Russian security officials say they have arrested and charged two brothers with links to British interests.
Ilya Zaslavsky is a manager at the TNK-BP oil joint venture, his brother Alexander head of the British Council's Moscow Alumni club. The two, who have joint US and Russian citizenship, were gathering classified data for foreign firms, the FSB said.The Moscow offices of the British oil giant were raided by the authorities on Wednesday.
Russia's security agency, the FSB, has confirmed that the raids were related to the Zaslavsky case.
"During the raid, material proof confirming the industrial espionage was found and confiscated," it said in a statement.
This included business cards of foreign military agencies and the CIA, it said. (more)
Ilya had the other "CIA" Card
Thursday, March 20, 2008
Where do Spy Shops shop?
Bulk buy scary eavesdropping, wiretapping and recording gadgets - fast, easy and cheap! Where? Global Sources, of course.
Labels:
eavesdropping,
GSM,
product,
spycam,
wireless,
wiretapping
Wednesday, March 19, 2008
How To Make Your Phone Untappable
In 1991, Philip Zimmermann developed a humble-sounding electronic encryption technology known as Pretty Good Privacy. In fact, it was very good--so good that not even the federal government has been able to crack it, a fact that has made Zimmermann a folk hero to privacy advocates and a headache to law enforcement.
Now Zimmermann, the CEO of PGP Corp., has found himself back in the fiery debate between federal investigators and those who oppose their snooping--this time thanks to ZRTP, a technology for encrypting Internet telephone calls. ZRTP throws a wrench in the Bush administration's controversial warrant-free wiretapping program and its proposed legal immunity for the telecommunications companies. So far, not even teams of supercomputers and cyberspies at the National Security Agency have cracked ZRTP. That means anyone who uses Zimmermann's Zfone software, a ZRTP-enabled voice over Internet Protocol (VoIP) program available for free on his Web site, can skirt the feds' wiretapping altogether.
Forbes.com spoke with Zimmermann about how his small company has been able to produce an encryption product that not even the U.S. government can break, what ZRTP means for national security, and why cutting off the government's access to our phones is necessary to keep out the truly malicious spies. (more)
Free advice.
Free software.
An end to wiretapping woes.
Come on. What more do you want from me?
The least you could do is send me some M&M's. :)
~Kevin
Now Zimmermann, the CEO of PGP Corp., has found himself back in the fiery debate between federal investigators and those who oppose their snooping--this time thanks to ZRTP, a technology for encrypting Internet telephone calls. ZRTP throws a wrench in the Bush administration's controversial warrant-free wiretapping program and its proposed legal immunity for the telecommunications companies. So far, not even teams of supercomputers and cyberspies at the National Security Agency have cracked ZRTP. That means anyone who uses Zimmermann's Zfone software, a ZRTP-enabled voice over Internet Protocol (VoIP) program available for free on his Web site, can skirt the feds' wiretapping altogether.
Forbes.com spoke with Zimmermann about how his small company has been able to produce an encryption product that not even the U.S. government can break, what ZRTP means for national security, and why cutting off the government's access to our phones is necessary to keep out the truly malicious spies. (more)
Free advice.
Free software.
An end to wiretapping woes.
Come on. What more do you want from me?
The least you could do is send me some M&M's. :)
~Kevin
Labels:
advice,
encryption,
FutureWatch,
NSA,
product,
software,
VoIP,
wiretapping
Tuesday, March 18, 2008
"I said I was a Caloyer, not a Lawyer!"
Portugal - Madeleine McCann suspect Robert Murat has discovered tracking devices fitted to his cars.
British expat Murat, 33, found the GPS bug when he was fixing a fault on his VW Transporter. He checked girlfriend Michaela Walczuch's motor and found - another stuck to that.
Furious Murat believes Portuguese police bugged his cars in a desperate bid to nail him for the abduction of Madeleine, four, from Praia da Luz in May.
He is also probing whether Kate and Gerry McCann's private detective agency Metodo 3 could have done it on its own initiative.
His lawyer Francisco Pagarete said last night: "I'm not yet sure what kind of crime we're dealing with here." (more)
British expat Murat, 33, found the GPS bug when he was fixing a fault on his VW Transporter. He checked girlfriend Michaela Walczuch's motor and found - another stuck to that.
Furious Murat believes Portuguese police bugged his cars in a desperate bid to nail him for the abduction of Madeleine, four, from Praia da Luz in May.
He is also probing whether Kate and Gerry McCann's private detective agency Metodo 3 could have done it on its own initiative.
His lawyer Francisco Pagarete said last night: "I'm not yet sure what kind of crime we're dealing with here." (more)
Monday, March 17, 2008
World Observation Machine did not a good acronym make
from newlaunches.com...
The US Army has awarded the [University of] Michigan (UM) $10m to carry out research leading to a "six-inch robotic spy plane modeled after a bat", which would "gather data from sights, sounds and smells". The university has used the Army cash to found a Centre for Objective Microelectronics and Biomimetic Advanced Technology, or COM-BAT...
The unit will have the ability to tiny cameras for stereo vision, an array of mini microphones that could home in on sounds from different directions, and small detectors for nuclear radiation and poisonous gases. Low-power miniaturized radar and a very sensitive navigation system would help the bat find its way at night. Energy scavenging from solar, wind, vibration and other sources like hanging upside down from power cables would recharge the bat's lithium battery. The aircraft would use radio to send signals back to troops.
And that's not all. It seems "the bat" might "perch at a street corner or building for longer assignments and send back reports of activity" - a capability which might be referred to, we suggest, as "gargoyle mode". (more)
The US Army has awarded the [University of] Michigan (UM) $10m to carry out research leading to a "six-inch robotic spy plane modeled after a bat", which would "gather data from sights, sounds and smells". The university has used the Army cash to found a Centre for Objective Microelectronics and Biomimetic Advanced Technology, or COM-BAT...
The unit will have the ability to tiny cameras for stereo vision, an array of mini microphones that could home in on sounds from different directions, and small detectors for nuclear radiation and poisonous gases. Low-power miniaturized radar and a very sensitive navigation system would help the bat find its way at night. Energy scavenging from solar, wind, vibration and other sources like hanging upside down from power cables would recharge the bat's lithium battery. The aircraft would use radio to send signals back to troops.
And that's not all. It seems "the bat" might "perch at a street corner or building for longer assignments and send back reports of activity" - a capability which might be referred to, we suggest, as "gargoyle mode". (more)
Sunday, March 16, 2008
13 Fired For Spying
At least 13 hospital employees are being fired, and 6 suspended, after an investigator concluded that they broke the rules by accessing (Britney) Spears' medical records without any particular reason (except their own curiosity).
Not only would Britney's medical files give them the answers to some closely guarded secrets, but a photocopied page could sell to the tabloids for thousands. (more) Hip, HIPPA, Hooray
Not only would Britney's medical files give them the answers to some closely guarded secrets, but a photocopied page could sell to the tabloids for thousands. (more) Hip, HIPPA, Hooray
Are Your Floor Plans Serialized and Accounted For?
UK - Detailed top-secret plans of MI5's fortress HQ have been sensationally handed to News of the World.
The lost 66-page dossier of floor layouts—once used by trusted contractors at the high-security Central London base—would be gold dust to terrorists.
The plans were given to us by a worried member of the public, who got them from a friend who worked at the building and never handed them back.
Our source said: "It's shocking that such high-level paperwork is out of MI5's control. These are many possibilities once a terrorist has detailed information like this."
The drawings, which we have blurred to protect national security [and are no longer shown], detail 11 of the 13 floors at Thames House—the real-life HQ well-known on the outside to viewers of TV's Spooks.
They reveal lift shafts, ventilation pipes and other places perfect for hiding BOMBS and spy TRANSMITTERS. They also show where the fibre optic cables are that transfer electronic data— a godsend for COMPUTER HACKERS. (more)
Wiretapping's true danger (LA Times - Political Opinion)
History says we should worry less about privacy and more about political spying.
By Julian Sanchez
As the battle over reforms to the Foreign Intelligence Surveillance Act rages in Congress, civil libertarians warn that legislation sought by the White House could enable spying on "ordinary Americans." Others, like Sen. Orrin Hatch (R-Utah), counter that only those with an "irrational fear of government" believe that "our country's intelligence analysts are more concerned with random innocent Americans than foreign terrorists overseas."
But focusing on the privacy of the average Joe in this way obscures the deeper threat that warrantless wiretaps poses to a democratic society. Without meaningful oversight, presidents and intelligence agencies can -- and repeatedly have -- abused their surveillance authority to spy on political enemies and dissenters.
...for decades, intelligence analysts -- and the presidents they served -- had spied on the letters and phone conversations of union chiefs, civil rights leaders, journalists, antiwar activists, lobbyists, members of Congress, Supreme Court justices -- even Eleanor Roosevelt...
...Political abuse of electronic surveillance goes back at least as far as the Teapot Dome scandal that roiled the Warren G. Harding administration in the early 1920s. ...
In 1945, Harry Truman had the FBI wiretap Thomas Corcoran...
...John F. Kennedy's attorney general, brother Bobby, authorized wiretaps on lobbyists, Agriculture Department officials and even a congressman's secretary...
...Lyndon Johnson found the tactic useful when he wanted to know what promises then-candidate Richard Nixon might be making to our allies in South Vietnam...
...Johnson famously heard recordings of King's conversations and personal liaisons with various women. Less well known is that he received wiretap reports on King's strategy conferences with other civil rights leaders...
...Few presidents were quite as brazen as Nixon, whom the Church Committee found had "authorized a program of wiretaps which produced for the White House purely political or personal information unrelated to national security."...
...It's probably true that ordinary citizens uninvolved in political activism have little reason to fear being spied on, just as most Americans seldom need to invoke their 1st Amendment right to freedom of speech. But...
...if you think an executive branch unchecked by courts won't turn its "national security" surveillance powers to political ends -- well, it would be a first.
Julian Sanchez is a Washington writer who studies privacy and surveillance. (more)
By Julian Sanchez
As the battle over reforms to the Foreign Intelligence Surveillance Act rages in Congress, civil libertarians warn that legislation sought by the White House could enable spying on "ordinary Americans." Others, like Sen. Orrin Hatch (R-Utah), counter that only those with an "irrational fear of government" believe that "our country's intelligence analysts are more concerned with random innocent Americans than foreign terrorists overseas."
But focusing on the privacy of the average Joe in this way obscures the deeper threat that warrantless wiretaps poses to a democratic society. Without meaningful oversight, presidents and intelligence agencies can -- and repeatedly have -- abused their surveillance authority to spy on political enemies and dissenters.
...for decades, intelligence analysts -- and the presidents they served -- had spied on the letters and phone conversations of union chiefs, civil rights leaders, journalists, antiwar activists, lobbyists, members of Congress, Supreme Court justices -- even Eleanor Roosevelt...
...Political abuse of electronic surveillance goes back at least as far as the Teapot Dome scandal that roiled the Warren G. Harding administration in the early 1920s. ...
In 1945, Harry Truman had the FBI wiretap Thomas Corcoran...
...John F. Kennedy's attorney general, brother Bobby, authorized wiretaps on lobbyists, Agriculture Department officials and even a congressman's secretary...
...Lyndon Johnson found the tactic useful when he wanted to know what promises then-candidate Richard Nixon might be making to our allies in South Vietnam...
...Johnson famously heard recordings of King's conversations and personal liaisons with various women. Less well known is that he received wiretap reports on King's strategy conferences with other civil rights leaders...
...Few presidents were quite as brazen as Nixon, whom the Church Committee found had "authorized a program of wiretaps which produced for the White House purely political or personal information unrelated to national security."...
...It's probably true that ordinary citizens uninvolved in political activism have little reason to fear being spied on, just as most Americans seldom need to invoke their 1st Amendment right to freedom of speech. But...
...if you think an executive branch unchecked by courts won't turn its "national security" surveillance powers to political ends -- well, it would be a first.
Julian Sanchez is a Washington writer who studies privacy and surveillance. (more)
Saturday, March 15, 2008
Cell Phone Spying Victim? Tell Your Story.
Have you ever been a victim of cell phone spying?
If your significant other or family member has ever plotted to listen in on your calls, even check your records or download spying software on your phone, we want to hear from you.
GMA is looking for guests who can talk about their experience with cell phone spying. Fill out the info below and you might just end up on GMA. (more)
If your significant other or family member has ever plotted to listen in on your calls, even check your records or download spying software on your phone, we want to hear from you.
GMA is looking for guests who can talk about their experience with cell phone spying. Fill out the info below and you might just end up on GMA. (more)
FOP Bug By Cop?
TN - A former Nashville police officer/union organizer has been indicted on federal charges in connection with the break-in and illegal surveillance of a Fraternal Order of Police youth camp.
Calvin Edward Hullett was indicted on bribery, misappropriation of union funds and other charges.
Investigators have alleged the hidden cameras were placed at the Wilson County camp in an effort to discredit the FOP by catching officers engaged in some type of misconduct.
Hullett, a national organizer for the Teamsters, is accused of using union funds to purchase the surveillance and recording equipment. (more with video)
Calvin Edward Hullett was indicted on bribery, misappropriation of union funds and other charges.
Investigators have alleged the hidden cameras were placed at the Wilson County camp in an effort to discredit the FOP by catching officers engaged in some type of misconduct.
Hullett, a national organizer for the Teamsters, is accused of using union funds to purchase the surveillance and recording equipment. (more with video)
Industrial Espionage in South Korea
Prosecutors were investigating a former LG Electronics technician Thursday for allegedly spying and providing a Chinese firm with South Korea's leading plasma display technology. (more)
7 Security Rules Employees Love to Break
Research from the Ponemon Institute finds that either companies are not setting, or employees are not following, data security procedures in several high-risk areas.
“Data Security Policies Are Not Enforced,” a survey of 893 corporate IT workers, examined the risks associated with storing and transporting sensitive information and looked at how well companies are implementing and enforcing policies to protect against this risk.
1. Copying confidential information onto a USB memory stick.
2. Accessing web-based e-mail accounts from a workplace computer.
3. Losing a portable data-bearing device.
4. Downloading personal software onto a company computer.
5. Sending workplace documents as an attachment in e-mail.
6. Disabling security and firewall settings.
7. Sharing passwords with co-workers.
(more)
“Data Security Policies Are Not Enforced,” a survey of 893 corporate IT workers, examined the risks associated with storing and transporting sensitive information and looked at how well companies are implementing and enforcing policies to protect against this risk.
1. Copying confidential information onto a USB memory stick.
2. Accessing web-based e-mail accounts from a workplace computer.
3. Losing a portable data-bearing device.
4. Downloading personal software onto a company computer.
5. Sending workplace documents as an attachment in e-mail.
6. Disabling security and firewall settings.
7. Sharing passwords with co-workers.
(more)
122 Federal Aviation Administration safety inspector badges have been stolen or lost in the past five years. The credentials are one of the few forms of identification that give complete and unfettered access to airport facilities, including the cockpits of planes in flight.
"The FAA badge is probably of all the badges just as dangerous if not more so than any other," aviation expert Denny Kelly said.
Kelly, a former commercial pilot and a private investigator, said the badge can give a person free access to nearly every secure area of an airport.
"The FAA badge allows you not only on one airline, plus getting through security, it allows you to get on any airline, any airplane, anyplace," he said. (more) Photo is not representative of stolen ID.
Juju Security... What "badge" can give someone unfettered access to your business - to plant bugs and steal proprietary information, for example? Can you account for all of yours? Is a security amulet really the best solution? Other solutions... 1 2 3
Update: Possible motive for badge theft uncovered!
Special Offer for FAA Employees only...
Located in the Holiday Inn Airport, 2101 S. Meridian is offering FAA employees a 15% discount on their ALL-YOU CAN EAT Lunch Buffet. Just show your ID badge for discount.
Regular price is $9.95 + tax and includes: 21 item salad bar, soup, 2-3 hot entrees, veggies, rolls, dessert bar and drink. Menu selection varies from Bar-B-Q to Italian to Hors Devours.
Lunch hours are 11 a.m. to 2 p.m. on the dates indicated on the calendar.
Call the Holiday Inn at 685-4000 for more information. (more)
"The FAA badge is probably of all the badges just as dangerous if not more so than any other," aviation expert Denny Kelly said.
Kelly, a former commercial pilot and a private investigator, said the badge can give a person free access to nearly every secure area of an airport.
"The FAA badge allows you not only on one airline, plus getting through security, it allows you to get on any airline, any airplane, anyplace," he said. (more) Photo is not representative of stolen ID.
Juju Security... What "badge" can give someone unfettered access to your business - to plant bugs and steal proprietary information, for example? Can you account for all of yours? Is a security amulet really the best solution? Other solutions... 1 2 3
Update: Possible motive for badge theft uncovered!
Special Offer for FAA Employees only...
Located in the Holiday Inn Airport, 2101 S. Meridian is offering FAA employees a 15% discount on their ALL-YOU CAN EAT Lunch Buffet. Just show your ID badge for discount.
Regular price is $9.95 + tax and includes: 21 item salad bar, soup, 2-3 hot entrees, veggies, rolls, dessert bar and drink. Menu selection varies from Bar-B-Q to Italian to Hors Devours.
Lunch hours are 11 a.m. to 2 p.m. on the dates indicated on the calendar.
Call the Holiday Inn at 685-4000 for more information. (more)
Romper Room Magic Mirror 2008
Tune into live surveillance cameras from around the world. Free computer screen saver turns you into Mr./Ms. Panopticon. (more)
Subscribe to:
Posts (Atom)