Saturday, December 8, 2007

Next time, Nancy, ask someone who knows...

DEAR ABBY: Is it all right for a family member to eavesdrop on a conversation on the extension line?

The other day, my husband and I picked up the phone at the same time. It was my mother calling to chat and to ask a question. Although the call was clearly for me, my husband remained on the line because, he said, he had a question for her when I was done with the conversation.


I contend that this was rude, as I didn't know he hadn't hung up the other phone. He contends that he had a right to listen because it is his house, and he can listen in if he wants.

Although nothing of a personal nature was discussed, I still think he should have given me my privacy and asked me to let him know when Mom and I were done talking so he could ask his question. This has caused a major rift in our family. Please respond.
-Nancy
Belmont, Calif.


DEAR NANCY: When a spouse starts using the old "I can do it if I want because it's my house" line, it's usually because he/she knows he/she is wrong. I don't know whether your husband is a bully or simply has no life of his own, but eavesdropping is a very unpleasant trait. And in the interest of family harmony, he should cut it out. (more)

He should cut it out?!?! Abby, what were you thinking? Non-consensual eavesdropping is a federal and state crime! Criminal and civil penalties apply, and the days of spousal immunity for eavesdropping are pretty much history. The "my house, my phone" party line does not mean "my conversation." It was not his conversation. There was no consent. What if he punched her? Would you buy his "my wife, my chattel" baloney?

Get up-to-speed on computer espionage. Read...

Secrets of Computer Espionage: Tactics and Countermeasures

"Is someone
spying on you?

It could be your boss, your competition, or a private investigator, but it could just as easily be a foreign intelligence agent - or the whiz kid down the street. More and more people today want to know what's on your computer, your PDA, your cell phone, or your wireless network.

Joel McNamara takes you inside the mind of the computer espionage artist... This is the book that teaches you to think like a spy, because that's the only way to outwit one."

Contents at a Glance
Acknowledgments.
Introduction.
Chapter 1 Spies.
Chapter 2 Spying and the Law.
Chapter 3 Black Bag Jobs.
Chapter 4 Breaching the System.
Chapter 5 Searching for Evidence.
Chapter 6 Unprotecting Data.
Chapter 7 Copying Data.
Chapter 8 Snooping with Keyloggers.
Chapter 9 Spying with Trojan Horses.
Chapter 10 Network Eavesdropping.
Chapter 11 802.11b Wireless Network Eavesdropping.
Chapter 12 Spying on Electronic Devices.
Chapter 13 Advanced Computer Espionage.
Appendix A: What's on the Web Site.
Index.

SpyCam Story #412 - Wireless Parasite

The latest prototype product from NEC Japan has to be one of the most novel uses of alternative energy we've ever seen - it's a wireless security camera that draws its power directly from fluorescent light tubes.

Key to the development is ... the magnetic field created by the AC source in the light. A field frequency of 45-100kHz can be used by the ring to generate 120mW of electricity, which is enough to power the camera.

From that point on the otherwise-standard camera ... beaming its images to a PC using an ordinary Wi-Fi chip that also draws power from the light.

NEC suggests that its camera could be installed in office light fittings to help companies keep an eye on their staff at work... (more)

The futuristic ideas of Nikola Tesla are now taking hold. This product is a good example. Other examples include the super-cool Tesla Roadster and the Norelco Toothbrush.

Private eyes indicted in ID-theft case

State and federal agents have broken up a nationwide "pretext" identity-theft scheme involving private detectives who obtained personal information about their targets — from financial and medical records to tax returns — through deceit and lies, according to a federal grand-jury indictment unsealed Thursday. (more)

Wednesday, December 5, 2007

SpyCam Story #411 - Teen Pleads Guilty

IL - A Cary teen accused of helping a friend videotape his sexual encounter with an unknowing high school classmate pleaded guilty to a reduced charge Tuesday in a plea bargain that allows him to escape a possible felony conviction.

Stefen W. Mueller, 18, admitted guilt to a misdemeanor attempted eavesdropping as part of a deal with McHenry County prosecutors made formal in court Tuesday morning. (more)

Tuesday, December 4, 2007

Wireless Keyboard Interception - Encryption Cracked

Security researchers have cracked the rudimentary encryption used in a range of popular wireless keyboards.

Bluetooth is increasingly becoming the de-facto standard for wireless communication in peripheral devices and is reckoned to be secure. But some manufacturers such as Logitech and Microsoft rely on 27 MHz radio technology which, it transpires, is anything but secure.

Using nothing more than a simple radio receiver, a soundcard and suitable software, Swiss
security firm Dreamlab Technologies managed to capture and decode the radio communications between a keyboard and a PC.

The attack opens the way up to all sorts of mischief
including keystroke logging to capture login credentials to online banking sites or email accounts. (more)

...and skipped Asia due to redundancy issues.

An amusement park with a spy theme is planned as part of a major entertainment complex in Spain...

The park, named Spyland, will be part of a massive leisure complex called Gran Scala that is being planned for the Zaragoza province of Spain. The entertainment district is expected to include 32 casinos, four theme parks, mega-hotels, shopping and other attractions.
Construction on Spyland is scheduled to start in late 2008, with a projected opening date of 2010...

Spyland will be a family attraction with rides and interactive activities based on the history of secret agents around the world. Visitors will be able to play the role of spy, undertake missions, collect clues and infiltrate fictitious borders as they move through six zones in the park, including a small water park called Aquantica. Guests will also be able to test technologies used in spying. Stunt shows will be based on the escapades of real spies.

Developers originally tried but failed to get permission to build Spyland in Dubai or France... (more)

Monday, December 3, 2007

"Listen through walls, up to 1/2 mile away!"

• Pull conversations out of walls or floors.
• Amplify them
50,000 times.
• Broadcast them
up to 1/2 mile away.

This odd-ball little eavesdropping bug is creative mix of technologies. No need to enter someone's office or home. Just attach this thing to the floor above, ceiling below or the outside wall. Then, head to comfortable spot within a 1/2 mile range. No nearby comfortable spot? Put the receiver and a recorder in a car, and park it nearby. Return daily to pick-up your recordings.
(more)

Grab a map. Draw a 1/2 mile circle around your own home or office. How many good listening posts do you see? Maybe hundreds in a suburban environment. Definitely hundreds-of-thousands in a city.

When was the last time you had a professional debugging inspection?

Need a quick example... Go to Google Maps; search for Dearing, KS. The distance between 2200 Road and 2000 Road is exactly one mile. The listening post could be anywhere in this town!

Could we find this bug?
Of course.

When Warrantless Wiretaps Go Bad

Mike Lane on Wiretapping. (cartoon)

MI5 warns over China spy threat

Leading British firms and government agencies have been warned Chinese state organisations may be spying on them.

UK intelligence network MI5 has contacted 300 chief executives and security experts at banks and financial institutions to raise the concerns. (more)

Sunday, December 2, 2007

"I'm dreaming of a Spy Christmas..."

Consumer Reports magazine had 40 children check out the "fun factor” in 24 toys, priced less than $10 to $200, to determine the hot holiday sellers this year. The top four toys overall ranged from a racing timer to a magnifying handheld "bionic eye” to a remote-controlled vehicle equipped with a "spycam.” The children in the test ranged in ages from 6 through 12. (more)
FutureWatch: The next generation of spies is in the pipeline!

From the Security Scrapbook Archives (12/2003)

Every Rock & Roll hit from the
50's, 60's, 70's, 80's and 90's+
"Hey, do I take care of my friends or what?"
• Just in time for your holiday parties!
FREE!!!
• Play 'Name That Tune' (really fast).
Side OneSide Two

Friday, November 30, 2007

Spybuster's Tip #107 - SpyWare - Instant Education

The Top Ten articles for getting up-to-speed on SpyWare issues
- as picked by the Editor's of TechRepublic

The Anatomy of Spyware
Spyware: Know Your Enemy
Spyware: Securing gateway and endpoint against data theft
Spyware: Determine Your Threat Level ... Enterprise Spy Audit
Best of Breed vs. Suite Anti-Spyware: What's Best for You?
10 things to look for in an anti-spyware application
Have we moved beyond anti-virus and spyware protection software?
Protecting Organizations from Spyware
Spyware Is Everywhere: A Multi-Layered Solution ... Best Defense
Windows Defender in Vista offers built-in spyware protection
Behavior-Based Spyware Detection
Spyware - The Unseen Enemy

Spyware tops list of threats in CompTIA survey

Spyware has become the biggest security threat to organizations, a survey from the Computer Technology Industry Association (CompTIA) has discovered. That's a big change from a few years ago, when spyware was barely even considered a threat. (more)

SpyCam Story #410 - 21st Century O. Henry

India - The International Film Festival found its gravitas with the The Voyeur (which) delved into the current ogre of spycams and surveillance that leaves no room for individual privacy...

Prasanjeet, a computer mechanic ... finds succour from his nondescript life by fantasising about Madhubala, the perfect woman. Soon his fantasy finds a real form as a pretty neighbor moves in next door and seeks his help in settling down.

The electronics geek uses a spycam to fuel his desire and shares the spoils of voyeurism with his friend who happens to be a Muslim. No prizes for guessing where the story heads.

The brutal State steps in and the Muslim is labeled as terrorist while the Voyeur is arrested for something the state excels in: surveillance. (more)