NY - In a rebuke of a surveillance practice greatly expanded by the New York Police Department after the Sept. 11 attacks, a federal judge ruled that the police must stop the routine videotaping of people at public gatherings unless there is an indication that unlawful activity may occur.
The restrictions on videotaping do not apply to bridges, tunnels, airports, subways or street traffic, Judge Haight noted, but are meant to control police surveillance at events where people gather to exercise their rights under the First Amendment. (more)
Saturday, February 17, 2007
Friday, February 16, 2007
Play, "If I were King."
If somebody is openly recording everything you say, can you secretly record them?
How about if...
-- you're all state employees,
-- conducting public business,
-- in a government building,
-- on the taxpayers' time?
And what if...
-- a fire drill interrupts the official hearing,
-- so a covert recording bugs everyone who strays within earshot?
Those are some of the puzzles put before Leon County Circuit Judge John Cooper on Thursday in the case of a Florida Fish and Wildlife Conservation Commission officer netted by Florida's felony law against secret recordings. The stakes are high. A conviction could cost Officer Albert Smythe his law-enforcement certification, besides the criminal penalties. (more)
How about if...
-- you're all state employees,
-- conducting public business,
-- in a government building,
-- on the taxpayers' time?
And what if...
-- a fire drill interrupts the official hearing,
-- so a covert recording bugs everyone who strays within earshot?
Those are some of the puzzles put before Leon County Circuit Judge John Cooper on Thursday in the case of a Florida Fish and Wildlife Conservation Commission officer netted by Florida's felony law against secret recordings. The stakes are high. A conviction could cost Officer Albert Smythe his law-enforcement certification, besides the criminal penalties. (more)
If you liked "New Math"...
...you're just gonna' love the "New Daylight Savings."
All your 'automatic' clock adjusters, which operate via internal pre-programmed instructions, are now FUBAR'ed. The implications in the security and computer fields are far-reaching.
Who can we clock for this one???
-- Prankster, Ben Franklin, whose most outrageous ideas had a basis in brilliance. He originally broached the subject of candle-saving as a joke in his 1784 essay "An Economical Project?"
-- William WIllet, a London builder who published "The Waste of Daylight," in 1907?
-- The Germans, for first officially adopting the scheme in 1915?
-- WWI and WWII?
-- Or... the folks who decided to rewrite history again (in the age of computers) with their "Energy Policy Act of 2005?
"The time is, now; prepare!" (more)
All your 'automatic' clock adjusters, which operate via internal pre-programmed instructions, are now FUBAR'ed. The implications in the security and computer fields are far-reaching.
Who can we clock for this one???
-- Prankster, Ben Franklin, whose most outrageous ideas had a basis in brilliance. He originally broached the subject of candle-saving as a joke in his 1784 essay "An Economical Project?"
-- William WIllet, a London builder who published "The Waste of Daylight," in 1907?
-- The Germans, for first officially adopting the scheme in 1915?
-- WWI and WWII?
-- Or... the folks who decided to rewrite history again (in the age of computers) with their "Energy Policy Act of 2005?
"The time is, now; prepare!" (more)
Thursday, February 15, 2007
Is Your Cell Phone Bugged?
Bugged Cell Phones!!!
A hot 2000's topic delivered with cool retro 50's production values and a 60's tip of the hat to Mr. McGoohan.
Accurate and valuable.
Great job, Lauren!
Tapped Out
MI - Iosco County's insurance carrier will pay more than $800,000 to settle seven lawsuits related to alleged telephone eavesdropping at the county sheriff's department.
Three Iosco County Sheriff's Department dispatchers, two deputies and two employees of the Michigan State Police post in East Tawas sued the department after learning that their private telephone calls were recorded without their knowledge.
The seven plaintiffs will receive amounts ranging from $62,000 to $160,000 as payment for alleged damages and attorney fees, according to the settlement documents.
...the secret taping led to criminal charges against Iosco County Undersheriff Michael C. Bridson, who pleaded guilty in 2006 to two counts of felony eavesdropping under a delayed sentence. (more)
Three Iosco County Sheriff's Department dispatchers, two deputies and two employees of the Michigan State Police post in East Tawas sued the department after learning that their private telephone calls were recorded without their knowledge.
The seven plaintiffs will receive amounts ranging from $62,000 to $160,000 as payment for alleged damages and attorney fees, according to the settlement documents.
...the secret taping led to criminal charges against Iosco County Undersheriff Michael C. Bridson, who pleaded guilty in 2006 to two counts of felony eavesdropping under a delayed sentence. (more)
Luk, the dark side calls...
LukWerks Spy Camera
Spy Camera Hidden in a Clock
The LukWerks Spy Camera is the world's first ever networked Spy Camera that delivers the power of professional-grade video security.
The Spy Camera masquerades as a sleek, fully functioning digital clock. This hidden camera is perfect for coverage of any area of the home or small business that requires discreet observance.
The spy clock camera has a powerful 400 MHz onboard processor, which powers the camera's ability to provide superior image quality, motion detection, and intelligent image management. Installation and setup of the Spy Camera is a breeze. Just plug it into any electrical outlet and the hidden camera sends recorded video back to your PC! (more)
Wednesday, February 14, 2007
Strange, but true! -- Bad Cupid
Valentine’s Day isn’t a great day for Cupid, Malik Cupid, that is.
Westchester County District Attorney Janet DiFiore announced that Malik Cupid, 32, of Manhattan was arraigned Tuesday on one count of eavesdropping (and other charges).
Cupid assumed the identity of his ex-girlfriend ... while she was serving on active duty with the United States Army in Iraq. (more)
Westchester County District Attorney Janet DiFiore announced that Malik Cupid, 32, of Manhattan was arraigned Tuesday on one count of eavesdropping (and other charges).
Cupid assumed the identity of his ex-girlfriend ... while she was serving on active duty with the United States Army in Iraq. (more)
SpyCams & Eavesdropping - A global fear
Fear of hidden spycams and bugs is the topic of this blog, from India.
"Your most intimate moments can now be used to humiliate and blackmail you. That sadly, is the flip side of technological advancement. What couldn't be thought of only a few years ago, is now, a nightmare than can happen to the anyone of us.
So, taking some precautions might be in order. Watch out for hidden spy cameras in changing rooms. The bigger stores will, hopefully, not violate your privacy but always be careful in smaller shops. The same thing would be advisable in unfamiliar public toilets and in obviously seedy looking hotel room...
Spycams apart, there are also bugs you need to worry about. Not bed bugs but of the the electronic kind. Private phone conversations have been printed in newspapers, so if you are in top secret business talks, or even just dirty talking to your spouse, you wouldn't want to be overheard. But the greater horror would be if somebody eavesdropped on you with the help of a bug." ~ Manali (more)
"Your most intimate moments can now be used to humiliate and blackmail you. That sadly, is the flip side of technological advancement. What couldn't be thought of only a few years ago, is now, a nightmare than can happen to the anyone of us.
So, taking some precautions might be in order. Watch out for hidden spy cameras in changing rooms. The bigger stores will, hopefully, not violate your privacy but always be careful in smaller shops. The same thing would be advisable in unfamiliar public toilets and in obviously seedy looking hotel room...
Spycams apart, there are also bugs you need to worry about. Not bed bugs but of the the electronic kind. Private phone conversations have been printed in newspapers, so if you are in top secret business talks, or even just dirty talking to your spouse, you wouldn't want to be overheard. But the greater horror would be if somebody eavesdropped on you with the help of a bug." ~ Manali (more)
Tuesday, February 13, 2007
Be Your Own "Q"...
...Make Spy Gadgets!
"I just bought a new 2GB USB flash drive, and it happened to be sitting on the desk the other day next to a tube of Chap Stick. It looked like a perfect match once I got the drive out of it's case, but it ended up being a little too big to fit in the tube. I took it to work and bored the tube out on the lathe during my lunch break, made a few notches in the base and the bottom cap with the die grinder, sanded the edges of the circuit board a little, and finally got it to fit perfectly. Looks pretty good, even the LED shines through the bottom. Hopefully it will fare better when it ends up going through the dryer in my pants pocket than a regular tube of Chap Stick does." ~ Phillip Torrone (more)
"I just bought a new 2GB USB flash drive, and it happened to be sitting on the desk the other day next to a tube of Chap Stick. It looked like a perfect match once I got the drive out of it's case, but it ended up being a little too big to fit in the tube. I took it to work and bored the tube out on the lathe during my lunch break, made a few notches in the base and the bottom cap with the die grinder, sanded the edges of the circuit board a little, and finally got it to fit perfectly. Looks pretty good, even the LED shines through the bottom. Hopefully it will fare better when it ends up going through the dryer in my pants pocket than a regular tube of Chap Stick does." ~ Phillip Torrone (more)
Time to Update Your Corporate Policy
Wrist Watch Voice Recorder FM Transmitter
Wireless MP3
Wrist Watch Voice Recorder
FM Transmitter
Record classroom lectures, meetings, conversations, etc.
(Yet another bug to worry about.)
(more)
Coincidence or Espionage? You decide.
This is no typo. There is actually a Chinese manufacturer by the name Nokir who makes mobile phones. We have seen companies ripping off the iPod but they were still creative with the naming. The Nokir E828 is a rip off the Nokia N73... (more)
Why VoIP is vulnerable
VoIP is simply data transmitted in digital packet form. This means it can be attacked, hacked, intercepted, manipulated, re-routed and degraded just like packets on the data network. All of the maladies of the data network -- viruses, worms, trojan, DoS attacks and hijacking -- are possible on the VoIP network.
...examples of potential VoIP attacks:
· Toll Fraud/Service Theft -- This will likely be the most common attack in the early stages of VoIP, where an unauthorized user gains access to the VoIP network by mimicking an authorized user or seizing control of an IP phone and initiating outbound long distance calls.
· Eavesdropping -- VoIP services measurement and troubleshooting software makes eavesdropping on a packetized voice calls relatively easy.
· Phishing -- The same techniques used to steal identity information over email are being used over VoIP. Criminals spoof caller identification information so it looks like the call is coming from a legitimate organization and then ask the call recipient for identity information. (more)
...examples of potential VoIP attacks:
· Toll Fraud/Service Theft -- This will likely be the most common attack in the early stages of VoIP, where an unauthorized user gains access to the VoIP network by mimicking an authorized user or seizing control of an IP phone and initiating outbound long distance calls.
· Eavesdropping -- VoIP services measurement and troubleshooting software makes eavesdropping on a packetized voice calls relatively easy.
· Phishing -- The same techniques used to steal identity information over email are being used over VoIP. Criminals spoof caller identification information so it looks like the call is coming from a legitimate organization and then ask the call recipient for identity information. (more)
Monday, February 12, 2007
Why Your Top Execs Don't Want "Smart Phones"
"...the help desk had been asked to install client software that would allow e-mail to synchronize with upper management’s new smart phones." ~ written by a real security manager, “C.J. Kelly,” whose name and employer have been disguised for obvious reasons.
Why she freaked, and why you should, too...
- Company had no written security policy about smart phones.
- Smart phones require client-side software hooked into Outlook.
- Syncing requires user’s PC to be left running with Outlook open.
- E-mail transfers aren’t encrypted.
- The phones aren’t password-protected.
- Phones not managable remotely. Data can't be wiped if lost or stolen.
- E-mails are cached on the ISP's servers for up to seven days.
- Smart-phone owners [others] can access their e-mail via the Web.
She researched some good compromise solutions. The real solution, however, is a smarter 'smart phone'. Until then, seriously consider more secure communications alternatives. ~ Kevin (more)
Why she freaked, and why you should, too...
- Company had no written security policy about smart phones.
- Smart phones require client-side software hooked into Outlook.
- Syncing requires user’s PC to be left running with Outlook open.
- E-mail transfers aren’t encrypted.
- The phones aren’t password-protected.
- Phones not managable remotely. Data can't be wiped if lost or stolen.
- E-mails are cached on the ISP's servers for up to seven days.
- Smart-phone owners [others] can access their e-mail via the Web.
She researched some good compromise solutions. The real solution, however, is a smarter 'smart phone'. Until then, seriously consider more secure communications alternatives. ~ Kevin (more)
Subscribe to:
Posts (Atom)