Scary stuff in the news...
"iPhones sold as refurbished units may contain personal data from their previous owners that, with a little leg-work, is readily accessible by new owners. These data include email, images, contacts and more. ...performing a “Restore” operation on the iPhone does not delete personal data from the device. Such information remains intact on the device after a restore, making the process unsuitable as a preparatory measure for iPhone resale or service. Apparently, Apple’s refurbishing procedure also does not delete the personal data.
There currently exits no viable, publicly available method for erasing personal data on the iPhone. Erasing your content and settings has no effect on whether a subsequent owner can recover personal information." (source)
Kevin's Reality Check
1. Go into Settings > General > Reset
2. Hit "Erase all Content and Settings."
This will keep your info from most people, but not forensic types with toolkits. They can access what doesn't get erased - the application screenshots. Screenshots are taken every time the Home button is pressed. Reason: to generate the zoom effect for the next time an application is accessed.
Still paranoid?
• Make new screenshots after you erase all content.
Still paranoid?
• Search the net for info on reformatting the phone's NAND.
Tuesday, May 20, 2008
Spook Vault Stuff - Data Loss via Optoanalysis
Researchers have developed two new techniques for stealing data from a computer that use some unlikely hacking tools: cameras and telescopes.
In two separate pieces of research, teams at the University of California, Santa Barbara, and at Saarland University in Saarbrucken, Germany, describe attacks that seem ripped from the pages of spy novels. In Saarbrucken, the researchers have read computer screens from their tiny reflections on everyday objects such as glasses, teapots, and even the human eye. The UC team has worked out a way to analyze a video of hands typing on a keyboard in order to guess what was being written. (more)
Wannaknowhowitisidone?
Reflections.
Observations.
In two separate pieces of research, teams at the University of California, Santa Barbara, and at Saarland University in Saarbrucken, Germany, describe attacks that seem ripped from the pages of spy novels. In Saarbrucken, the researchers have read computer screens from their tiny reflections on everyday objects such as glasses, teapots, and even the human eye. The UC team has worked out a way to analyze a video of hands typing on a keyboard in order to guess what was being written. (more)
Wannaknowhowitisidone?
Reflections.
Observations.
Q&A Time - Radio Frequency (RF) Blocking
From a professional colleague...
Q. "I would like to know if there is any security film that can be applied to windows to help block RF emissions. I have heard of curtains that are made for purpose? not sure though? Any ideas would be appreciated. Thanks."
A. Their are all sorts of RF shielding materials on the market: window film, speciality glass, screening, wallpaper, paint, gaskets, curtains, beanies, etc. Each item, by itself, is not a very effective solution. Used in conjunction with one another, RF may be attenuated to a point where it solves a particular problem. The attenuation will not be 100% unless one constructs a fully shielded room (Faraday cage). In government circles these specially built rooms are called Sensitive Compartmentalized Information Facility, otherwise known as a SCIF. Even then, the slightest crack or deformed door gasket will allow RF in/out.
100% shielding becomes problematic when the application is eavesdropping countermeasures. Shielded rooms are ugly and expensive, and other methods are not 100% effective. In counterespionage and TSCM, the information is either protected, or it is not protected.
Q. "I would like to know if there is any security film that can be applied to windows to help block RF emissions. I have heard of curtains that are made for purpose? not sure though? Any ideas would be appreciated. Thanks."
A. Their are all sorts of RF shielding materials on the market: window film, speciality glass, screening, wallpaper, paint, gaskets, curtains, beanies, etc. Each item, by itself, is not a very effective solution. Used in conjunction with one another, RF may be attenuated to a point where it solves a particular problem. The attenuation will not be 100% unless one constructs a fully shielded room (Faraday cage). In government circles these specially built rooms are called Sensitive Compartmentalized Information Facility, otherwise known as a SCIF. Even then, the slightest crack or deformed door gasket will allow RF in/out.
100% shielding becomes problematic when the application is eavesdropping countermeasures. Shielded rooms are ugly and expensive, and other methods are not 100% effective. In counterespionage and TSCM, the information is either protected, or it is not protected.
Monday, May 19, 2008
Blindsided
• Disrepair breeds disrespect.
• Focus on the expected, and the unexpected.
• Like deer, security would do well to look up.
• Kilroy had kids.
Chlorine for stagnant security thinking...
Our roof artist might have spent their time entering the building, planting bugs or stealing documents, instead of graciously exposing a security vulnerability.
Time to shake it up. Make sure 80% of your security budget isn't protecting 20% of your company's value.
The value ratio in many companies is more like 20% physical assets, 80% intellectual assets. Many security budgets protect in the opposite direction – which is like looking in the wrong direction.
(photo courtesy of spiggycat)
Sunday, May 18, 2008
Alert - Throw These Bums Out!
Bum One...
The FM analog wireless presenter's microphone – one of the Top 5 corporate eavesdropping threats. Why? No secret. Radio waves travel. A quarter mile is the advertised standard. Interception of an FM analog signal is easy. Safer solutions exist. Throw these bums out.
Bum Two..
Any meeting planner who still uses FM analog wireless microphones for your sensitive presentations or meetings. Educate them. Give them a chance to change. If they don't, your sensitive meetings become Town Hall Meetings. Throw these bums out.
Bum Three...
Any security director or security consultant who does not point out the dangers of FM analog wireless microphones. They have an obligation to stand up to meeting planners and AV crews. They have an obligation to recommend one of the several, more secure, options available. If they don't. Throw these bums out.
Bum Four...
These days, any AV production company that doesn't invest in digital, encrypted wireless microphones for their clients is stupidly cheap. For years, they hid behind excuses like "digital technology is not reliable enough," and "it lacks fidelity." Those days are over.
You pay these guys hundreds of thousands each year to produce your corporate events. The least they can do is update their equipment (a one-time investment).
They KNOW they are leaking your sensitive/secret information when they
continue to use FM analog wireless microphones. Not upgrading to secure communications is negligence on their part. Demand secure wireless microphones, or... throw these bums out.
Bum Five...
YOU. If you are not part of the solution, as of this moment you are now part of the problem.
The New Wireless Mics Can Make Your Meetings More Secure.
Some even have encryption capabilities!
• Lectrosonics (...and an Encryption White Paper)
• Zaxcom
• Mipro ACT-82
• Telex SAFE-1000
Infrared Choices...
• Glonetic Audio
• PA-System
• Azden
The FM analog wireless presenter's microphone – one of the Top 5 corporate eavesdropping threats. Why? No secret. Radio waves travel. A quarter mile is the advertised standard. Interception of an FM analog signal is easy. Safer solutions exist. Throw these bums out.
Bum Two..
Any meeting planner who still uses FM analog wireless microphones for your sensitive presentations or meetings. Educate them. Give them a chance to change. If they don't, your sensitive meetings become Town Hall Meetings. Throw these bums out.
Bum Three...
Any security director or security consultant who does not point out the dangers of FM analog wireless microphones. They have an obligation to stand up to meeting planners and AV crews. They have an obligation to recommend one of the several, more secure, options available. If they don't. Throw these bums out.
Bum Four...
These days, any AV production company that doesn't invest in digital, encrypted wireless microphones for their clients is stupidly cheap. For years, they hid behind excuses like "digital technology is not reliable enough," and "it lacks fidelity." Those days are over.
You pay these guys hundreds of thousands each year to produce your corporate events. The least they can do is update their equipment (a one-time investment).
They KNOW they are leaking your sensitive/secret information when they
Bum Five...
YOU. If you are not part of the solution, as of this moment you are now part of the problem.
The New Wireless Mics Can Make Your Meetings More Secure.
Some even have encryption capabilities!
• Lectrosonics (...and an Encryption White Paper)
• Zaxcom
• Mipro ACT-82
• Telex SAFE-1000
Infrared Choices...
• Glonetic Audio
• PA-System
• Azden
Q&A Time - GPS Trackers
This question comes from a novelist working on a plot.
We also receive similar inquiries from other folks
– corporate security directors to scared spouses!
Q. If a bad guy places a real-time GPS tracker on my hero's car, and knows my hero is a skilled investigator...
• Where might they put the tracker?
• Where might investigator not look for it, or find it?
• And, is there a detector that would allow him to find it? The car is parked either outside or in a parking garage, and the bad guys have lots of access to it.
A. The best answer could come from Lo-Jack mechanics. They do this type of covert installation daily.
Real-time GPS trackers are very cool devices. They are small and may be secreted anywhere in/on a vehicle (in hollow body panels, atop gas tanks, inside bumpers, under seats, within dash panels, etc.). The real trick hiding the power connection and the two antennas properly.
For long-term tracking, a connection has to be made to the car's 12 volt power bus, preferably where the connection can not be seen and the new power wire to the GPS device can not be seen. This part is fairly easy.
Next, get two radio-frequency signals to/from the tracking device...
• The satellite signal (to the device).
• The cellular signal (to/from the device).
A GPS antenna is required to receive the weak satellite signal...

(Either a standard size GPS remote antenna, or a much smaller GPS antenna)
Ideally, this antenna needs to "see" the sky. However, this doesn't mean the antenna will be visible to you.
A GPS antenna can "see" it's signal through non-metallic materials, like: back seat windows and decks, rubber material on bumpers, plastic tail-lights, etc. Make the antenna connecting cable look like the factory installed wiring and you're in!
The cellular GSM antenna is not as hard to position since it will work wherever a regular cell phone will work.
Again, hiding the cable is important. Imagine, embalming the antenna and cable in a car's undercoating; making it 100% invisible!
Caution: Do not position the GSM antenna cable near any of the car's audio wiring or you may hear the GSM transmission noise through the car sound system... a definite tip-off that something ain't Kosher.
(small GSM antennas)
How to detect a real-time GPS/GSM tracking device?
• Physical search.
• Take car to an isolated area and use a real-time spectrum analyzer and look for the cell site registration burst transmissions.
• Keep a cell phone detector in the car. If it alerts on a regular basis, and there are no other cell phone users in the area, the problem might be a tracking and/or listening device in the car.
And, then there is the 'ol sharp stick-in-the-eye approach...
Blockers!
• GPS Blocker
• GSM Blocker
• GPS/GSM/GPRS Blocker
(all are illegal, but available, in the U.S.)
~Kevin
We also receive similar inquiries from other folks
– corporate security directors to scared spouses!
Q. If a bad guy places a real-time GPS tracker on my hero's car, and knows my hero is a skilled investigator...
• Where might they put the tracker?
• Where might investigator not look for it, or find it?
• And, is there a detector that would allow him to find it? The car is parked either outside or in a parking garage, and the bad guys have lots of access to it.
A. The best answer could come from Lo-Jack mechanics. They do this type of covert installation daily.
Real-time GPS trackers are very cool devices. They are small and may be secreted anywhere in/on a vehicle (in hollow body panels, atop gas tanks, inside bumpers, under seats, within dash panels, etc.). The real trick hiding the power connection and the two antennas properly.
For long-term tracking, a connection has to be made to the car's 12 volt power bus, preferably where the connection can not be seen and the new power wire to the GPS device can not be seen. This part is fairly easy.
Next, get two radio-frequency signals to/from the tracking device...
• The satellite signal (to the device).
• The cellular signal (to/from the device).
A GPS antenna is required to receive the weak satellite signal...
(Either a standard size GPS remote antenna, or a much smaller GPS antenna)
Ideally, this antenna needs to "see" the sky. However, this doesn't mean the antenna will be visible to you.
A GPS antenna can "see" it's signal through non-metallic materials, like: back seat windows and decks, rubber material on bumpers, plastic tail-lights, etc. Make the antenna connecting cable look like the factory installed wiring and you're in!
The cellular GSM antenna is not as hard to position since it will work wherever a regular cell phone will work.
Again, hiding the cable is important. Imagine, embalming the antenna and cable in a car's undercoating; making it 100% invisible!
Caution: Do not position the GSM antenna cable near any of the car's audio wiring or you may hear the GSM transmission noise through the car sound system... a definite tip-off that something ain't Kosher.
How to detect a real-time GPS/GSM tracking device?
• Physical search.
• Take car to an isolated area and use a real-time spectrum analyzer and look for the cell site registration burst transmissions.
• Keep a cell phone detector in the car. If it alerts on a regular basis, and there are no other cell phone users in the area, the problem might be a tracking and/or listening device in the car.
And, then there is the 'ol sharp stick-in-the-eye approach...
Blockers!
• GPS Blocker
• GSM Blocker
• GPS/GSM/GPRS Blocker
(all are illegal, but available, in the U.S.)
~Kevin
The Geek Chorus Wails, "Beware VoIP. Shun GSM."
"Be careful what you say over that mobile phone or VoIP system."
The most widely used mobile phone standard, GSM, is so insecure that it is easy to track peoples' whereabouts and with some effort even listen in on calls, a security expert said late on Saturday at the LayerOne security conference.
"GSM security should become more secure or at least people should know they shouldn't be talking about (sensitive) things over GSM," said David Hulton, who has cracked the encryption algorithm the phones use. "Somebody could possibly be listening over the line."
For as little as $900, someone can buy equipment and use free software to create a fake network device to see traffic going across the network...
VoIP systems based on open standards are not encrypting the traffic, which leaves them at risk for eavesdropping, forged or intercepted calls and bogus voice messages, he said, adding that there are numerous tools for doing that, with names like "Vomit" and "Cain and Abel." (more)
The most widely used mobile phone standard, GSM, is so insecure that it is easy to track peoples' whereabouts and with some effort even listen in on calls, a security expert said late on Saturday at the LayerOne security conference.
"GSM security should become more secure or at least people should know they shouldn't be talking about (sensitive) things over GSM," said David Hulton, who has cracked the encryption algorithm the phones use. "Somebody could possibly be listening over the line."
For as little as $900, someone can buy equipment and use free software to create a fake network device to see traffic going across the network...
VoIP systems based on open standards are not encrypting the traffic, which leaves them at risk for eavesdropping, forged or intercepted calls and bogus voice messages, he said, adding that there are numerous tools for doing that, with names like "Vomit" and "Cain and Abel." (more)
Saturday, May 17, 2008
Wiretapping PI Pellicano Convicted
Anthony Pellicano, 64, was accused of wiretapping stars such as Sylvester Stallone and running the names of others, such as Garry Shandling and Kevin Nealon, through law enforcement databases to help clients in legal and other disputes.
Pellicano was found guilty of all but one of the 77 counts against him. He looked at the judge with his arms crossed and didn't react when verdicts were read. (more)
Comverse - Smells like Sneakers
"Martin Bishop is the head of a group of experts who specialise in testing security systems. When he is blackmailed by Government agents into stealing a top secret black box, the team find themselves embroiled in a game of danger and intrigue. After they recover the box, they discover that it has the capability to decode all existing encryption systems around the world, and that the agents who hired them didn't work for the Government after all..."
...and now the news...
...and now the news...
Friday, May 16, 2008
"My password is stronger than your password!"
"Oh, yea... Prove it!"
...even strong passwords can be cracked in seconds using an open source tool called Ophcrack.
Ophcrack is an extremely fast password cracker because it uses a special algorithm called rainbow tables. Brute-force cracking tools typically try thousands of combinations of letters, numbers and special characters each second, but cracking a password by attempting every conceivable combination can take hours or days. (by Scott Sidel)
...even strong passwords can be cracked in seconds using an open source tool called Ophcrack.
Ophcrack is an extremely fast password cracker because it uses a special algorithm called rainbow tables. Brute-force cracking tools typically try thousands of combinations of letters, numbers and special characters each second, but cracking a password by attempting every conceivable combination can take hours or days. (by Scott Sidel)
SpyCam Story #447 - The Neighbor
A. I love easy questions. Once you have tried all the civil things (a polite request to re-aim the camera, threat of filing a voyeurism complaint with the police, etc.) there is always the sharp stick in the eye approach.
Here is what other people are doing...
Ouch #1
Ouch #2
Ouch #3
Ouch #4
Ouch #5
Good luck!
Kevin
Wednesday, May 14, 2008
DIY Spy Tip #089 - "...with 'friends' like you..."
If you are still relying on Google to snoop on your friends, you are behind the curve.
Armed with new and established Web sites, people are uncovering surprising details about colleagues, lovers and strangers that often don't turn up in a simple Internet search. Though none of these sites can reveal anything that isn't already available publicly, they can make it much easier to find. And most of them are free.
Zaba Inc.'s ZabaSearch.com turns up public records such as criminal history and birthdates. Spock Networks Inc.'s Spock.com and Wink Technologies Inc.'s Wink.com are "people-search engines" that specialize in digging up personal pages, such as social-networking profiles, buried deep in the Web. Spokeo.com is a search site operated by Spokeo Inc., a startup that lets users see what their friends are doing on other Web sites. Zillow Inc.'s Zillow.com estimates the value of people's homes, while the Huffington Post's Fundrace feature tracks their campaign donations. Jigsaw Data Corp.'s Jigsaw.com, meanwhile, lets people share details with each other from business cards they've collected -- a sort of gray market for Rolodex data. (more)
Armed with new and established Web sites, people are uncovering surprising details about colleagues, lovers and strangers that often don't turn up in a simple Internet search. Though none of these sites can reveal anything that isn't already available publicly, they can make it much easier to find. And most of them are free.
Zaba Inc.'s ZabaSearch.com turns up public records such as criminal history and birthdates. Spock Networks Inc.'s Spock.com and Wink Technologies Inc.'s Wink.com are "people-search engines" that specialize in digging up personal pages, such as social-networking profiles, buried deep in the Web. Spokeo.com is a search site operated by Spokeo Inc., a startup that lets users see what their friends are doing on other Web sites. Zillow Inc.'s Zillow.com estimates the value of people's homes, while the Huffington Post's Fundrace feature tracks their campaign donations. Jigsaw Data Corp.'s Jigsaw.com, meanwhile, lets people share details with each other from business cards they've collected -- a sort of gray market for Rolodex data. (more)
Labels:
advice,
amateur,
miscellaneous,
PI,
privacy,
Ra-parents,
spy school,
tracking
Report: C-level execs more involved with security
The major data breaches that have received mass media coverage are driving so-called "C-level" executives to become actively involved in their organization's security policies, according to a new report from the (ISC)2.
There are several key "take-aways" from the report, titled "2008 (ISC)2 Global Information Security Workforce" and authored by Rob Ayoub, Frost & Sullivan's network security industry manager.
Ayoub told SCMagazineUS.com that these include the fact that C-level executives are paying attention to security...
"CEOs are asking their security professionals important questions about how they're prepared to not become another TJX," (answers) (more)
There are several key "take-aways" from the report, titled "2008 (ISC)2 Global Information Security Workforce" and authored by Rob Ayoub, Frost & Sullivan's network security industry manager.
Ayoub told SCMagazineUS.com that these include the fact that C-level executives are paying attention to security...
"CEOs are asking their security professionals important questions about how they're prepared to not become another TJX," (answers) (more)
SpyCam Story #446 - The Diogenes Dilemma
NY - Matt Walsh finally had his day in front of the NFL, and as far as commissioner Roger Goodell is concerned, this chapter of the Patriots videotaping saga is closed.
Walsh, a former Patriots video assistant who last week turned over eight tapes showing the team recording opposing offensive and defensive signals, met for more than three hours with Goodell yesterday. In the commissioner’s view, he offered no new information worth reopening the league’s investigation into the Patriots’ videotaping practices.
Goodell said Walsh told him there was no tape of the Rams walkthrough prior to Super Bowl XXXVI. He said Walsh was unaware of any other violations of league policy, including the bugging of locker rooms, manipulation of communications equipment, or miking of players to pick up opposing signals...
He also told the commissioner that he had helped a small number of players scalp between eight and 12 Super Bowl tickets. (more)
Walsh, a former Patriots video assistant who last week turned over eight tapes showing the team recording opposing offensive and defensive signals, met for more than three hours with Goodell yesterday. In the commissioner’s view, he offered no new information worth reopening the league’s investigation into the Patriots’ videotaping practices.
Goodell said Walsh told him there was no tape of the Rams walkthrough prior to Super Bowl XXXVI. He said Walsh was unaware of any other violations of league policy, including the bugging of locker rooms, manipulation of communications equipment, or miking of players to pick up opposing signals...
He also told the commissioner that he had helped a small number of players scalp between eight and 12 Super Bowl tickets. (more)
Tuesday, May 13, 2008
From Spy Novels to CIA Papers
Washington, DC - Georgetown University’s newest addition to its special collections delves deep into the world of spies, espionage and secret intelligence...
Most recently, the university acquired a special collection from the family of the late Richard Helms, director of the Central Intelligence Agency from 1966 to 1973. Personal and professional papers and photographs paint a picture of a nation in turmoil from the Vietnam and Cold Wars – and how that turmoil forced U.S. intelligence gathering to adapt.
The library’s espionage and intelligence division stands as just one subset of an overall special collection that boasts 100,000 rare books and 7,000 linear feet of manuscripts in addition to art and other media. The division began in earnest 25 years ago with the Russell J. Bowen collection, comprising of thousands of nonfiction books on intelligence. Bowen had worked for the CIA as a senior foreign technology analyst in the areas of non-nuclear energy and illegal technology transfer.
Georgetown celebrated the new collection, which will be on display at Lauinger Library (Gunlocke Room) through May 31. (more)
Most recently, the university acquired a special collection from the family of the late Richard Helms, director of the Central Intelligence Agency from 1966 to 1973. Personal and professional papers and photographs paint a picture of a nation in turmoil from the Vietnam and Cold Wars – and how that turmoil forced U.S. intelligence gathering to adapt.
The library’s espionage and intelligence division stands as just one subset of an overall special collection that boasts 100,000 rare books and 7,000 linear feet of manuscripts in addition to art and other media. The division began in earnest 25 years ago with the Russell J. Bowen collection, comprising of thousands of nonfiction books on intelligence. Bowen had worked for the CIA as a senior foreign technology analyst in the areas of non-nuclear energy and illegal technology transfer.
Georgetown celebrated the new collection, which will be on display at Lauinger Library (Gunlocke Room) through May 31. (more)
Subscribe to:
Posts (Atom)