryan and Emma, Kendall told him to run the test that could prove paternity. Aidan was alarmed when Di intended to make herself a target for the killer. Colby planted a spycam in Josh's room and, as part of her scheme to bring Erica and Jack back together, sent Erica a gift from "J." Coming: Kendall possesses life-altering news. (more)

Teen Tap Takes Rap

A Singapore teenager has pleaded guilty to tapping into a neighbour's wireless internet network and will be sentenced next month, a newspaper has reported.

Seventeen-year-old Garyl Tan Jia Luo's offence falls under the Computer Misuse Act and carries a penalty of up to three years in jail and fines of up to $S10,000.

He is the first person in Singapore to be charged with this offence. (more)

FBI Investigates Alleged Wiretapping

WV - The FBI is looking into whether wiretapping went on at Hinton City Hall.

State Police say they turned a tape over to the FBI. Hinton Police Chief Thomas Peal says the tape was found at the police station, which is inside City Hall.

The federal investigation is underway to find out how the tape got there and what is on it.

On Thursday, the Hinton City Council voted unanimously to call for an investigation into whether City Hall is being wiretapped. (more)

Secure your business's future

Electronic debugging, once the exclusive realm of James Bond, is now done regularly.

"Industrial espionage is a particularly hot topic right now," said Kevin D. Murray, an IAPSC member and spokesman for the group. "About half the time when there has been an intrusion, it is a competitor. For the rest, it's done by people within the company, snooping for advantage or involved with internal politics."

Debugging is not an idle practice.

"If a company has business or trade secrets and there is litigation, a court will look to the firm's extended security measures as part of the proof that it is indeed a business secret," Murray said. "Security sweeps done on a regular basis will catch problems before they become problems." (more)