NY - A landlord has been arrested after being accused of placing an eavesdropping device under the kitchen cabinets of two tenants he was trying to evict, Suffolk County police said Monday.
John Gordon, 48, bought the mini electronic transmitter on the Internet and installed it when the tenants were not home, police said.
Gordon, who has another apartment in the house, was arrested Sunday and charged with burglary and eavesdropping. (more) (more)
O.J. Simpson apparently doesn't have enough to worry about with two co-defendants in his Vegas robbery case ready to testify against him. Now a private eye who worked for Simpson is alleging that the disgraced gridiron star once hired notorious Hollywood P.I. Anthony Pellicano to bug and harass Nicole Brown Simpson.
Bill Pavelic, the lead investigator for Simpson's defense team during his criminal trial for the murders of Nicole and Ron Goldman, says: "I know for a fact that Nicole Brown Simpson was a victim of stalking and that her cars and residence had been wiretapped."
Pavelic, a 19-year veteran of the LAPD, believes Simpson hired Pellicano to do eavesdropping based, in part, on similarities to the bugging devices he says Pellicano planted at Michael Jackson 's Neverland Ranch. Pellicano is currently in prison for illegal wiretapping.
"Cops knew about Pellicano's wiretapping of Nicole," alleges Pavelic, who will tell more in his book, "Guilty of Incompetence." "Had Nicole not been murdered, his wiretapping would have been exposed long ago." (more)
If this were art, it would be labeled "retro irony."
A land-line telephone that can be put in a paper envelope and sent to someone by snail-mail? There would be knowing nods, winks and guffaws all over the gallery.
But British industrial-design firm Priestman Goode isn't kidding. Its Post A Phone is meant as a "failsafe backup" when more sophisticated wireless technology goes off-line. (more) Cheap enough to keep a spare one in your purse or jacket pocket. Thin enough so bugs can't be installed or internal wiring compromised. Just find a random analog line jack, plug in and make a 'safe' call.
In a work environment, finding an analog jack is usually just a matter of unplugging a fax machine or speakerphone unit.
At home, find your 'demarc' junction box, unplug the household wiring and plug this phone directly into the outside wiring - thus bypassing any internal wiretaps or recording devices!
UK - A man obsessed with a teenage girl gave her a teddy bear with a tiny camera in its eye so he could spy on her.
John Howell also gave her a pen fitted with a camera to relay images to a video machine where he could watch the girl, Lincoln Crown Court heard. His obsession was so great that he also installed a software program on her computer which allowed him to read all her e-mails.
The 43-year-old Inland Revenue worker, was caught after the 13-year-old girl’s father spotted something was wrong with the teddy and called police. Detectives seized Howell’s laptop and briefcase full of surveillance equipment from his home in Market Deeping. (more)
Joe Navarro is an ex-FBI agent. His job was spotting spies. His weapon... he reads body language. These days, Joe writes and teaches poker players how to win.
He can help you spot deceit in your business as well.
Joe says... "Poker players lie all the time. They pretend they are strong when they are weak or weak when they are strong. The truth is they can all be read. You can have a poker face, but I've yet to see someone with a poker body."
"When you are feeling good _ or have a monster hand _ your body will manifest what it feels. You get happy feet. Your feet begin to bounce up and down like a kid going to Disney World.
IA - A federal judge has dismissed a lawsuit brought by three Clinton County emergency dispatchers who alleged their private phone conversations made on a work phone line were illegally recorded.
Senior U.S. District Judge Harold Vietor ruled that the federal wiretapping law exempts law enforcement agencies that record phone calls as part of routine police practice. (more)
Hackers stole millions of credit card numbers from discount retailer TJX Cos. by intercepting wireless transfers of customer information at two Miami-area Marshalls stores, according to an eight-month investigation by the Canadian government.
The probe, led by Canadian Privacy Commissioner Jennifer Stoddart, faulted TJX for failing to upgrade its data encryption system by the time the electronic eavesdropping began in July 2005. The break-in ultimately gave hackers undetected access to TJX's central databases for a year and a half, exposing at least 45 million credit and debit cards to potential fraud. (more)
Provoked thoughts... • What wireless technologies is your company dependent upon? • Are you sure your voice anddata are secure from eavesdropping? • Do you conduct searches for eavesdropping devices? • How much damage would eavesdropping create before you noticed?
Rarely do we see an exact corporate dollar figure loss caused by eavesdropping and wiretapping. Vodafone must hold the world's record with $136+ million in fines, not to mention good-will and revenue losses.
Greece's telecoms regulator has fined the Greek unit of Vodafone 19.1 million euros for breaching privacy rules.
The fine is the second imposed over a wiretapping scandal that rocked the country last year. In 2006, Greece revealed that more than 100 people, including the country's prime minister, had their mobile phones tapped around the time of the Athens 2004 Olympics.
In December 2006, Greece's privacy watchdog fined Vodafone Hellas 76 million euros for a "number of infringements attributed to the company", without giving details.
Last month, the privacy watchdog also fined the Greek unit of telecom equipment maker Ericsson more than 7 million euros over the wiretapping affair.
The bugged phones were found to have been tapped mostly before and during the Athens Games by unknown eavesdroppers. (more)
Moral: Ignorance of eavesdropping and wiretapping is no excuse. You need to pro-actively conduct inspections as part of your due diligence.
The Department of Homeland Security (DHS) has gone to many strange places in its search for ways to identify terrorists before they attack, but perhaps none stranger than this lab on the outskirts of Russia's capital. The institute has for years served as the center of an obscure field of human behavior study -- dubbed psychoecology -- that traces it roots back to Soviet-era mind control research.
What's gotten DHS' attention is the institute's work on a system called Semantic Stimuli Response Measurements Technology, or SSRM Tek, a software-based mind reader that supposedly tests a subject's involuntary response to subliminal messages.
The "player" -- a traveler at an airport screening line, for example -- presses a button in response to the images, without consciously registering what he or she is looking at. The terrorist's response to the scrambled image involuntarily differs from the innocent person's, according to the theory.
Gear for testing MindReader 2.0 software hangs on a wall at the Psychotechnology Research Institute in Moscow. Marketed in North America as SSRM Tek, the technology will soon be tested for airport screening by a U.S. company under contract to the Department of Homeland Security. (more)
"...intended to provide guidance for engineers, architects, building officials, and property owners to design shelters and safe rooms in buildings. It presents information about the design and construction of shelters in the work place, home, or community building that will provide protection in response to manmade hazards."
"...will assist in the planning and design of shelters that may be constructed outside or within dwellings or public buildings. These safe rooms will protect occupants from a variety of hazards, including debris impact, accidental or intentional explosive detonation, and the accidental or intentional release of a toxic substance into the air. Safe rooms may also be designed to protect individuals from assaults and attempted kidnapping, which requires design features to resist forced entry and ballistic impact."
Risk Management Series - Design Guidance for Shelters and Safe Rooms (download)
from the oobject.com website... "The progress of technology has overtaken the mystique of the hidden camera such that we have been invaded by a million spy cams embedded in wholesale crap. Vote for the silliest." (vote here) Cameras hidden in everyday objects may seem silly... until the lens is aiming at you.
Take, for example, the Number 1 voted 'silly' spycam - the Wireless Hairdryer Spycam. Funny, unless you just stepped out of the shower and are holding one - embarrassing.
SpyCams in the office are worse; embarrassing, with expensive consequences.
We are really good at finding spycams. Here is how we do it... (more)
Description: Some vulnerabilities have been reported in various Nortel products, which can be exploited by malicious people to cause a DoS (Denial of Service) and to eavesdrop with affected devices.
...it is possible to send spoofed "Open Audio Stream" messages to an IP phone. This can be exploited to open an audio channel and eavesdrop with the IP phone. (more)
Possibly, the top 10 most common passwords... • password • 123456 • qwerty • abc123 • letmein • monkey • myspace1 • password1 • link182 • (your first name) What? You don't see your password here?!?! Congratulations. Source: pcmag.com
"A rootkit takes on a whole new meaning when the attacker has access to the camera, microphone, contact list, and phone hardware," renowned hacker HD Moore said regarding a security vulnerability in Apple's iPhone. "Couple this with 'always-on' Internet access over EDGE and you have a perfect spying device," he added. (more)
HD Moore, one of the developers of the Metasploit pen-testing (and hacking) tool, has posted exploits and detailed instructions on how to attack an iPhone. The information takes hackers -- and the FBI and NSA -- one step closer to being able to remotely and surreptitiously take control of an iPhone and turn it into a surveillance device. (more)