Friday, December 28, 2007
FutureWatch - CCTV
In preparation for the Beijing Olympics and a series of other international events, American companies, such as Honeywell, General Electric, United Technologies and IBM, are helping the Chinese government design and install one of the most comprehensive high-tech public surveillance systems in the world. (more)
Labels:
FutureWatch,
government,
political,
privacy,
product,
spycam,
tracking
Threat Awareness - Keystroke Loggers
from Mike Mullins - TechRepublic...
Keystroke loggers are a particularly dangerous security threat because users typically don’t realize they’re even there...
Most antivirus and antispyware programs will miss software keystroke loggers, so how can you protect against these sneaky devices? Fortunately, there are some programs designed for this specific task. For example, SpyCop and SnoopFree Software are both software programs specifically designed to detect software keystroke loggers...
For a comprehensive list of keystroke loggers, Keyloggers.com maintains an updated list of both hardware and software versions sold by a multitude of companies. (more)
Keystroke loggers are a particularly dangerous security threat because users typically don’t realize they’re even there...
Most antivirus and antispyware programs will miss software keystroke loggers, so how can you protect against these sneaky devices? Fortunately, there are some programs designed for this specific task. For example, SpyCop and SnoopFree Software are both software programs specifically designed to detect software keystroke loggers...
For a comprehensive list of keystroke loggers, Keyloggers.com maintains an updated list of both hardware and software versions sold by a multitude of companies. (more)
Thursday, December 27, 2007
A Solution to USB Leaks and Injections of Malware
from the company's web site...
"The proliferation of data loss due to the inappropriate or sometimes criminal use of removable media devices has reached alarming levels.
Sanctuary Device Control allows you to regain control of the peripheral storage devices that your user community attempts to connect to your network assets. Through granular policy-based controls, Sanctuary Device Control reduces risk of data theft, data leakage and malware introduction via unauthorized removable media and assures compliance with the landslide of regulations governing privacy and accountability.
Positive Approach to USB Security
Hardware such as USB memory sticks, FireWire external hard-drives, scanners, music players, digital cameras, PDAs, and CD/DVD burner drives are scattered throughout offices around the world. Their proliferation amplifies the threats posed by outsiders or users who plug in devices that could compromise the security of sensitive data.
By employing a whitelist approach, Sanctuary enables only authorized devices to connect to a network, laptop or PC - facilitating security and systems management, while providing the necessary flexibility to the organization." (more) (our earlier warnings 1, 2, 3, 4)
"The proliferation of data loss due to the inappropriate or sometimes criminal use of removable media devices has reached alarming levels.
Sanctuary Device Control allows you to regain control of the peripheral storage devices that your user community attempts to connect to your network assets. Through granular policy-based controls, Sanctuary Device Control reduces risk of data theft, data leakage and malware introduction via unauthorized removable media and assures compliance with the landslide of regulations governing privacy and accountability.
Positive Approach to USB Security
Hardware such as USB memory sticks, FireWire external hard-drives, scanners, music players, digital cameras, PDAs, and CD/DVD burner drives are scattered throughout offices around the world. Their proliferation amplifies the threats posed by outsiders or users who plug in devices that could compromise the security of sensitive data.
By employing a whitelist approach, Sanctuary enables only authorized devices to connect to a network, laptop or PC - facilitating security and systems management, while providing the necessary flexibility to the organization." (more) (our earlier warnings 1, 2, 3, 4)
Geoslavery
Geoslavery is a new form of human bondage based on cellphone or GPS tracking. Four years ago in IEEE Technology and Society Magazine, Pete Fisher and I [Jerome E. Dobson] defined geoslavery as "a practice in which one entity, the master, coercively or surreptitiously monitors and exerts control over the physical location of another individual, the slave." ...
This year in the Geographical Review, Pete and I warned that human tracking will become commonplace, mainly because of reduction in price. As recently as 10 years ago, the cost of round-the-clock surveillance was about $350,000 per watched person per year -- an exorbitant price tag justified only for high-value targets in matters of national security or corporate espionage. Now the cost is less than $500 per watched person per year. (more)
This year in the Geographical Review, Pete and I warned that human tracking will become commonplace, mainly because of reduction in price. As recently as 10 years ago, the cost of round-the-clock surveillance was about $350,000 per watched person per year -- an exorbitant price tag justified only for high-value targets in matters of national security or corporate espionage. Now the cost is less than $500 per watched person per year. (more)
Wednesday, December 26, 2007
Time Magazine - Invention of the Year
iPhone.
Sure, you knew that.
But, can you name Time's Law & Order inventions of the year?
Hint... Both work at the speed of light.
High-speed chases may be money shots in Hollywood, but everywhere else they're just dangerous. The StarChase Pursuit Management System uses a laser-guided launcher mounted on the front grill of a cop car to tag fleeing vehicles with a GPS tracking device. Then the fuzz can hang back as real-time location data are sent to police headquarters.
Available: Early 2008 (more)
The hunt for better non-lethal weaponry gained new urgency when several people died in recent years after being shocked by a Taser. The LED Incapacitator, funded by the Department of Homeland Security, is a novel alternative. When officers shine the flashlight-like device in a person's eyes, high-intensity LEDs, pulsating at varying rates, will make the suspect temporarily blind and dizzy. Available: 2008. (more)
Sure, you knew that.
But, can you name Time's Law & Order inventions of the year?
Hint... Both work at the speed of light.
High-speed chases may be money shots in Hollywood, but everywhere else they're just dangerous. The StarChase Pursuit Management System uses a laser-guided launcher mounted on the front grill of a cop car to tag fleeing vehicles with a GPS tracking device. Then the fuzz can hang back as real-time location data are sent to police headquarters.
Available: Early 2008 (more)
The hunt for better non-lethal weaponry gained new urgency when several people died in recent years after being shocked by a Taser. The LED Incapacitator, funded by the Department of Homeland Security, is a novel alternative. When officers shine the flashlight-like device in a person's eyes, high-intensity LEDs, pulsating at varying rates, will make the suspect temporarily blind and dizzy. Available: 2008. (more)
SpyCam Story #417 - Illinois' New Law
IL - A lawyer in Wheaton hid his cameras in a roll of toilet paper and a basket of potpourri in the women's restroom.
A bar owner in Downstate Chatsworth concealed his in a bathroom fan and a laundry basket.
And in East Dundee a podiatrist stands accused of tucking a camera underneath an examination table so he could watch patients undress.
Though authorities charged the three men with other felonies in connection with these acts, the actual videotapings were only misdemeanors. Illinois statutes, it seems, are as outdated as Super 8 film.
But a new state law going into effect Jan. 1 fast-forwards the criminal code into the 21st Century by making it a felony to record or transmit images of an adult in a restroom, tanning bed, tanning salon, locker room, changing room or hotel room without permission. If convicted, violators could face up to 3 years in prison.
At least 19 states, including Indiana, currently classify video voyeurism as a felony, according to the National Center for Victims of Crime. At least four others have bills pending. (more)
A bar owner in Downstate Chatsworth concealed his in a bathroom fan and a laundry basket.
And in East Dundee a podiatrist stands accused of tucking a camera underneath an examination table so he could watch patients undress.
Though authorities charged the three men with other felonies in connection with these acts, the actual videotapings were only misdemeanors. Illinois statutes, it seems, are as outdated as Super 8 film.
But a new state law going into effect Jan. 1 fast-forwards the criminal code into the 21st Century by making it a felony to record or transmit images of an adult in a restroom, tanning bed, tanning salon, locker room, changing room or hotel room without permission. If convicted, violators could face up to 3 years in prison.
At least 19 states, including Indiana, currently classify video voyeurism as a felony, according to the National Center for Victims of Crime. At least four others have bills pending. (more)
Tuesday, December 25, 2007
Santa's Watching Me
I'm not paranoid, that's him! (more)
How To Create A Fake Google Earth Spy Video
Got some free time?
Want to amaze your friends and surprise your enemies?
This video is designed to demonstrate how to make a fake satellite spy video using Google Earth. Big Brother Is Watching You. (video)
Want to amaze your friends and surprise your enemies?
This video is designed to demonstrate how to make a fake satellite spy video using Google Earth. Big Brother Is Watching You. (video)
Monday, December 24, 2007
Police Blotter: Charged with Eavesdropping
NY - Christina M. Paikin, 36, of Seneca Street in Chittenango, was charged with eavesdropping, possession of an eavesdropping device and second-degree criminal contempt. She is scheduled to appear in the Town of Sullivan Court Jan. 7. (more)
How Investigators Stay ahead of the Tech Curve
They read...From the publisher...
"The purpose of this [site] is to provide reviews and recommendations on specific products, books, websites, etc and to implement technology based solutions for your investigative needs. It is kind of a "gadget reports/warehouse" which is investigative related only." (link)
"The purpose of this [site] is to provide reviews and recommendations on specific products, books, websites, etc and to implement technology based solutions for your investigative needs. It is kind of a "gadget reports/warehouse" which is investigative related only." (link)
Instant Education: Ten Information Security Concepts You Need to Know
(Summary of an article by Gerhard Lindenmayer)
1. Layered Approach
2. Encrypt, Encrypt, Encrypt
3. Security Policy Enforcement
4. Strong Password Protection
5. Antivirus
6. Employee Data Removal
7. Internet Access Restrictions
8. Regularly Scheduled Patches
9. Firewalls and Intrusion
10. Regular Penetration Tests
(See the full article for an explanation of these concepts.)
1. Layered Approach
2. Encrypt, Encrypt, Encrypt
3. Security Policy Enforcement
4. Strong Password Protection
5. Antivirus
6. Employee Data Removal
7. Internet Access Restrictions
8. Regularly Scheduled Patches
9. Firewalls and Intrusion
10. Regular Penetration Tests
(See the full article for an explanation of these concepts.)
Alert - Working Surge Protector is also a GSM Bug
It looks like a power strip.
It acts like a power strip.
It also acts as a surge protector.
What could possibly go wrong?
Ahh, well, ummm... It turns into a giant wireless eavesdropping microphone when called from any telephone in the world!
But, don't let that bother you. It really is a great surge protector. So great, it even surge-protects your telephone! What could possibly go wrong?
Ahh, well, ummm... If you plug your telephone into it the damn thing becomes a wiretap ...which can be monitored from any telephone in the world!
But, don't let that bother you. What are the chances that someone would call in and monitor your room or your phone calls just at the moment you are talking?
Ahh, well, ummm... The damn thing also has ears! Whenever it hears you say anything - in the room, or on the phone - it snitches on you!!! It sends a freekin' text message to your eavesdropper!
"No problem." I hear you say, "Thanks for the tip and the photo, Kevin. Now that I know what this horrid little thing looks like I'll keep alert."
Dude! This gizmo can be built into anything. Eavesdropping detection audits are a standard business practice. You need to start checking for these things, now. Call me, from a safe phone. (more)
It acts like a power strip.
It also acts as a surge protector.
What could possibly go wrong?
Ahh, well, ummm... It turns into a giant wireless eavesdropping microphone when called from any telephone in the world!
But, don't let that bother you. It really is a great surge protector. So great, it even surge-protects your telephone! What could possibly go wrong?
Ahh, well, ummm... If you plug your telephone into it the damn thing becomes a wiretap ...which can be monitored from any telephone in the world!
But, don't let that bother you. What are the chances that someone would call in and monitor your room or your phone calls just at the moment you are talking?
Ahh, well, ummm... The damn thing also has ears! Whenever it hears you say anything - in the room, or on the phone - it snitches on you!!! It sends a freekin' text message to your eavesdropper!
"No problem." I hear you say, "Thanks for the tip and the photo, Kevin. Now that I know what this horrid little thing looks like I'll keep alert."
Dude! This gizmo can be built into anything. Eavesdropping detection audits are a standard business practice. You need to start checking for these things, now. Call me, from a safe phone. (more)
Sunday, December 23, 2007
Update - Rayney ‘phone’ man in key talks
Australia - A defense lawyer for the man accused of bugging the telephone calls of murdered Supreme Court registrar Corryn Rayney was negotiating with the prosecution, Perth Magistrate’s Court was told yesterday.
Timothy Matthew Pearson appeared on one Commonwealth charge of intercepting a communication passing over a telecommunications system. (more)
Timothy Matthew Pearson appeared on one Commonwealth charge of intercepting a communication passing over a telecommunications system. (more)
Friday, December 21, 2007
How-to leave a spare key without worry - Key Safes
AccessPoint - Digital KeySafe
Designer key box with electronic time stamp that records last nine access events. Easy to use, one hand operation ensures quick access. Low profile, subtle design compliments door frame with a variety of natural colors. Change code anytime for added security. Solid, weather resistant metal construction. Know what time your children and others enter your home.
KeySure - One-time Use Plastic Container
Patented key control product is a "keyless" lock box. It is a container in the form of a security seal, to access the key; the box must be physically broken. It prevents keys from being handled, duplicated or used surreptitiously. A product for keys not accessed on a regular basis. (additional options)
Designer key box with electronic time stamp that records last nine access events. Easy to use, one hand operation ensures quick access. Low profile, subtle design compliments door frame with a variety of natural colors. Change code anytime for added security. Solid, weather resistant metal construction. Know what time your children and others enter your home.
KeySure - One-time Use Plastic Container
Patented key control product is a "keyless" lock box. It is a container in the form of a security seal, to access the key; the box must be physically broken. It prevents keys from being handled, duplicated or used surreptitiously. A product for keys not accessed on a regular basis. (additional options)
Alert - Analog Cellular - Discontinued
As of midnight on February 18, 2008, cellular telephone companies will not be required to provide analog service. While most wireless telephone users will not be affected by this transition (often called the “analog cellular sunset”), some users may be affected. In addition, the transition could affect some alarm systems and some users of OnStar in-vehicle communications service.
You will not be affected by the transition if you:
• use a digital handset; or
• subscribe to wireless service from Sprint/Nextel or T-Mobile.
You may be affected by the transition if you:
• use an analog-only handset (there are very few of these left in service); and
• receive service from a cellular telephone company, including AT&T Mobility, Verizon Wireless, Alltel, US Cellular, and Dobson (and other companies that market their services as “Cellular One”); or if you
• use service that may rely on analog cellular radio equipment, such as an alarm system with a wireless radio link or OnStar service in an older vehicle. (more)
You will not be affected by the transition if you:
• use a digital handset; or
• subscribe to wireless service from Sprint/Nextel or T-Mobile.
You may be affected by the transition if you:
• use an analog-only handset (there are very few of these left in service); and
• receive service from a cellular telephone company, including AT&T Mobility, Verizon Wireless, Alltel, US Cellular, and Dobson (and other companies that market their services as “Cellular One”); or if you
• use service that may rely on analog cellular radio equipment, such as an alarm system with a wireless radio link or OnStar service in an older vehicle. (more)
Subscribe to:
Posts (Atom)