DEAR ABBY: Is it all right for a family member to eavesdrop on a conversation on the extension line?
The other day, my husband and I picked up the phone at the same time. It was my mother calling to chat and to ask a question. Although the call was clearly for me, my husband remained on the line because, he said, he had a question for her when I was done with the conversation.
I contend that this was rude, as I didn't know he hadn't hung up the other phone. He contends that he had a right to listen because it is his house, and he can listen in if he wants.
Although nothing of a personal nature was discussed, I still think he should have given me my privacy and asked me to let him know when Mom and I were done talking so he could ask his question. This has caused a major rift in our family. Please respond.
-Nancy
Belmont, Calif.
DEAR NANCY: When a spouse starts using the old "I can do it if I want because it's my house" line, it's usually because he/she knows he/she is wrong. I don't know whether your husband is a bully or simply has no life of his own, but eavesdropping is a very unpleasant trait. And in the interest of family harmony, he should cut it out. (more)
He should cut it out?!?! Abby, what were you thinking? Non-consensual eavesdropping is a federal and state crime! Criminal and civil penalties apply, and the days of spousal immunity for eavesdropping are pretty much history. The "my house, my phone" party line does not mean "my conversation." It was not his conversation. There was no consent. What if he punched her? Would you buy his "my wife, my chattel" baloney?
Saturday, December 8, 2007
Get up-to-speed on computer espionage. Read...
"Is someone spying on you?
It could be your boss, your competition, or a private investigator, but it could just as easily be a foreign intelligence agent - or the whiz kid down the street. More and more people today want to know what's on your computer, your PDA, your cell phone, or your wireless network.
Joel McNamara takes you inside the mind of the computer espionage artist... This is the book that teaches you to think like a spy, because that's the only way to outwit one."
Contents at a Glance
Acknowledgments.
Introduction.
Chapter 1 Spies.
Chapter 2 Spying and the Law.
Chapter 3 Black Bag Jobs.
Chapter 4 Breaching the System.
Chapter 5 Searching for Evidence.
Chapter 6 Unprotecting Data.
Chapter 7 Copying Data.
Chapter 8 Snooping with Keyloggers.
Chapter 9 Spying with Trojan Horses.
Chapter 10 Network Eavesdropping.
Chapter 11 802.11b Wireless Network Eavesdropping.
Chapter 12 Spying on Electronic Devices.
Chapter 13 Advanced Computer Espionage.
Appendix A: What's on the Web Site.
Index.
SpyCam Story #412 - Wireless Parasite
Key to the development is ... the magnetic field created by the AC source in the light. A field frequency of 45-100kHz can be used by the ring to generate 120mW of electricity, which is enough to power the camera.
From that point on the otherwise-standard camera ... beaming its images to a PC using an ordinary Wi-Fi chip that also draws power from the light.
NEC suggests that its camera could be installed in office light fittings to help companies keep an eye on their staff at work... (more)
The futuristic ideas of Nikola Tesla
Private eyes indicted in ID-theft case
State and federal agents have broken up a nationwide "pretext" identity-theft scheme involving private detectives who obtained personal information about their targets — from financial and medical records to tax returns — through deceit and lies, according to a federal grand-jury indictment unsealed Thursday. (more)
Wednesday, December 5, 2007
SpyCam Story #411 - Teen Pleads Guilty
IL - A Cary teen accused of helping a friend videotape his sexual encounter with an unknowing high school classmate pleaded guilty to a reduced charge Tuesday in a plea bargain that allows him to escape a possible felony conviction.
Stefen W. Mueller, 18, admitted guilt to a misdemeanor attempted eavesdropping as part of a deal with McHenry County prosecutors made formal in court Tuesday morning. (more)
Stefen W. Mueller, 18, admitted guilt to a misdemeanor attempted eavesdropping as part of a deal with McHenry County prosecutors made formal in court Tuesday morning. (more)
Tuesday, December 4, 2007
Wireless Keyboard Interception - Encryption Cracked
Bluetooth is increasingly becoming the de-facto standard for wireless communication in peripheral devices and is reckoned to be secure. But some manufacturers such as Logitech and Microsoft rely on 27 MHz radio technology which, it transpires, is anything but secure.
Using nothing more than a simple radio receiver, a soundcard and suitable software, Swiss security firm Dreamlab Technologies managed to capture and decode the radio communications between a keyboard and a PC.
The attack opens the way up to all sorts of mischief including keystroke logging to capture login credentials to online banking sites or email accounts. (more)
...and skipped Asia due to redundancy issues.
An amusement park with a spy theme is planned as part of a major entertainment complex in Spain...
The park, named Spyland, will be part of a massive leisure complex called Gran Scala that is being planned for the Zaragoza province of Spain. The entertainment district is expected to include 32 casinos, four theme parks, mega-hotels, shopping and other attractions. Construction on Spyland is scheduled to start in late 2008, with a projected opening date of 2010...
Spyland will be a family attraction with rides and interactive activities based on the history of secret agents around the world. Visitors will be able to play the role of spy, undertake missions, collect clues and infiltrate fictitious borders as they move through six zones in the park, including a small water park called Aquantica. Guests will also be able to test technologies used in spying. Stunt shows will be based on the escapades of real spies.
Developers originally tried but failed to get permission to build Spyland in Dubai or France... (more)
The park, named Spyland, will be part of a massive leisure complex called Gran Scala that is being planned for the Zaragoza province of Spain. The entertainment district is expected to include 32 casinos, four theme parks, mega-hotels, shopping and other attractions. Construction on Spyland is scheduled to start in late 2008, with a projected opening date of 2010...
Spyland will be a family attraction with rides and interactive activities based on the history of secret agents around the world. Visitors will be able to play the role of spy, undertake missions, collect clues and infiltrate fictitious borders as they move through six zones in the park, including a small water park called Aquantica. Guests will also be able to test technologies used in spying. Stunt shows will be based on the escapades of real spies.
Developers originally tried but failed to get permission to build Spyland in Dubai or France... (more)
Labels:
art,
counterespionage,
espionage,
FutureWatch,
miscellaneous,
mores,
toy,
weird
Monday, December 3, 2007
"Listen through walls, up to 1/2 mile away!"
• Amplify them 50,000 times.
• Broadcast them up to 1/2 mile away.
This odd-ball little eavesdropping bug is creative mix of technologies. No need to enter someone's office or home. Just attach this thing to the floor above, ceiling below or the outside wall. Then, head to comfortable spot within a 1/2 mile range. No nearby comfortable spot? Put the receiver and a recorder in a car, and park it nearby. Return daily to pick-up your recordings. (more)
Grab a map. Draw a 1/2 mile circle around your own home or office. How many good listening posts do you see? Maybe hundreds in a suburban environment. Definitely hundreds-of-thousands in a city.
When was the last time you had a professional debugging inspection?
Need a quick example... Go to Google Maps; search for Dearing, KS. The distance between 2200 Road and 2000 Road is exactly one mile. The listening post could be anywhere in this town!
Could we find this bug?
Of course.
When Warrantless Wiretaps Go Bad
Mike Lane on Wiretapping. (cartoon)
MI5 warns over China spy threat
Leading British firms and government agencies have been warned Chinese state organisations may be spying on them.
UK intelligence network MI5 has contacted 300 chief executives and security experts at banks and financial institutions to raise the concerns. (more)
UK intelligence network MI5 has contacted 300 chief executives and security experts at banks and financial institutions to raise the concerns. (more)
Sunday, December 2, 2007
"I'm dreaming of a Spy Christmas..."
Consumer Reports magazine had 40 children check out the "fun factor” in 24 toys, priced less than $10 to $200, to determine the hot holiday sellers this year. The top four toys overall ranged from a racing timer to a magnifying handheld "bionic eye” to a remote-controlled vehicle equipped with a "spycam.” The children in the test ranged in ages from 6 through 12. (more)
FutureWatch: The next generation of spies is in the pipeline!
FutureWatch: The next generation of spies is in the pipeline!
From the Security Scrapbook Archives (12/2003)
50's, 60's, 70's, 80's and 90's+
"Hey, do I take care of my friends or what?"
• Just in time for your holiday parties!
• FREE!!!
• Play 'Name That Tune' (really fast).
Side One • Side Two
Friday, November 30, 2007
Spybuster's Tip #107 - SpyWare - Instant Education
The Top Ten articles for getting up-to-speed on SpyWare issues
- as picked by the Editor's of TechRepublic
• The Anatomy of Spyware
• Spyware: Know Your Enemy
• Spyware: Securing gateway and endpoint against data theft
• Spyware: Determine Your Threat Level ... Enterprise Spy Audit
• Best of Breed vs. Suite Anti-Spyware: What's Best for You?
• 10 things to look for in an anti-spyware application
• Have we moved beyond anti-virus and spyware protection software?
• Protecting Organizations from Spyware
• Spyware Is Everywhere: A Multi-Layered Solution ... Best Defense
• Windows Defender in Vista offers built-in spyware protection
• Behavior-Based Spyware Detection
• Spyware - The Unseen Enemy
- as picked by the Editor's of TechRepublic
• The Anatomy of Spyware
• Spyware: Know Your Enemy
• Spyware: Securing gateway and endpoint against data theft
• Spyware: Determine Your Threat Level ... Enterprise Spy Audit
• Best of Breed vs. Suite Anti-Spyware: What's Best for You?
• 10 things to look for in an anti-spyware application
• Have we moved beyond anti-virus and spyware protection software?
• Protecting Organizations from Spyware
• Spyware Is Everywhere: A Multi-Layered Solution ... Best Defense
• Windows Defender in Vista offers built-in spyware protection
• Behavior-Based Spyware Detection
• Spyware - The Unseen Enemy
Spyware tops list of threats in CompTIA survey
Spyware has become the biggest security threat to organizations, a survey from the Computer Technology Industry Association (CompTIA) has discovered. That's a big change from a few years ago, when spyware was barely even considered a threat. (more)
SpyCam Story #410 - 21st Century O. Henry
India - The International Film Festival found its gravitas with the The Voyeur (which) delved into the current ogre of spycams and surveillance that leaves no room for individual privacy...
Prasanjeet, a computer mechanic ... finds succour from his nondescript life by fantasising about Madhubala, the perfect woman. Soon his fantasy finds a real form as a pretty neighbor moves in next door and seeks his help in settling down.
The electronics geek uses a spycam to fuel his desire and shares the spoils of voyeurism with his friend who happens to be a Muslim. No prizes for guessing where the story heads.
The brutal State steps in and the Muslim is labeled as terrorist while the Voyeur is arrested for something the state excels in: surveillance. (more)
Prasanjeet, a computer mechanic ... finds succour from his nondescript life by fantasising about Madhubala, the perfect woman. Soon his fantasy finds a real form as a pretty neighbor moves in next door and seeks his help in settling down.
The electronics geek uses a spycam to fuel his desire and shares the spoils of voyeurism with his friend who happens to be a Muslim. No prizes for guessing where the story heads.
The brutal State steps in and the Muslim is labeled as terrorist while the Voyeur is arrested for something the state excels in: surveillance. (more)
Subscribe to:
Comments (Atom)