The case is scheduled to resume March 5th. The Huffington Post claims they have the Witness List: "Chris Rock, Stallone, Bert Fields, Tom Cruise and hundreds more." The list of 244 people, however, has made the rounds and wound up here. Rambo says he is willing to testify, "Why not? I don't want to be left out." Stallone said he wasn't surprised to hear the allegations that such activity occurs in Hollywood. "In this town, nothing seems as it is," Stallone said. "There's so much skullduggery." (more)
Wednesday, February 27, 2008
Tuesday, February 26, 2008
Eavesdropping on private chats is... art!
Conversations from thousands of internet chatrooms, message boards and other public forums have been transformed into an electronic art piece.
Described as a unique portrait of the internet, the electronic art - called the Listening Post – forms a free exhibition at the Science Museum in London.
The piece samples text fragments of uncensored and unedited internet conversations over 231 small electronic screens standing approximately 4m high and 5m wide. The text is accompanied by computer-synthesized voices reading or singing the words that surge, flicker and disappear over the screens.
Listening Post is a collaboration by sound artist Ben Rubin and statistician and artist Mark Hansen, who wanted to address the question: "What would 100,000 people chatting online sound like?" (more)
Described as a unique portrait of the internet, the electronic art - called the Listening Post – forms a free exhibition at the Science Museum in London.
The piece samples text fragments of uncensored and unedited internet conversations over 231 small electronic screens standing approximately 4m high and 5m wide. The text is accompanied by computer-synthesized voices reading or singing the words that surge, flicker and disappear over the screens.
Listening Post is a collaboration by sound artist Ben Rubin and statistician and artist Mark Hansen, who wanted to address the question: "What would 100,000 people chatting online sound like?" (more)
Labels:
art,
computer,
eavesdropping,
spybot,
tracking,
wiretapping
Americans are not as bugged as they think
Israel - The number of wiretaps performed by the police rose 22 percent last year, from 1,128 in 2006 to 1,375, despite Knesset members' complaints that this tactic is overused. Over the last five years, the number of court-approved wiretaps has risen 42 percent.
By comparison, only 1,839 wiretaps were carried out in the entire United States in 2006.
According to Professor Yoram Shahar of the Interdisciplinary Center in Herzliya, this means that per capita, Israeli policemen use 20 times as many wiretaps as do their American counterparts, and a random Israeli is 30 times as likely to be wiretapped as a random American. (more)
By comparison, only 1,839 wiretaps were carried out in the entire United States in 2006.
According to Professor Yoram Shahar of the Interdisciplinary Center in Herzliya, this means that per capita, Israeli policemen use 20 times as many wiretaps as do their American counterparts, and a random Israeli is 30 times as likely to be wiretapped as a random American. (more)
FutureWatch - New technology spells end for wiretapping
It's the stuff the best spy stories are made of, the broadsheets this week had a small story in their technology sections about the Scientific and Technological Research Council of Turkey (TÜBİTAK) National Institute for Electronics and Encryption Research (UEKAE) having developed a completely original software package that allows mobile phones to be encrypted.
This makes it possible for mobiles to be safe enough to discuss national secrets without fear of interception. This type of protection is, officials at TÜBİTAK say, especially vital in the field of military communication when phone calls intercepted by foreign agencies could have potentially fatal consequences for soldiers in the field.
According to TÜBİTAK's February press statement, they have been working on the technology for 20 years and it will be offered first to Turkey's army and then to the public and private companies. This software, they say, will put Turkey in the top league of countries for protecting information and privacy. There will be many for whom the encrypted cell phone has come not a moment too soon and others who are already regretting the development. (more)
This makes it possible for mobiles to be safe enough to discuss national secrets without fear of interception. This type of protection is, officials at TÜBİTAK say, especially vital in the field of military communication when phone calls intercepted by foreign agencies could have potentially fatal consequences for soldiers in the field.
According to TÜBİTAK's February press statement, they have been working on the technology for 20 years and it will be offered first to Turkey's army and then to the public and private companies. This software, they say, will put Turkey in the top league of countries for protecting information and privacy. There will be many for whom the encrypted cell phone has come not a moment too soon and others who are already regretting the development. (more)
Monday, February 25, 2008
"Encryption can't save you now, Sonny Boy... Muhhahahaaaaa!"
from c|net, by Declan McCullagh...
Computer scientists have discovered a novel way to bypass the encryption used in programs like Microsoft's BitLocker and Apple's FileVault and then view the contents of supposedly secure files.
In a paper (PDF) published Thursday that could prompt a rethinking of how to protect sensitive data, the researchers describe how they can extract the contents of a computer's memory and discover the secret encryption key used to scramble files. (I tested these claims by giving them a MacBook with FileVault; here's a slideshow.)
"There seems to be no easy remedy for these vulnerabilities," the researchers say...
Their technique doesn't attack the encryption directly. Rather, it relies on gaining access to the contents of a computer's RAM--through a mechanism as simple as booting a laptop over a network or from a USB drive--and then scanning for encryption keys. How the scan is done is one of the most clever portions of the paper. (more)
Computer scientists have discovered a novel way to bypass the encryption used in programs like Microsoft's BitLocker and Apple's FileVault and then view the contents of supposedly secure files.
In a paper (PDF) published Thursday that could prompt a rethinking of how to protect sensitive data, the researchers describe how they can extract the contents of a computer's memory and discover the secret encryption key used to scramble files. (I tested these claims by giving them a MacBook with FileVault; here's a slideshow.)
"There seems to be no easy remedy for these vulnerabilities," the researchers say...
Their technique doesn't attack the encryption directly. Rather, it relies on gaining access to the contents of a computer's RAM--through a mechanism as simple as booting a laptop over a network or from a USB drive--and then scanning for encryption keys. How the scan is done is one of the most clever portions of the paper. (more)
Cheap & Secure Communications - for Security ...and Eavesdroppers
from the TriSquare website – TSX300...
"eXtreme Radio Service (eXRS) two-way radios use proprietary Frequency Hopping Spread Spectrum (FHSS) in the ISM band (900 MHz frequencies). 10 Billion channels." (more)
What does this walkie-talkie mean to you?
- "Secure Conversation – No Eavesdropping"
- Communications range of at least 1-2 miles.
- Very good communications within buildings.
- Voice Operated Transmit (VOX)
- No license required.
- Accessories include a headset.
- Cost: less than $100.00 per pair!
What else does this mean?
- A quick hack turns it into a long-range stealth bug!
- The average TSCM sweep team will likely miss it.
- Advanced Eavesdropping Detection will find it.
"eXtreme Radio Service (eXRS) two-way radios use proprietary Frequency Hopping Spread Spectrum (FHSS) in the ISM band (900 MHz frequencies). 10 Billion channels." (more)
What does this walkie-talkie mean to you?
- "Secure Conversation – No Eavesdropping"
- Communications range of at least 1-2 miles.
- Very good communications within buildings.
- Voice Operated Transmit (VOX)
- No license required.
- Accessories include a headset.
- Cost: less than $100.00 per pair!
What else does this mean?
- A quick hack turns it into a long-range stealth bug!
- The average TSCM sweep team will likely miss it.
- Advanced Eavesdropping Detection will find it.
Labels:
amateur,
eavesdropping,
encryption,
Hack,
product,
TSCM,
wireless
Sunday, February 24, 2008
"...and, the 'Best Use of Spycam Technology' award goes to..."
Bird House Spy Cam
"Watch ‘em, but don’t touch ‘em!"
"Our Hawk Eye Nature Cam will open up undiscovered worlds of bird and wildlife behavior. Once you buy one of our wildlife monitoring cams, it probably won't be long before you buy another and another." (more)
Movies made with birdhouse spycams...
- Bats
- Baby Owls
- Flying Squirrel
- Baby Squirrels
- Hummingbirds
- Spooky Owls
- Baby birds feeding
- Squirrels
"Watch ‘em, but don’t touch ‘em!"
"Our Hawk Eye Nature Cam will open up undiscovered worlds of bird and wildlife behavior. Once you buy one of our wildlife monitoring cams, it probably won't be long before you buy another and another." (more)
Movies made with birdhouse spycams...
- Bats
- Baby Owls
- Flying Squirrel
- Baby Squirrels
- Hummingbirds
- Spooky Owls
- Baby birds feeding
- Squirrels
Labels:
aerial,
amateur,
miscellaneous,
nature,
product,
spycam,
toy,
voyeurism,
X-Ray Vision
"Boss, this suspect gets a lot of email."
The FBI revealed that human error led to surveillance of an entire email network back in 2006, rather than the single email address approved by the secretive court which approves domestic wiretaps and other forms of e-surveillance...
The ISP involved allegedly misinterpreted a warrant for one email address to be a warrant for - ahem - the entire network. (more)
The ISP involved allegedly misinterpreted a warrant for one email address to be a warrant for - ahem - the entire network. (more)
SpyCam Story #434 - Public Pool Perv
UK - A man who secretly filmed boys in a toilet and was caught with a camera at a children's swimming club has escaped a jail term. David Ashton (42) was arrested at Parkside Pool in Cambridge after staff were alerted to his suspicious behaviour during a parents-only training session for eight to 16-year-olds. Police found a video camera in a briefcase he was carrying. When officers searched his home, they discovered covert recordings of men and boys using a toilet cubicle, as well as other indecent images of children. (more)
Wiretap With Your Credit Card
That's right!
If you have a phone.
If you have a credit card.
You have a heavy-duty digital wiretap at your fingertips!
Of course, so does everyone else, so watch what you say 007.
...from the service provider's web site - callrecordercard.net...
It is easy to make high quality digital recordings. We will provide you with your own personal phone number in our state of the art, secure telecom switch.
- To record an important conversation, you first dial your personal phone number (PPN), which connects you to the recording equipment and then dial the number you want to record.
- To record incoming calls, the calls will automatically be recorded as they pass through our recording switch.
Your conversation will then be recorded and stored on our secure, password protected system, for you to play back as needed. Our advanced digital processors will record every word on both sides of the conversation.
Our clients use their Call Recorder Cards for both their business and personal needs. These are some of the typical uses of the Call Recorder Card:
- Record employee's calls to review their job performance
- Record details of complicated negotiations
- Maintains recorded records of verbal agreements
- Insurance investigator interviews
- Dictate recordings to be transcribed
- Dictate memos while on the road
- Disclosed monitoring of children's conversations
- Law enforcement investigations
not to mention...
- nailing that deadbeat jerk you used to be married to
- presenting a new cell phone to that special someone
- 'changing' the home phone number
- set up a sting
- or, post a PPN (pointed to [his/her name here] on-line, and wait for the fun to begin.
No need to have bulky recorders, or phone interceptor equipment. Simply follow the user friendly instructions to automatically direct your calls through our state of the art telecommunication switch.
Your important conversations will be stored in a safe digital format that only you can access and/or retrieve with your very own PIN (Personal Identification Number).
Testimonials (!?!?)
I had my housekeeper start making her calls through my Personal Phone Number. Lo and Behold! She spent hours a day on the phone just chatting! No wonder the housework never got done. O.G. - Connecticut
I gave a new cell phone to my teenager and told her that the calls were being recorded. Now I have peace of mind! Y.P. Texas
One interesting FAQ...
Q: Can I change the number that the other person will see on their caller ID when I make an outgoing call from my PPN?
A: Yes, when placing the calls follow the prompts to change the number the other person will see on their caller ID.
Useful service? Yes.
What could possibly go wrong? (snicker)
If you have a phone.
If you have a credit card.
You have a heavy-duty digital wiretap at your fingertips!
Of course, so does everyone else, so watch what you say 007.
...from the service provider's web site - callrecordercard.net...
It is easy to make high quality digital recordings. We will provide you with your own personal phone number in our state of the art, secure telecom switch.
- To record an important conversation, you first dial your personal phone number (PPN), which connects you to the recording equipment and then dial the number you want to record.
- To record incoming calls, the calls will automatically be recorded as they pass through our recording switch.
Your conversation will then be recorded and stored on our secure, password protected system, for you to play back as needed. Our advanced digital processors will record every word on both sides of the conversation.
Our clients use their Call Recorder Cards for both their business and personal needs. These are some of the typical uses of the Call Recorder Card:
- Record employee's calls to review their job performance
- Record details of complicated negotiations
- Maintains recorded records of verbal agreements
- Insurance investigator interviews
- Dictate recordings to be transcribed
- Dictate memos while on the road
- Disclosed monitoring of children's conversations
- Law enforcement investigations
not to mention...
- nailing that deadbeat jerk you used to be married to
- presenting a new cell phone to that special someone
- 'changing' the home phone number
- set up a sting
- or, post a PPN (pointed to [his/her name here] on-line, and wait for the fun to begin.
No need to have bulky recorders, or phone interceptor equipment. Simply follow the user friendly instructions to automatically direct your calls through our state of the art telecommunication switch.
Your important conversations will be stored in a safe digital format that only you can access and/or retrieve with your very own PIN (Personal Identification Number).
Testimonials (!?!?)
I had my housekeeper start making her calls through my Personal Phone Number. Lo and Behold! She spent hours a day on the phone just chatting! No wonder the housework never got done. O.G. - Connecticut
I gave a new cell phone to my teenager and told her that the calls were being recorded. Now I have peace of mind! Y.P. Texas
One interesting FAQ...
Q: Can I change the number that the other person will see on their caller ID when I make an outgoing call from my PPN?
A: Yes, when placing the calls follow the prompts to change the number the other person will see on their caller ID.
Useful service? Yes.
What could possibly go wrong? (snicker)
NFL Spygate History - The Locker Room Spycams
Earlier this season (1999), a Jets defensive player went into a small room at the team's practice facility in Hempstead, N.Y., and was stunned by what he saw. Inside was a bank of video screens, he said, showing various parts of the complex. On one screen, to the player's surprise, was a view of the locker room. ...
''A lot of things around here have knocked me for a loop, but this is one of the biggest,'' said the defensive starter, who asked not to be identified for fear of repercussions. ''My first thought was, 'Has the team been spying on us?' ''
A spokesman for the Jets denied that the team uses video cameras for surveillance purposes...
A number of players, team executives and union officials believe putting hidden cameras in the locker room, the training room or other parts of the workplace is a good idea. Others believe that cameras are a violation of a player's privacy. (more)
Pop Quiz: Who was Bill Belichick working for in 1999?
''A lot of things around here have knocked me for a loop, but this is one of the biggest,'' said the defensive starter, who asked not to be identified for fear of repercussions. ''My first thought was, 'Has the team been spying on us?' ''
A spokesman for the Jets denied that the team uses video cameras for surveillance purposes...
A number of players, team executives and union officials believe putting hidden cameras in the locker room, the training room or other parts of the workplace is a good idea. Others believe that cameras are a violation of a player's privacy. (more)
Pop Quiz: Who was Bill Belichick working for in 1999?
FutureWatch - Pimping your ride with RFID
First Singapore, then Bermuda, then...?
Here what happened in Bermuda...
"The Bermuda Government is issuing vehicle owners with credit card sized stickers containing a RFID chip and it is expected that every vehicle in Bermuda will carry one within a year or two. The scheme is mandatory and a $10,000 penalty applies if owners remove the chips. RFID readers are being placed in telephone poles and buildings throughout Bermuda, which enable authorities to monitor the past and present location of vehicles and record the speed at which they are traveling. The information is being sent to high speed computers that calculate everything you could possibly imagine about a travellers journey, even the route taken." (more)
The handwriting is on your windshield.
Look for government to pimp your ride, next.
Hey, they even call it something benign and acceptable.
...like EZ-Pass, Ipass or UneedaPass.
Here what happened in Bermuda...
"The Bermuda Government is issuing vehicle owners with credit card sized stickers containing a RFID chip and it is expected that every vehicle in Bermuda will carry one within a year or two. The scheme is mandatory and a $10,000 penalty applies if owners remove the chips. RFID readers are being placed in telephone poles and buildings throughout Bermuda, which enable authorities to monitor the past and present location of vehicles and record the speed at which they are traveling. The information is being sent to high speed computers that calculate everything you could possibly imagine about a travellers journey, even the route taken." (more)
The handwriting is on your windshield.
Look for government to pimp your ride, next.
Hey, they even call it something benign and acceptable.
...like EZ-Pass, Ipass or UneedaPass.
Saturday, February 23, 2008
GSM Bug Flood Continues
GSM Eavesdropping Device.
Manufacturer: Lawmate
Model: GE-40
Size: 78(L) x 51(W) x 11(H) mm (approx. 3 x 2 x .5 inches)
- Communicates via GSM cellular
- Remotely controllable
- Can be triggered to call you when it hears sound.
- Scared yet?
- Battery or AC powered.
- External microphone input.
- External alarm input.
(more)
Why do I mention it?
So, you will know what you are up against.
The Penny Dropped. Let the Lawsuits Begin.
A former St. Louis Rams player and three fans sued the New England Patriots over allegations that the Patriots cheated in the 2002 Super Bowl by taping a Rams practice before the game.
Former Rams player Willie Gary and other plaintiffs are seeking millions of dollars of damages in their federal lawsuit, filed in New Orleans. The Patriots beat the Rams, 20-17, on a last-second field goal in the 2002 Super Bowl at the Louisiana Superdome in New Orleans.
Before the game, former Patriots employee Matt Walsh allegedly taped a walkthrough practice by the Rams. Walsh told The Associated Press last week during the Pro Bowl in Hawaii that he couldn't comment on the allegations.
The lawsuit accuses the Patriots of fraud, unfair trade practices and engaging in a "pattern of racketeering."
(more) (Why is Sports Crime Different?) (other lawsuit) (more outrage) (moral)
Former Rams player Willie Gary and other plaintiffs are seeking millions of dollars of damages in their federal lawsuit, filed in New Orleans. The Patriots beat the Rams, 20-17, on a last-second field goal in the 2002 Super Bowl at the Louisiana Superdome in New Orleans.
Before the game, former Patriots employee Matt Walsh allegedly taped a walkthrough practice by the Rams. Walsh told The Associated Press last week during the Pro Bowl in Hawaii that he couldn't comment on the allegations.
The lawsuit accuses the Patriots of fraud, unfair trade practices and engaging in a "pattern of racketeering."
(more) (Why is Sports Crime Different?) (other lawsuit) (more outrage) (moral)
Thursday, February 21, 2008
Smackdown - US 193 - RIP
The U.S. Navy has successfully intercepted a defunct spy satellite using a surface-to-air missile — a first-ever such demonstration by an American warship. Debris from the shattered satellite was expected to burn up during re-entry.
"The mission was a success … the missile … intercepted the decaying satellite," Pentagon spokesman Geoff Morrell said.
The interceptor missile was launched from the Navy cruiser USS Lake Erie off Hawaii at 10:30 p.m. EST. The USS Lake Erie is an Aegis guided-missile cruiser. Two other ships, USS Decatur and USS Russell, were also part of the task force. (more) (audio) (Smackdown animation)
"The mission was a success … the missile … intercepted the decaying satellite," Pentagon spokesman Geoff Morrell said.
The interceptor missile was launched from the Navy cruiser USS Lake Erie off Hawaii at 10:30 p.m. EST. The USS Lake Erie is an Aegis guided-missile cruiser. Two other ships, USS Decatur and USS Russell, were also part of the task force. (more) (audio) (Smackdown animation)
Subscribe to:
Posts (Atom)