German police have launched a probe after an attempt was made to eavesdrop on Porsche boss Wendelin Wiedeking while he was staying in a luxury hotel.
Security staff from the the Ritz-Carlton hotel in Wolfsburg found a "babyphone" concealed under a sofa in his room, the media reports said, which had been turned on and was transmitting.
Porsche has filed a complaint with the prosecutors' office in Braunschweig, a company spokesperson told the AP news agency on Saturday, April 26.
The news magazines Der Spiegel and Focus said an investigation (a different investigation) is underway after a monitoring device was found in Wiedeking's room at the Ritz-Carlton in Wolfsburg in November. The reports said there was suspicion that the spying attempt took place one day before a meeting on Nov. 16.
Left behind?
The online news site Spiegel Online has reported that hotel security ruled out that a family with a child could have stayed in the suite previously and simply forgotten the device. For several weeks, there was no record of a family having spent an evening in the room.
Porsche told AP that other company officials had also been spied upon, including works council head Uwe Hueck, but did not supply any details. Focus has reported that his telephone conversations at Porsche headquarters in Stuttgart were allegedly wiretapped. It is not known who was behind the action but the company has reportedly notified prosecutors.
Porsche owns 31 percent of shares in Volkswagen, the biggest European automobile manufacturer, and wants to take full control of the firm. Volkswagen has denied any role in espionage, Focus reported. (more)
Update...
Focus reports that the offices of Porsche workers’ organization head Uwe Hück are to be made bug proof after it was discovered that his phone was being tapped. And Der Spiegel says that a bug was found planted in the private flat of former VW chief Wolfgang Bernhard. (more)
Saturday, April 26, 2008
16 Extra Eyes in the Florida Eye Institute
SpyCam Story #441
The mysterious tale of 16 SpyCams, 16 Microphones, and a recorder!
FL - A 45-year-old Vero Beach woman has been arrested on eight felony charges that allege illegal electronic eavesdropping on doctors, copying hard drives from their computers and the theft of a laptop.
But the seven-page complaint filed by the State Attorney's Office against Brenda Doan-Johnson, of the 3400 block of Atlantic Boulevard, does not explain why she supposedly paid a Melbourne man to place cameras and microphones in the private offices of three doctors at the Florida Eye Institute in Vero Beach.
Both a Jan. 24 Vero Beach Police report and a Jan. 28 civil lawsuit filed by three of Dr. Paul V. Minotty's business partners, say Minotty, founder of the institute, had hired a private investigator and the police report identified her as Doan-Johnson.
According to the state attorney's complaint affidavit, Doan-Johnson paid Mark Lynch, of Spy Source Warehouse in Melbourne, with a $6,000 personal check as deposit on $13,000 to install 16 video cameras, 16 microphones and a digital recorder at various places in the Florida Eye Institute — including the offices of doctors Karen Todd, Mark Gambee and Val Zudan.
Lynch worked after business hours for six days, starting Jan. 11, to install the equipment, the affidavit states, noting that audio recording apparently did not function.
Investigators reported that Doan-Johnson introduced Lynch to two other people who also were working in the building, identifying them as computer forensic specialists who were copying the hard drives from the desk computers of doctors Gambee, Todd, Zudan and Thomas Baudo.
According to investigators, Lynch phoned Gambee (!?!?!) Jan. 24 and told him about installing the electronics in Florida Eye Institute offices — including Gambee's office. The Vero Beach police were called to Florida Eye Institute the same day.
Gambee told Vero Beach officers his computer was missing. Doan-Johnson returned it, saying it was thought to be company property... (more) ...and, more to come as this case unfolds.
The mysterious tale of 16 SpyCams, 16 Microphones, and a recorder!
FL - A 45-year-old Vero Beach woman has been arrested on eight felony charges that allege illegal electronic eavesdropping on doctors, copying hard drives from their computers and the theft of a laptop.
But the seven-page complaint filed by the State Attorney's Office against Brenda Doan-Johnson, of the 3400 block of Atlantic Boulevard, does not explain why she supposedly paid a Melbourne man to place cameras and microphones in the private offices of three doctors at the Florida Eye Institute in Vero Beach.
Both a Jan. 24 Vero Beach Police report and a Jan. 28 civil lawsuit filed by three of Dr. Paul V. Minotty's business partners, say Minotty, founder of the institute, had hired a private investigator and the police report identified her as Doan-Johnson.
According to the state attorney's complaint affidavit, Doan-Johnson paid Mark Lynch, of Spy Source Warehouse in Melbourne, with a $6,000 personal check as deposit on $13,000 to install 16 video cameras, 16 microphones and a digital recorder at various places in the Florida Eye Institute — including the offices of doctors Karen Todd, Mark Gambee and Val Zudan.
Lynch worked after business hours for six days, starting Jan. 11, to install the equipment, the affidavit states, noting that audio recording apparently did not function.
Investigators reported that Doan-Johnson introduced Lynch to two other people who also were working in the building, identifying them as computer forensic specialists who were copying the hard drives from the desk computers of doctors Gambee, Todd, Zudan and Thomas Baudo.
According to investigators, Lynch phoned Gambee (!?!?!) Jan. 24 and told him about installing the electronics in Florida Eye Institute offices — including Gambee's office. The Vero Beach police were called to Florida Eye Institute the same day.
Gambee told Vero Beach officers his computer was missing. Doan-Johnson returned it, saying it was thought to be company property... (more) ...and, more to come as this case unfolds.
Wednesday, April 23, 2008
Cautionary Tale: Prevention = Cost-Effective
Hannaford spending millions to upgrade after security breach.
Background...
Yet Another Corporate Info-Loss Confession
"But, IT said our data was secure."
Hannaford Bros. Co. said it is spending millions of dollars to enhance the security of its data network following a massive security breach that exposed up to 4.2 million credit and debit card numbers to fraud...
Hannaford President and CEO Ron Hodge apologized again Tuesday to customers for concerns and inconvenience they experienced because of the breach...
In a conference call with reporters, Hodge and Bill Homa, senior vice president and chief information officer, declined to address the cause, scope and nature of the breach, citing the ongoing criminal investigation and pending litigation.
The Hannaford case is among the largest security breaches on record but is much smaller than the tens of millions of credit cards that were exposed at TJX Cos. of Framingham, Mass., which has 2,500 stores and includes the T.J. Maxx and Marshalls chains. (more)
The "millions" figure is likely just a system fix number. The final cost, which will include: public embarrassment, loss of customer good-will and customer ill-will lawsuit losses, can not be tallied just yet.
Recommendation:
Be smart.
Be frugal.
Be a corporate hero.
Spend the bucks to protect your company's communications privacy (voice and data). There is a good chance you will save money in the long run... a lot of money! ~Kevin
Background...
Yet Another Corporate Info-Loss Confession
"But, IT said our data was secure."
Hannaford Bros. Co. said it is spending millions of dollars to enhance the security of its data network following a massive security breach that exposed up to 4.2 million credit and debit card numbers to fraud...
Hannaford President and CEO Ron Hodge apologized again Tuesday to customers for concerns and inconvenience they experienced because of the breach...
In a conference call with reporters, Hodge and Bill Homa, senior vice president and chief information officer, declined to address the cause, scope and nature of the breach, citing the ongoing criminal investigation and pending litigation.
The Hannaford case is among the largest security breaches on record but is much smaller than the tens of millions of credit cards that were exposed at TJX Cos. of Framingham, Mass., which has 2,500 stores and includes the T.J. Maxx and Marshalls chains. (more)
The "millions" figure is likely just a system fix number. The final cost, which will include: public embarrassment, loss of customer good-will and customer ill-will lawsuit losses, can not be tallied just yet.
Recommendation:
Be smart.
Be frugal.
Be a corporate hero.
Spend the bucks to protect your company's communications privacy (voice and data). There is a good chance you will save money in the long run... a lot of money! ~Kevin
Labels:
advice,
business,
cautionary tale,
computer,
data,
Hack,
lawsuit,
wiretapping
Tuesday, April 22, 2008
Anticipated Mission Creep Arrives
UK - Anti-terrorism surveillance is being used to spy on kids
Councils are using anti-terrorism surveillance laws to spy on children trying to buy alcohol, it has emerged. One authority alone has run 70 snooping operations, including tracking youngsters and covertly filming people selling counterfeit DVDs. It also admitted using the laws to obtain phone records and e-mails of those suspected of what it described as 'petty' offences. (more)
Councils are using anti-terrorism surveillance laws to spy on children trying to buy alcohol, it has emerged. One authority alone has run 70 snooping operations, including tracking youngsters and covertly filming people selling counterfeit DVDs. It also admitted using the laws to obtain phone records and e-mails of those suspected of what it described as 'petty' offences. (more)
Putting the squeeze on Blackberry to get the juice
Talks between Indian officials and Canada's Research In Motion (RIM, the BlackBerry Bunch) would seem not to have gone very smoothly...
The backstory here is that the top brass at India's burgeoning and powerful state security services are concerned that Blackberry's advanced communications technology cannot be breached by their operatives and thus the "authorities" are currently unable to eavesdrop Blackberry users.
They have asked RIM to provide them with the capability to conduct covert surveillance on Blackberry users by requiring the company to install local servers and provide secret back door access to services, but the Canadian vendor has so far refused to comply. (more)
The backstory here is that the top brass at India's burgeoning and powerful state security services are concerned that Blackberry's advanced communications technology cannot be breached by their operatives and thus the "authorities" are currently unable to eavesdrop Blackberry users.
They have asked RIM to provide them with the capability to conduct covert surveillance on Blackberry users by requiring the company to install local servers and provide secret back door access to services, but the Canadian vendor has so far refused to comply. (more)
Get the PR team some O2, stat!
UK - O2’s PR team mistakenly connected a journalist of tech website The Register to a call earlier this month, allowing him to eavesdrop on their conversation about his news enquiry.
Turns out, O2 (a UK cellular service provider) reckons The Register’s readers are “techie nerds” and “Muppets” for wanting to move to 3. O2 duly apologised on the website, and said to Mobile News: “Hey, we’re techie nerds ourselves.” (more)
Turns out, O2 (a UK cellular service provider) reckons The Register’s readers are “techie nerds” and “Muppets” for wanting to move to 3. O2 duly apologised on the website, and said to Mobile News: “Hey, we’re techie nerds ourselves.” (more)
Friday, April 18, 2008
"...This DVD will self-destruct in..."
Germany - The branded 'Einmal' (Deutsch for 'once') discs employ a chemical coating that starts breaking the disc down once the vacuum seal is breached. On average, users get 48 hours of use from a €3.99 ($6.44) disc. Once the disc has run its course, it'll show up as non-readable when popped into a player (no explosion). (more)
Proposition Impossible, unless a good security application comes along.
Proposition Impossible, unless a good security application comes along.
FutureWatch - Cell Phone Crackdowns
Austria - Taking a cue from France's national railway, which offers phone-free «zen zones» on high-speed trains, Austria's second-largest city this week began ordering public transit commuters to keep their phones on silent mode.
The crackdown in the southern city of Graz has triggered a loud debate between advocates of free speech and people who say they're simply fed up with having to listen to annoying ring tones and intrusive cell phone chatter while riding a public bus or tram. (more) (etiquette) (how other are dispensing justice) (Divine justice)
Extra Credit...
''No matter the excitement in the industry he had created, Bell forever refused to have a telephone in his study. He resented its persistent jangle.'' - from ''Once Upon a Telephone: An Illustrated Social History'' (Harcourt Brace & Company, 1994) by Ellen Stern and Emily Gwathmey
The crackdown in the southern city of Graz has triggered a loud debate between advocates of free speech and people who say they're simply fed up with having to listen to annoying ring tones and intrusive cell phone chatter while riding a public bus or tram. (more) (etiquette) (how other are dispensing justice) (Divine justice)
Extra Credit...
''No matter the excitement in the industry he had created, Bell forever refused to have a telephone in his study. He resented its persistent jangle.'' - from ''Once Upon a Telephone: An Illustrated Social History'' (Harcourt Brace & Company, 1994) by Ellen Stern and Emily Gwathmey
Labels:
book,
cell phone,
FutureWatch,
law,
miscellaneous,
mores,
wireless
FutureWatch - Eavesdropping on GSM Cell Phones
A web service that will make it easy and inexpensive to crack the GSM A5/1 encryption protocol, quickly enough for a call that is still in progress, is slated to launch at the end of April. Living right at the intersection of open hardware, open source software, software as a service, and cryptography, the service will reduce the cost and effort of cracking GSM call encryption by at least an order of magnitude.
The service is being developed by members of the GSM Software Project and demonstrates just how much things have changed in the world since the GSM system was designed. Various approaches to cracking both A5/1 (the European standard) and A5/2 (the weaker US standard) have been available for some time but this one is unique in that it should be available to researchers and hackers at the end of April in hosted api form instead of pdf.
Back in 1997, this overview of the GSM system declared that "Enciphering is an option for the fairly paranoid, since the signal is already coded, interleaved, and transmitted in a TDMA manner, thus providing protection from all but the most persistent and dedicated eavesdroppers." After all, such a radio encoding scheme made the signals invisible to typical radio band scanners.
Today, however, the availability of the Universal Software Radio Peripheral (USRP), an open hardware software defined radio that sells for about $700, combined with work being done at GNU Radio project to codify the GSM waveform (also targeted for the end of this month), makes this once reasonable point of view seem quaint. Good encryption is now a must and it appears that A5 no longer qualifies. (more)
The service is being developed by members of the GSM Software Project and demonstrates just how much things have changed in the world since the GSM system was designed. Various approaches to cracking both A5/1 (the European standard) and A5/2 (the weaker US standard) have been available for some time but this one is unique in that it should be available to researchers and hackers at the end of April in hosted api form instead of pdf.
Back in 1997, this overview of the GSM system declared that "Enciphering is an option for the fairly paranoid, since the signal is already coded, interleaved, and transmitted in a TDMA manner, thus providing protection from all but the most persistent and dedicated eavesdroppers." After all, such a radio encoding scheme made the signals invisible to typical radio band scanners.
Today, however, the availability of the Universal Software Radio Peripheral (USRP), an open hardware software defined radio that sells for about $700, combined with work being done at GNU Radio project to codify the GSM waveform (also targeted for the end of this month), makes this once reasonable point of view seem quaint. Good encryption is now a must and it appears that A5 no longer qualifies. (more)
Wannabea Spy?
The Shin Bet website now features recruitment blogs by four high-tech spies.
Israel’s domestic intelligence agency shed some of its shadowy mystique three years ago when it went online to draw new applicants. Recently, the site launched a new page, on which four Shin Bet computing experts discuss what they like about their jobs.
The Hebrew-language texts are sparing on details, with only silhouette portraits of the authors, whose names are withheld. Security sources said the Shin Bet hopes the blogs will help win over recruits from the private high-tech industry. (more) (What does a Spy look like?)
Israel’s domestic intelligence agency shed some of its shadowy mystique three years ago when it went online to draw new applicants. Recently, the site launched a new page, on which four Shin Bet computing experts discuss what they like about their jobs.
The Hebrew-language texts are sparing on details, with only silhouette portraits of the authors, whose names are withheld. Security sources said the Shin Bet hopes the blogs will help win over recruits from the private high-tech industry. (more) (What does a Spy look like?)
Thursday, April 17, 2008
Night Flight
Two men attempting to board a plane to China with nearly a dozen sensitive infrared cameras in their luggage were arrested... Yong Guo Zhi, a Chinese national, and Tah Wei Chao, a naturalized U.S. citizen, were arrested for investigation of trying to take thermal imaging cameras with potential military use to China without the proper export licenses... Ten of the cameras, which measure about 2 inches square and cost about $5,000 each, were found in the men's checked luggage... (more) (related video) (the other Night Flight)
Corporate Espionage - Contractor Pleads Guilty
A U.S. Department of Defense (DOD) contractor from Baltimore pleaded guilty today to conspiring to steal competitive information concerning contracts to supply fuel to DOD aircraft at locations worldwide, the Department of Justice announced.
Matthew W. Bittenbender has entered into a plea agreement, filed in U.S. District Court in Baltimore, where he was originally charged on January 7, 2008. According to the terms of the plea agreement, which is subject to court approval, Bittenbender has agreed to cooperate in the government's investigation...
...Bittenbender conspired to steal trade secrets from his employer Avcard, a division of Kropp Holdings LLC, and sell that information to his competitors, FERAS, and Aerocontrol. In return, Bittenbender received cash and a percentage of the profit earned on the resulting fuel supply contracts. According to the plea agreement, Cartwright, Wilkinson, FERAS and Aerocontrol, in turn, used that information to underbid Avcard at every location where the companies were bidding against each other. Avcard ultimately lost each of the contested bids. (more)
Matthew W. Bittenbender has entered into a plea agreement, filed in U.S. District Court in Baltimore, where he was originally charged on January 7, 2008. According to the terms of the plea agreement, which is subject to court approval, Bittenbender has agreed to cooperate in the government's investigation...
...Bittenbender conspired to steal trade secrets from his employer Avcard, a division of Kropp Holdings LLC, and sell that information to his competitors, FERAS, and Aerocontrol. In return, Bittenbender received cash and a percentage of the profit earned on the resulting fuel supply contracts. According to the plea agreement, Cartwright, Wilkinson, FERAS and Aerocontrol, in turn, used that information to underbid Avcard at every location where the companies were bidding against each other. Avcard ultimately lost each of the contested bids. (more)
Wednesday, April 16, 2008
"...and she went to the hospital to have it removed! Blahaaaaaa..."
Australia - Attorney-General Robert McClelland says the proposal to let some employers access workers' emails without consent is only being considered as a way to stop cyber terrorist attacks.
He says it would not be targeted at personal communications.
"What you would be looking and permitting access to is information that would reveal an attempted infiltration," he said.
But deputy Opposition leader Julie Bishop says...
"Employers should not be burdened with the responsibility of intercepting emails involving staff suspected of behaviour that threatens Australia's national security."
"This places an unfair surveillance responsibility upon employers and effectively requires them to undertake what is a potential criminal investigation." (more)
Seriously bad idea...
- Pay IT guy to do a government intelligence agents' work?
- Pay twice!?!? Salary for IT guy and (via taxes) government intelligence agents'.
- Conflict of interest? Employees spying on friends and colleagues?
- Entrust national security to an army of untrained private employees...
- ...whose work product might equal less than educated guesswork?
- ...who may be tempted to use the snoop power for personal gain?
- Not to mention: loss of regular business productivity, opening new avenues of corporate espionage, data vulnerabilities, etc.
Outsourcing your job responsibilities should not be an option; especially when you have been entrusted with national security.
He says it would not be targeted at personal communications.
"What you would be looking and permitting access to is information that would reveal an attempted infiltration," he said.
But deputy Opposition leader Julie Bishop says...
"Employers should not be burdened with the responsibility of intercepting emails involving staff suspected of behaviour that threatens Australia's national security."
"This places an unfair surveillance responsibility upon employers and effectively requires them to undertake what is a potential criminal investigation." (more)
Seriously bad idea...
- Pay IT guy to do a government intelligence agents' work?
- Pay twice!?!? Salary for IT guy and (via taxes) government intelligence agents'.
- Conflict of interest? Employees spying on friends and colleagues?
- Entrust national security to an army of untrained private employees...
- ...whose work product might equal less than educated guesswork?
- ...who may be tempted to use the snoop power for personal gain?
- Not to mention: loss of regular business productivity, opening new avenues of corporate espionage, data vulnerabilities, etc.
Outsourcing your job responsibilities should not be an option; especially when you have been entrusted with national security.
Labels:
advice,
business,
email,
employee,
espionage,
FutureWatch,
government,
law
Subscribe to:
Posts (Atom)