...Make Spy Gadgets!
"I just bought a new 2GB USB flash drive, and it happened to be sitting on the desk the other day next to a tube of Chap Stick. It looked like a perfect match once I got the drive out of it's case, but it ended up being a little too big to fit in the tube. I took it to work and bored the tube out on the lathe during my lunch break, made a few notches in the base and the bottom cap with the die grinder, sanded the edges of the circuit board a little, and finally got it to fit perfectly. Looks pretty good, even the LED shines through the bottom. Hopefully it will fare better when it ends up going through the dryer in my pants pocket than a regular tube of Chap Stick does." ~ Phillip Torrone (more)
Tuesday, February 13, 2007
Time to Update Your Corporate Policy
Wrist Watch Voice Recorder FM Transmitter
Wireless MP3
Wrist Watch Voice Recorder
FM Transmitter
Record classroom lectures, meetings, conversations, etc.
(Yet another bug to worry about.)
(more)
Coincidence or Espionage? You decide.
This is no typo. There is actually a Chinese manufacturer by the name Nokir who makes mobile phones. We have seen companies ripping off the iPod but they were still creative with the naming. The Nokir E828 is a rip off the Nokia N73... (more)
Why VoIP is vulnerable
VoIP is simply data transmitted in digital packet form. This means it can be attacked, hacked, intercepted, manipulated, re-routed and degraded just like packets on the data network. All of the maladies of the data network -- viruses, worms, trojan, DoS attacks and hijacking -- are possible on the VoIP network.
...examples of potential VoIP attacks:
· Toll Fraud/Service Theft -- This will likely be the most common attack in the early stages of VoIP, where an unauthorized user gains access to the VoIP network by mimicking an authorized user or seizing control of an IP phone and initiating outbound long distance calls.
· Eavesdropping -- VoIP services measurement and troubleshooting software makes eavesdropping on a packetized voice calls relatively easy.
· Phishing -- The same techniques used to steal identity information over email are being used over VoIP. Criminals spoof caller identification information so it looks like the call is coming from a legitimate organization and then ask the call recipient for identity information. (more)
...examples of potential VoIP attacks:
· Toll Fraud/Service Theft -- This will likely be the most common attack in the early stages of VoIP, where an unauthorized user gains access to the VoIP network by mimicking an authorized user or seizing control of an IP phone and initiating outbound long distance calls.
· Eavesdropping -- VoIP services measurement and troubleshooting software makes eavesdropping on a packetized voice calls relatively easy.
· Phishing -- The same techniques used to steal identity information over email are being used over VoIP. Criminals spoof caller identification information so it looks like the call is coming from a legitimate organization and then ask the call recipient for identity information. (more)
Monday, February 12, 2007
Why Your Top Execs Don't Want "Smart Phones"
"...the help desk had been asked to install client software that would allow e-mail to synchronize with upper management’s new smart phones." ~ written by a real security manager, “C.J. Kelly,” whose name and employer have been disguised for obvious reasons.
Why she freaked, and why you should, too...
- Company had no written security policy about smart phones.
- Smart phones require client-side software hooked into Outlook.
- Syncing requires user’s PC to be left running with Outlook open.
- E-mail transfers aren’t encrypted.
- The phones aren’t password-protected.
- Phones not managable remotely. Data can't be wiped if lost or stolen.
- E-mails are cached on the ISP's servers for up to seven days.
- Smart-phone owners [others] can access their e-mail via the Web.
She researched some good compromise solutions. The real solution, however, is a smarter 'smart phone'. Until then, seriously consider more secure communications alternatives. ~ Kevin (more)
Why she freaked, and why you should, too...
- Company had no written security policy about smart phones.
- Smart phones require client-side software hooked into Outlook.
- Syncing requires user’s PC to be left running with Outlook open.
- E-mail transfers aren’t encrypted.
- The phones aren’t password-protected.
- Phones not managable remotely. Data can't be wiped if lost or stolen.
- E-mails are cached on the ISP's servers for up to seven days.
- Smart-phone owners [others] can access their e-mail via the Web.
She researched some good compromise solutions. The real solution, however, is a smarter 'smart phone'. Until then, seriously consider more secure communications alternatives. ~ Kevin (more)
TV show builds Spy Gear Room for 7-year old
Extreme Makeover Home Edition Builds Spy Gear Room for 7-Year-Old Boy filled with "The Latest and Greatest that Every Up and Coming Spy Could Possibly Wish For"
Kyle Thibodeau, age 7, is the lucky recipient of the first-ever Spy Gear Room built by the cast and crew of ABC TV's Extreme Makeover Home Edition. Kyle's room was revealed on an episode of EMHE and includes what the show's celebrity designer Tanya McQueen refers to as "the latest and greatest that every up and coming spy could possibly wish for." (more) (video) (mental antidote)
Kyle Thibodeau, age 7, is the lucky recipient of the first-ever Spy Gear Room built by the cast and crew of ABC TV's Extreme Makeover Home Edition. Kyle's room was revealed on an episode of EMHE and includes what the show's celebrity designer Tanya McQueen refers to as "the latest and greatest that every up and coming spy could possibly wish for." (more) (video) (mental antidote)
More bugs for your kids...
(from gizmodo.com)
President Bush defends domestic eavesdropping, so why shouldn't you? The Mobile Spy Ear, which completes Wild Planet's trifecta of kiddie 007 gadgets, is moveable car with a microphone that transmits sounds to an earbud from up to 75 feet away.
Too bad the vehicle itself only travels 30 feet, and it's one of those wind up cars (you pull it backwards along the floor and then let go). But the signal supposedly works through walls, which means that the movement is really a secondary feature to being able to listen-in on your sister talking about boys. Ewwww.
Available next fall for between $14.99 and $19.99. – Noah Robischon
WPP Mob Guy Who Was FBI Bug Man Now Icy
Mafia soldier Angelo "Sonny" Mercurio, who helped the FBI land the first-ever bugging of a mob induction ceremony, has died (at 70) in Little Rock, Ark., where he lived in the federal witness-protection program, relatives said yesterday. (more)
Friday, February 9, 2007
Hidden Cameras & Microphones - White Paper List
Hidden Cameras, Hidden Microphones: Essays From the Experts
The Hidden Camera Conundrum: A Media Lawyer's Perspective
Mark Sableman
Hidden Cameras: A News Executive's Perspective
Mark Effron
Hidden Cameras and Other Inexact Sciences
Allan Maraynes
A Message About Methods: Make No Mistake
Bob Steele
High Standards for Hidden Cameras
Bob Steele
An Argument Against "Toilet Journalism"
Robert Lissit
Hidden Cameras: Handle With Care
Charlie Thompson
Worth Thinking About
Chris Heinbaugh
Hidden Cameras: Is the Truth Worth the Lie?
Stuart Watson
Hidden Cameras Answer Noble Call
Duane Pohlman
Lawyers, Journalists and Hidden Cameras
Sandra S. Baron
Hidden Cameras, Hidden Microphones: Statutes and Court Cases
Introduction
Kathleen K. Olson
Definitions
Federal Statutes and Court Cases
State-by-State Statutes and Court Cases
CREDITS
The Hidden Camera Conundrum: A Media Lawyer's Perspective
Mark Sableman
Hidden Cameras: A News Executive's Perspective
Mark Effron
Hidden Cameras and Other Inexact Sciences
Allan Maraynes
A Message About Methods: Make No Mistake
Bob Steele
High Standards for Hidden Cameras
Bob Steele
An Argument Against "Toilet Journalism"
Robert Lissit
Hidden Cameras: Handle With Care
Charlie Thompson
Worth Thinking About
Chris Heinbaugh
Hidden Cameras: Is the Truth Worth the Lie?
Stuart Watson
Hidden Cameras Answer Noble Call
Duane Pohlman
Lawyers, Journalists and Hidden Cameras
Sandra S. Baron
Hidden Cameras, Hidden Microphones: Statutes and Court Cases
Introduction
Kathleen K. Olson
Definitions
Federal Statutes and Court Cases
State-by-State Statutes and Court Cases
CREDITS
Corporate espionage goes undetected in India
The arrest of a Videsh Sanchar Nigam Limited employee for allegedly leaking information to a competing company is one of the few cases of corporate espionage that have come to light.
However, a majority of corporate espionage cases go undetected.
If detected, very few complaints come to light. And in the few cases that complaints are registered, hardly any action is taken.
"Only 20 per cent of corporate espionage cases are detected. Of this, a mere 20 per cent get reported and only 10 per cent can be solved," says Raghu Raman, CEO, Mahindra Special Services Group.
Moreover, there have been very few convictions in India till date for corporate espionage or data theft, while not a single case has been registered under Section 66 of the IT Act 2000.Ajay Jugran, Partner of law firm, Lawcombine, says, "This malady is deep-rooted. It's prevalent when Public Sector Undertakings call for bids. Trading in bidding information is rampant."
"Companies are even using annual maintenance contractors to plant surveillance software in rival firms. The software gives a daily log of the data via e-mail.
Is there a solution? Companies the world over are known to hire Sweep Teams to detect eavesdropping devices. (more)
Whether your problem is in India, the United States or elsewhere, we can help.
However, a majority of corporate espionage cases go undetected.
If detected, very few complaints come to light. And in the few cases that complaints are registered, hardly any action is taken.
"Only 20 per cent of corporate espionage cases are detected. Of this, a mere 20 per cent get reported and only 10 per cent can be solved," says Raghu Raman, CEO, Mahindra Special Services Group.
Moreover, there have been very few convictions in India till date for corporate espionage or data theft, while not a single case has been registered under Section 66 of the IT Act 2000.Ajay Jugran, Partner of law firm, Lawcombine, says, "This malady is deep-rooted. It's prevalent when Public Sector Undertakings call for bids. Trading in bidding information is rampant."
"Companies are even using annual maintenance contractors to plant surveillance software in rival firms. The software gives a daily log of the data via e-mail.
Is there a solution? Companies the world over are known to hire Sweep Teams to detect eavesdropping devices. (more)
Whether your problem is in India, the United States or elsewhere, we can help.
Smartphones (aka Pocket Bugs)
Despite the rise of smartphone malware, businesses aren't making security a priority.
"Just because they're not concerned doesn't mean it's any less of a threat," said Bill Hughes, principal analyst at In-Stat, a Scottsdale, Ariz.-based research firm. "They could be sitting on a time bomb for all they know."
Hughes said the amount of sensitive data living on smartphones is relatively low for now. But email and media files are vulnerable. Smartphones are already being attacked by spyware, such as keyloggers, he said. But it isn't just malware that poses a risk. (more)
"Just because they're not concerned doesn't mean it's any less of a threat," said Bill Hughes, principal analyst at In-Stat, a Scottsdale, Ariz.-based research firm. "They could be sitting on a time bomb for all they know."
Hughes said the amount of sensitive data living on smartphones is relatively low for now. But email and media files are vulnerable. Smartphones are already being attacked by spyware, such as keyloggers, he said. But it isn't just malware that poses a risk. (more)
Bathroom video snoop to be charged
NH - Police say a woman caught a male relative secretly videotaping and photographing her in the bathroom.
The man, 64-year-old Marvin Nicholson of Durham, turned himself in Tuesday. Police plan to charge him with wiretapping and invasion of privacy. They say he spied on the woman over the last two months while they were living in the same house. He’s also accused of recording the woman’s conversations. Police seized computers and recording equipment. (more)
Nicholson's arrest follows the arrest of Rochester resident Dennis S. Winship in December, who is charged with violation of privacy for allegedly using a miniature video camera attached to a long pole to record "intimate images" of a female neighbor while she used the bathroom.
Although the two cases are unrelated, Callaghan noted there were some similarities and acknowledged that residents may be "alarmed" by these recent crimes. (more)
The man, 64-year-old Marvin Nicholson of Durham, turned himself in Tuesday. Police plan to charge him with wiretapping and invasion of privacy. They say he spied on the woman over the last two months while they were living in the same house. He’s also accused of recording the woman’s conversations. Police seized computers and recording equipment. (more)
Nicholson's arrest follows the arrest of Rochester resident Dennis S. Winship in December, who is charged with violation of privacy for allegedly using a miniature video camera attached to a long pole to record "intimate images" of a female neighbor while she used the bathroom.
Although the two cases are unrelated, Callaghan noted there were some similarities and acknowledged that residents may be "alarmed" by these recent crimes. (more)
Ex-employee undercut boss by bugging him
Greece - A 27-year-old man was able to beat his former boss to business deals after allegedly installing a sophisticated listening program in the shipowner’s laptop computer, police said yesterday after arresting the suspect.
Officers were called in by the businessman after his former employee, a Ukrainian national, set up a rival shipping company and seemed to be one step ahead of him in closing deals.
After examining the unnamed entrepreneur’s computer, officers discovered that spy software had been installed in the laptop which allegedly allowed the 27-year-old to automatically record any conversations made via the Internet.
Police found that the software, which the suspect allegedly devised on his own, also worked as a bug, recording voices even when the computer was switched off. (more)
Officers were called in by the businessman after his former employee, a Ukrainian national, set up a rival shipping company and seemed to be one step ahead of him in closing deals.
After examining the unnamed entrepreneur’s computer, officers discovered that spy software had been installed in the laptop which allegedly allowed the 27-year-old to automatically record any conversations made via the Internet.
Police found that the software, which the suspect allegedly devised on his own, also worked as a bug, recording voices even when the computer was switched off. (more)
Labels:
amateur,
business,
computer,
eavesdropping,
lawsuit,
software,
VoIP,
wiretapping
Thursday, February 8, 2007
Pirro probe 'ongoing,' U.S. attorney says
NY - "Obviously, it's a very sensitive investigation," U.S. Attorney Michael Garcia said. "The only thing I've said since the initial confirmation of the investigation was that it was ongoing, and that's really all I can say about it."
Last year, while Pirro was running for state attorney general, news leaked that federal prosecutors were investigating whether she broke eavesdropping laws when she asked former New York City Police Commissioner Bernard Kerik to bug her family boat to find out if her husband, Albert, was cheating on her. (more)
Last year, while Pirro was running for state attorney general, news leaked that federal prosecutors were investigating whether she broke eavesdropping laws when she asked former New York City Police Commissioner Bernard Kerik to bug her family boat to find out if her husband, Albert, was cheating on her. (more)
Subscribe to:
Posts (Atom)