Now you can find out.
The International Spy Museum announces Operation Spy™, a new and groundbreaking immersive experience that takes the interactive concept to a higher level. In an action-packed hour, participants take on the role of U.S. intelligence officers on an international mission to locate a missing nuclear device on the verge of being sold to a rogue nation. This intense experience combines live-action, video characters, themed environments, special effects, and hands-on activities. Participants take part in an intrigue-filled adventure based on an actual case drawn from the files of U.S. intelligence. (more) (video)
Friday, November 2, 2007
Aerial Spy News
Germany - The third of five planned German high-resolution SAR-Lupe radar reconnaissance satellites was successfully launched Nov. 1 by a Russian Cosmos-3M rocket. (more)
The fly's a spy - UST below a half-opened garage door a tiny device can be seen at the feet of someone lurking in the shadows. It looks like a blue dragonfly. Then its miniature wings begin to flap as it slips under the door and darts along the street. After rising through the air it stops to hover outside the window of a building several stories high. There is an opening on the roof, and it slips inside. As it flits from room to room its video-camera “eye” transmits pictures to a screen on a remote-control unit strapped to the wrist of its clandestine operator.
This is not a scene from a James Bond film, in which 007 tests a new device from “Q”, but an animated video produced by Onera, France's national aerospace centre, to explain REMANTA, a project to develop the technologies needed for miniature robotic aircraft. More bug-like flying devices are being developed in other research laboratories around the world. (more) (video)
The fly's a spy - UST below a half-opened garage door a tiny device can be seen at the feet of someone lurking in the shadows. It looks like a blue dragonfly. Then its miniature wings begin to flap as it slips under the door and darts along the street. After rising through the air it stops to hover outside the window of a building several stories high. There is an opening on the roof, and it slips inside. As it flits from room to room its video-camera “eye” transmits pictures to a screen on a remote-control unit strapped to the wrist of its clandestine operator.
This is not a scene from a James Bond film, in which 007 tests a new device from “Q”, but an animated video produced by Onera, France's national aerospace centre, to explain REMANTA, a project to develop the technologies needed for miniature robotic aircraft. More bug-like flying devices are being developed in other research laboratories around the world. (more) (video)
Labels:
aerial,
eavesdropping,
FutureWatch,
government,
product,
spybot,
spycam,
toy
Fax Spy Caves
Australia - A former state Labor MP, accused of spying on a Liberal opponent, has quit her taxpayer-funded job and been criticised by the Ombudsman for "highly inappropriate" behaviour.
Heather McTaggart, who was Labor MP for Evelyn until losing her seat at last year's election, confessed to receiving electronic copies of all faxes sent to her successor, Liberal MP Christine Fyffe, for seven months.
She said she deleted any remaining faxes after reading a copy of the anonymous note alerting Ms Fyffe to the fact that Ms McTaggart was receiving her faxes: "I just deleted everything. I panicked and deleted it. That was it. Whatever was there …"(more)
Heather McTaggart, who was Labor MP for Evelyn until losing her seat at last year's election, confessed to receiving electronic copies of all faxes sent to her successor, Liberal MP Christine Fyffe, for seven months.
She said she deleted any remaining faxes after reading a copy of the anonymous note alerting Ms Fyffe to the fact that Ms McTaggart was receiving her faxes: "I just deleted everything. I panicked and deleted it. That was it. Whatever was there …"(more)
Blind Justice... League Story
"Being blind has forced me to develop my other senses, and my power as a detective rests in my ears," he said from his office at the Belgian Federal Police.
Van Loo, a slight man who has been blind since birth, is one of six blind police officers in a pioneering unit specializing in transcribing and analyzing wiretap recordings in criminal investigations. ...such is his acute sense of hearing that Paul van Thielen, a director at the Belgian Federal Police, compares his powers of observation to those of a "superhero."
When police eavesdrop on a suspected terrorist making a phone call, van Loo can listen to the tones dialed and immediately identify the number. By hearing the sound of a voice echoing off of a wall, he can deduce whether a suspect is speaking from an airport lounge or a crowded restaurant. (more)
SpyCam Story #401 - Royal Shoot-Out
UK - Two men who allegedly demanded £50,000 from a member of the royal family to keep quiet about a sex and drugs video were arrested after a police sting in a hotel room. ...the royal went straight to police who set up a meeting at the £500-a-night Hilton hotel in Central London. ...The meeting was filmed secretly by officers in an adjacent room. (more)
Thursday, November 1, 2007
Spy Budgets
Wonder what is budgeted to spy against your company?
Try this on for size:
• A$ = The value of your intellectual property.
• B% = A modest one-percent attack budget.
• Cc = The number of interested competitors.
• X$ = The war-chest you are up against.
Formula: (A$ x B%) x Cc = X$
Sample company: ($10,000,000. x .01) x 5 = $500,000.00
These figures are, of course, fictitious and very variable, but you get the idea.
So, how much are you budgeting to counter spying?
FREE counterespionage program development help is available.
Call us.
The presenter, her husband and their 'spying secretary'
UK - Kirsty Wark’s secretary used industrial espionage to get information that could help the Newsnight presenter’s husband to bring a claim for constructive dismissal against his business partners, it was alleged in the High Court
The secretary hacked into the e-mails sent between colleagues of Ms Wark’s husband, Alan Clements, who is accused of trying to get out of a “golden handcuffs” agreement that tied him to the television production company RDF Media. Mr Clements is also accused of deleting entries from his personal diary, which RDF claim would show that he was considering defecting to SMG, a business rival that owns Scottish Television. ...
The PA was allegedly able to access e-mails belonging to former colleagues of Mr Clements, including Hamish Barbour, who is also the husband of the television presenter Muriel Gray. (more)
The secretary hacked into the e-mails sent between colleagues of Ms Wark’s husband, Alan Clements, who is accused of trying to get out of a “golden handcuffs” agreement that tied him to the television production company RDF Media. Mr Clements is also accused of deleting entries from his personal diary, which RDF claim would show that he was considering defecting to SMG, a business rival that owns Scottish Television. ...
The PA was allegedly able to access e-mails belonging to former colleagues of Mr Clements, including Hamish Barbour, who is also the husband of the television presenter Muriel Gray. (more)
Russian official charged with wiretapping
A Moscow court has upheld the arrest of a Russian drug control officer on illegal wiretapping charges. The Moscow City Court also rejected a defense request that Lt. Gen. Alexander Bulbov, a department chief in Russia's FSKN agency, be released until his trial begins. (more)
SpyCam Story #400 - Cell Phone Cam Scam
Australia - A man who used a mobile phone to covertly film his former flatmate in the shower has been put on a two-year good-behaviour bond. David William Pender was arrested in July after the woman discovered a mobile phone with its camera running on her bathroom windowsill. (more)
Today's Amazing Stories (not spy-related)
...forget eating bacon, sausage and lunchmeat. No amount is considered completely safe, according to the analysis from the American Institute for Cancer Research and the World Cancer Research Fund. (more)
...a $199 PC (sans display). ...runs a Linux OS and is loaded with (or has links to) free applications, including Gmail, Google Docs & Spreadsheets, Google Calendar, Google Product Search, Google Blogger, Google YouTube, Google Maps, Google News, Meebo (instant messaging), GIMP (image editing), Firefox, Xing Movie Player, RhythmBox (iTunes substitute), Faqly (tech support), Facebook, Skype and OpenOffice.org 2.2. (more) (more)
The world's first 'Divorce fair' has taken place (in Vienna, Austria) to meet rising demand as more and more people untie the knot. ...gave people the chance to speak to lawyers and councillors about parting amicably. Dating agencies were also on hand... (more)
The world's first 'Divorce fair' has taken place (in Vienna, Austria) to meet rising demand as more and more people untie the knot. ...gave people the chance to speak to lawyers and councillors about parting amicably. Dating agencies were also on hand... (more)
Tuesday, October 30, 2007
Canadian Information Security Poll
Poll shows that 48% of Canadian executives are not confident private information is secure despite 71% having policies and procedures in place to guard against security breaches. (more)
Bug Your Laptop - Get It Back
The Cautionary Tale of the Khaki Bandit...
"'The khaki bandit' posed as an office worker at several corporations and successfully stole over 130 laptops which he later sold on eBay.
The ease of theft from the corporate offices (including FedEx and Burger King) shows just how bad corporate security can be. In some cases, the career thief just walked into the office behind an employee with a security badge.
Two million laptops were stolen just in 2004, and of those 97 percent were never recovered. Ultimately it was the corporate headquarters of Outback Steakhouse who caught the thief with a bugged laptop that notified them when he re-connected it to the internet." (more) (more)
How the Khaki Bandit (and others) do it...
• Choose targets with care. He went to neighborhoods, cities or states where he was not recognized. He sought large corporate offices to blend in with their large staffs and to find lots of laptops. When possible, he scheduled multiple burglaries for a single building that housing more than one company.
• Know the victims. He observed his targets in advance and paid attention to how employees dressed, whether they needed magnetic passes to enter and move about the building, and what time most of them left for the day.
• Time the arrival. He entered a business on the heels of an employee who could hold open a security door. He often arrived at about 4 p.m., a busy time of day that let him blend with the staff and exploit a time period when receptionists and assistants left for the day, but beefed-up nighttime security measures had not kicked in. He acted like he belonged.
• Make the move. When the office emptied, he went looking for laptops room by room. He kept an eye out for magnetic access cards, too. He had an alibi in case he was confronted. When done, he put the laptops in his shoulder bags - he would carry one into the building with a second bag inside it - and go.
• Move the product. He drove or mailed laptops back to his temporary home. He prepared them for sale by erasing the prior owner's data and installing or updating critical software.
Even folks from the Outback bug their laptops.
You should, too.
Resources...
XTool Mobile Security, Inc. (tracking system)
Computrace (tracking system)
Lo-Jack for Laptops (tracking system)
LaptopLocate (tracking system)
Total Logic Security (marking system)
Ztrace Gold (tracking system)
"'The khaki bandit' posed as an office worker at several corporations and successfully stole over 130 laptops which he later sold on eBay.
The ease of theft from the corporate offices (including FedEx and Burger King) shows just how bad corporate security can be. In some cases, the career thief just walked into the office behind an employee with a security badge.
Two million laptops were stolen just in 2004, and of those 97 percent were never recovered. Ultimately it was the corporate headquarters of Outback Steakhouse who caught the thief with a bugged laptop that notified them when he re-connected it to the internet." (more) (more)
How the Khaki Bandit (and others) do it...
• Choose targets with care. He went to neighborhoods, cities or states where he was not recognized. He sought large corporate offices to blend in with their large staffs and to find lots of laptops. When possible, he scheduled multiple burglaries for a single building that housing more than one company.
• Know the victims. He observed his targets in advance and paid attention to how employees dressed, whether they needed magnetic passes to enter and move about the building, and what time most of them left for the day.
• Time the arrival. He entered a business on the heels of an employee who could hold open a security door. He often arrived at about 4 p.m., a busy time of day that let him blend with the staff and exploit a time period when receptionists and assistants left for the day, but beefed-up nighttime security measures had not kicked in. He acted like he belonged.
• Make the move. When the office emptied, he went looking for laptops room by room. He kept an eye out for magnetic access cards, too. He had an alibi in case he was confronted. When done, he put the laptops in his shoulder bags - he would carry one into the building with a second bag inside it - and go.
• Move the product. He drove or mailed laptops back to his temporary home. He prepared them for sale by erasing the prior owner's data and installing or updating critical software.
Even folks from the Outback bug their laptops.
You should, too.
Resources...
XTool Mobile Security, Inc. (tracking system)
Computrace (tracking system)
Lo-Jack for Laptops (tracking system)
LaptopLocate (tracking system)
Total Logic Security (marking system)
Ztrace Gold (tracking system)
Zombie Computers From Planet Earth
Or more precisely, the collected computers of all the world's mothers. Along with millions of other out-of-date and unsecured PCs strung together by the Internet--what Corman calls "the leper colony"--those machines represent a combined mass of computing power responsible for most of the Net's spam e-mails, much of its click fraud, and the vicious "denial of service" attacks that can knock sites offline and even destroy online businesses altogether. (more)
See: Your PC Might Be A Zombie If...
"So, uh, does this mean the Invisible Fence idea is out, too?"
According to Taipei Times, the High School Student's Rights Association (HSRA) launched the boycott campaign on Sunday. The newspaper quoted the HSRA's secretary, Wang Hao-zheng, as saying that the ID keeps students under strict surveillance like convicts or animals. (more)
UK - Ten students in a secondary school in the United Kingdom are being tracked through RFID implants in their school uniforms in a pilot program. (more)
Not all parents are thrilled. (more)
Not all governments are thrilled. (more)
(In case you don't know... Invisible Fence)
Lessons from Nature - Eavesdropping Iguanas
The Galapagos Marine Iguana is mute, it recognizes and utilizes the alarm call of the Galapagos Mockingbird. This is the first instance of a non-vocal species eavesdropping on another species’ calls. Both the iguana and mockingbird fall prey to the Galapagos hawk, so by recognizing the mockingbird’s warning the iguanas gain important information on avoiding predation. (more)
Being sensitive to clues in your environment can save you, too.
If you feel a funny vibration when you step on your car's brakes, trust your instincts. Inspect. Car vibrations never get better by themselves. They only get worse.
If you have the funny feeling you are being eavesdropped upon, trust your instincts. Inspect. The thought would not have occurred to you if everything were fine.
(Your inspection station.)
Being sensitive to clues in your environment can save you, too.
If you feel a funny vibration when you step on your car's brakes, trust your instincts. Inspect. Car vibrations never get better by themselves. They only get worse.
If you have the funny feeling you are being eavesdropped upon, trust your instincts. Inspect. The thought would not have occurred to you if everything were fine.
(Your inspection station.)
Subscribe to:
Comments (Atom)