Friday, May 9, 2008

"World's smallest" GSM bug

from the seller's web site...
The PLM-JNGSMTX08 Micro GSM Listening Device is the pinnacle of GSM listening technology packed into an incredibly small package just 43 x 34 x 17mm. Just insert any SIM card, call the number and you will hear exactly what is going on in your absence.


UK customers can track its location at any time via the internet making it a compact dual purpose surveillance device. Supplied with mains charger and protective carry case. This is the ultimate micro miniature listening device! (more)
Why do I mention it?
So you know what you are up against.

Corporate Spies Killing The CIA

The CIA is having a growing problem with their analysts and spies being recruited away by corporations. One unpleasant, for government intelligence agencies, development of the last few decades has been the growing popularity of "competitive intelligence" (corporate espionage.) It's a really big business, with most large (over a billion dollars of annual sales) corporations having separate intelligence operations. Spending on corporate intel work is over $5 billion a year, and is expected to more than double in the next four years.

The corporate recruiters have a pretty easy time of it, as they can offer higher pay, better working conditions and bonuses. (more)

Wednesday, May 7, 2008

Spy Hard II

Former Peruvian President Alberto Fujimori on Monday had a minute-long laughing fit during his trial when he heard that his former military aides used to spy on him through the keyhole. (more)

JK Rowling wins privacy case over son's photo

UK - Harry Potter author JK Rowling has won her battle to ban the further publication of a long-lens photograph of her son, in a privacy case her lawyers called a major development in British law.

In a written judgment, a panel of judges upheld the appeal, a ruling which Rowling and husband Neil Murray welcomed.

"We understand and accept that with the success of Harry Potter there will be a measure of legitimate media and public interest in Jo's (Rowling's) professional activities and appearances," the couple said in a statement.

"However, we have striven to give our children a normal family life outside the media spotlight.

"We are immensely grateful to the court for giving our children protection from covert, unauthorised photography; this ruling will make an immediate and material difference to their lives." (more)
...but, if they didn't win, there was always... >Plan B<.

Tuesday, May 6, 2008

SpyCam Story #445 - More Workplace Voyeurism

Australia - Federal police (AFP) are investigating how women at SBS' headquarters in Sydney were filmed in a changing room two years ago.

The AFP told SBS management about two weeks ago they had found photos of three women on the home computer of a man who works there. It is alleged the photos were taken by a camera installed in the room in 2006.

SBS managing director Shaun Brown says the suspect has been suspended from his job.

"Clearly the AFP had in their possessions the photograph," he said.

"They obviously had the identity of the suspect, they knew where the suspect worked and they appeared to put two and two together and concluded that the offence took place on these premises." (more)
So, why did it take 2-years for the staff to be informed?


Security Directors: FREE Security White Paper - "Surreptitious Workplace Recording ...and what you can do about it."  

Wi-Fi FBI Spy Cry

How do hackers grab your personal data out of thin air? Supervisory Special Agent Donna Peterson of our Cyber Division said one of the most common types of attack is this: a bogus but legitimate-looking Wi-Fi network with a strong signal is strategically set up in a known hot spot...and the hacker waits for nearby laptops to connect to it. At that point, your computer—and all your sensitive information, including user ID, passwords, credit card numbers, etc.—basically belongs to the hacker. The intruder can mine your computer for valuable data, direct you to phony webpages that look like ones you frequent, and record your every keystroke.

“Another thing to remember,” said Agent Peterson, “is that the connection between your laptop and the attacker's laptop runs both ways: while he's taking info from you, you may be unknowingly downloading viruses, worms, and other malware from him.

What can you do to protect yourself?
Agent’s Peterson’s best advice is, don’t connect to an unknown Wi-Fi network. But if you have to, there are some precautions you can take to decrease the threat:
• Make sure your laptop security is up to date, with current versions of your operating system, web browser, firewalls, and antivirus and anti-spyware software.
• Don't conduct financial transactions or use applications like e-mail and instant messaging.
Change the default setting on your laptop so you have to manually select the Wi-Fi network you’re connecting to.
• Turn off your laptop's Wi-Fi capabilities when you're not using them.
(more) (How to Protect Your Computer)

SpyCam Story #444 - Workplace Voyeurism

Employer Video Monitoring of Bathrooms and Locker Rooms
by The National Workrights Institute
"Electronic monitoring is a rapidly growing phenomenon in American businesses. By recent estimates, 92% of employers were conducting some form of workplace monitoring. This rapid growth in monitoring has virtually destroyed any sense of privacy as we know it in the American workplace. As technology has proliferated in the workplace, it has become ever more penetrating and intrusive... Most invasive of all is video monitoring. Some cameras are appropriate. Security cameras in stairwells and parking garages make us all safer without intruding on privacy. But employers often install cameras in areas that are completely indefensible. Many employers have installed hidden video cameras in locker rooms and bathrooms, sometimes inside the stalls..." (more, with examples)


Security Directors: FREE Security White Paper - "Surreptitious Workplace Recording ...and what you can do about it."   

Who's Watching You at Work?

"Surveillance is now routine business practice among American employers, both large and small, as the cost and ease of introducing have dropped. You leave your rights at the office door every day you go to work. Most surveillance is conducted without any individualized suspicion, and personal as well as business-related information is routinely collected," explained Jeremy Gruber, legal director at the National Workrights Institute.

Two-thirds of the companies included in the "2007 Electronic Monitoring & Surveillance Survey" said they monitor Internet connections. (more)

Monday, May 5, 2008

The Dawn of the VoIP Bug

"...transform the existing power lines in your home or small office into a high-speed network solution. Without running wires, PLC-185S takes advantage of your existing electrical wiring to create or extend a network environment. PLC-185S is also an ideal solution for homes or small offices where concrete walls, floors in multi-storied buildings, or other architectural barriers could inhibit a wireless signal.

Just plug the PLC-185S into an electrical outlet and it can turn every electrical outlet into a possible network connection to connect to any network devices, such as wireless router, network cameras, and video servers." or VoIP bugs :) (more)

Hollywood Wiretap - Is The Pellicano Case New?

Two-bit snoops are a dime a dozen, but Hollywood wiretappers rate a four-bit litereary, literally!
Enough with the alliteration.
Blow 50 cents (not literally) and tap into some deja vu by Brad Lewis. Download Hollywood Wiretapinstantly – from Amazon.com, now.

Lessons in Wiretapping Skills

Los Angeles - The wiretapping trial of Anthony Pellicano, the accused sleuth to the stars and irrepressible eavesdropper, has offered much fodder for celebrity watchers over its two-month run... the trial, which went to the jury last week, offered arguably more for people who enjoy talk of encryption software, code-wiping booby traps or the low-tech secrets of phone company networks.

Here, through various witnesses, are a few of the disclosures:

• Wiretapping is really, really easy. And not just for the government. Anyone sitting in on the Pellicano trial (and staying awake during the telecom testimony) could walk away ready to intercept phone calls after a quick stop at Radio Shack for less than $50 in equipment... For all his wiretapping prowess, however, Mr. Pellicano could not tap cellphones.

• Phone “sweeps” offer false security. There are many companies that offer wiretap detection services. But these services are meant to pick up devices on the premises of the target. If the tap is elsewhere, they are useless...

The person who programmed Mr. Pellicano’s wiretap software was a college dropout named Kevin Kachikian... His software incorporated an encryption algorithm, Serpent, that the government’s code-breakers have not been able to crack. Serpent, can be downloaded free...

• Mr. Pellicano bragged about his wiretapping ability and vowed that no one on earth would ever learn of it — proving that a code of silence is not too useful if you never stop blabbing about it. (more)

Sunday, May 4, 2008

Eavesdropping Movie - "Monte Rouge"

Title: Monte Rouge
Writer/Director: Eduardo del Llano
Time: 15 minutes
Plot: Electronic eavesdropping.
Setting: Cuba.

Humor: Dark, subtle; like Monte Rouge.


"...two plain-clothed security agents knock at the door of a young man, Nicanor O'Donell.


"Good morning, my name is Rodríguez. This is comrade Segura," they tell him. "We're here to install the microphones."

"Our mission is to install microphones in your home to listen directly to the anti-governmental comments you make," the SDE (state security) agent says.

Nicanor can't believe. To him it is a bad dream or a bad joke.

The agents explain that they run a
pilot scheme to make their work "more inclusive." No longer will the SDE break in to the houses of suspects to place microphones, they will just knock on the door and ask the house owner to let them install them. All in the name of "more openness."

In exchange they ask that Nicanor accepts the "obvious limitations" of having only two microphones placed in the house (one in the bathroom). And, to ensure that all subversive conversations are held in that place, offering to install a free mini-bar
in the bathroom to get guests to go there for these conversations.

In a mild mannered conversation (with some dark undertones), they explain they know all about him: his black market dealings (exchanging a table from a museum with a guard of
the museum for a VCR), the conversations he has had with friends in bars, ... The say he was selected for this test program because of his "excellent analysis" that goes beyond "more bitching" (and the fact that he lived close to the station while they had no access to a car).

They also ensure him that the devices are independent of the electricity grid (Cuba is known for its blackouts) as it
"hardly would make sense to make eavesdropping dependent of the electricity." The young man is also warned that it is known to them that he also makes some positive comments about Cuba, but that he is to refrain from that "crap" as doesn't interest them and is a waste of their time.


The author stresses that he did not mean to indict Cuba's state security system, he just wanted to create and describe an present absurd Kafkaesque situation. He succeeded.


In Cuba and abroad there is a lot of speculation that del Llano and the other participants in Monte Rouge, could face reprisals for the irreverent clip. Let's hope that the popularity of the clip will protect them."
(en español: video Part 1 video Part 2)

Saturday, May 3, 2008

Spy Agency’s Eavesdropping Rose Last Year

S. Korea - The Broadcasting and Communications Commission (BCC) said Thursday that the number of eavesdropping requests from the spy agency and police last year was the highest since 2004, while the number of cases of e-mail monitoring and caller identification also rose.

Telephone companies allowed the National Intelligence Service (NIS), police officials and prosecutors to tap 1,142 phone calls last year, up from 1,062 cases in 2006. Most of the requests were from the NIS, the spy agency.

The number of caller identification requests from investigation authorities also increased by more than 20 percent to 183,659 cases from 150,743, the BCC said. E-mail monitoring rose 28.9 percent to 326 cases.

Furthermore, the actual number of eavesdropping cases can be higher than the released figure since multiple requests on a single case are counted as one, the BCC said. (more)

SpyCam Story #443 - Reality YOU tube

Millions of Americans have wireless cameras in their homes and cars, purchased for security or to monitor children — but it turns out the devices could be making those they're meant to protect more vulnerable.

Reporter Tom Regan of ABC News' Atlanta station, WSB-TV, investigated how video cameras may be providing an unwelcome window into your private life.


From a baby's nursery, to a restaurant, to an office, private scenes proved shockingly easy to eavesdrop on with minimal equipment in a recent WSB-TV outing.


Regan's team bought a $100 rearview camera from a local auto parts store, installed it in an S.U.V. and simply drove around.
They were amazed by the images picked up by the wireless monitor that came with the rearview camera... (more with video report)

And so, our list of residential snitch devices grows longer...
• 1960's - AM wireless intercom systems.

• 1970's - FM wireless intercom systems.

• 1980's - Cordless telephones.

• 1990's - Wireless audio baby monitors.

• 2000's - Wireless TV baby/security monitors.

What ABC News didn't mention is that professional burglars have taken advantage of these technologies for over 50 years. Their latest tool is a sensitive, compact video scanner.

Friday, May 2, 2008

SpyCam Story #442 - Webcam Hijack Warning

Experts at SophosLabs™, are warning computer users about the importance of properly securing PCs, following news that a man who allegedly used computer malware to prey upon young women has been charged in Canada.

According to media reports, 27-year-old Daniel Lesiewicz has been charged with using spyware to take over the webcams of women as young as 14 and coerced them into posing naked for him. (more)