PA - Five months ago, Linda Majer-Davis portrayed herself as a crusading public employee to the Bethlehem Area School Board. She told directors she had secretly recorded a department meeting with the superintendent because she was concerned about waste and mismanagement.
On Wednesday, police called her a criminal.
Pennsylvania's wiretap law prohibits recording a meeting or interview without the permission of all parties. The charge, intercept communications, is a third-degree felony. If convicted, Majer-Davis could face one to seven years in prison. (more)
Interesting...
"she used her laptop to record the meeting"
"...Majer-Davis is still employed by the district as a computer technician"
Observation...
People use the electronic surveillance tools they have handy and know best.
Thursday, August 28, 2008
Wednesday, August 27, 2008
Internet Privacy - It's all over but the shouting.
Two security researchers have demonstrated a new technique to stealthily intercept internet traffic on a scale previously presumed to be unavailable to anyone outside of intelligence agencies like the National Security Agency.
The tactic exploits the internet routing protocol BGP (Border Gateway Protocol) to let an attacker surreptitiously monitor unencrypted internet traffic anywhere in the world, and even modify it before it reaches its destination.
"It's a huge issue. It's at least as big an issue as the DNS issue, if not bigger," said Peiter "Mudge" Zatko, noted computer security expert and former member of the L0pht hacking group, who testified to Congress in 1998 that he could bring down the internet in 30 minutes using a similar BGP attack, and disclosed privately to government agents how BGP could also be exploited to eavesdrop. "I went around screaming my head about this about ten or twelve years ago.... We described this to intelligence agencies and to the National Security Council, in detail." (more)
Comeon, Shout, Shout, knock yourself out
Comeon, yell, yell, loud and swell
You gotta Scream, scream, you know what I mean,
Put another dime in the spying machine... (sing-a-long)
The tactic exploits the internet routing protocol BGP (Border Gateway Protocol) to let an attacker surreptitiously monitor unencrypted internet traffic anywhere in the world, and even modify it before it reaches its destination.
"It's a huge issue. It's at least as big an issue as the DNS issue, if not bigger," said Peiter "Mudge" Zatko, noted computer security expert and former member of the L0pht hacking group, who testified to Congress in 1998 that he could bring down the internet in 30 minutes using a similar BGP attack, and disclosed privately to government agents how BGP could also be exploited to eavesdrop. "I went around screaming my head about this about ten or twelve years ago.... We described this to intelligence agencies and to the National Security Council, in detail." (more)
Comeon, Shout, Shout, knock yourself out
Comeon, yell, yell, loud and swell
You gotta Scream, scream, you know what I mean,
Put another dime in the spying machine... (sing-a-long)
Labels:
computer,
espionage,
FutureWatch,
government,
Hack,
historical,
NSA,
privacy,
wiretapping
...thus, giving the word "secret" a new definition.
UK - RAF top brass have secretly bought two spy-in-the-sky planes to snoop on terrorists worldwide — from three miles up. Security officials said the Twin Star aircraft will be a global asset as they can fly for 18 hours a time.
An RAF source said: “With the right sensor array, they can see if a suspected terrorist is at home, listen in to and record his mobile calls and tell you if his car engine is hot, warm or cold. “They can also help others put a surprise package through his window.” (more)
An RAF source said: “With the right sensor array, they can see if a suspected terrorist is at home, listen in to and record his mobile calls and tell you if his car engine is hot, warm or cold. “They can also help others put a surprise package through his window.” (more)
Steganography for the Masses!
...from their website...
The SpyMessage is easy-to-use, reliable and powerful tool for protecting important information that you don't want others to see.
With SpyMessage you can encrypt and hide your text message into image without any changes in its resolution or size.
• You can view the image with any conventional image viewer program
• Exchange messages without any fear from others spying on you.
• No one can know if your image contain messages or not.
• SpyMessage uses two encryption algorithms to protect your data.
• No un-encrypted temporary files are ever created.
• No password saved within your file
• Set a special Password to retrieve your encrypted data.
Just remember, "there is no free lunch."
You don't know what else this "free" software might do.
Download at your own risk.
The SpyMessage is easy-to-use, reliable and powerful tool for protecting important information that you don't want others to see.
With SpyMessage you can encrypt and hide your text message into image without any changes in its resolution or size.
• You can view the image with any conventional image viewer program
• Exchange messages without any fear from others spying on you.
• No one can know if your image contain messages or not.
• SpyMessage uses two encryption algorithms to protect your data.
• No un-encrypted temporary files are ever created.
• No password saved within your file
• Set a special Password to retrieve your encrypted data.
Just remember, "there is no free lunch."
You don't know what else this "free" software might do.
Download at your own risk.
Labels:
amateur,
art,
computer,
data,
email,
encryption,
FutureWatch,
Hack,
miscellaneous,
privacy,
product,
software
One in three Aussies spies on text messages
900,000 Australians have admitted to checking their partner's phones according to new research conducted by Virgin Mobile. The research has revealed that Australia is a nation of paranoid text checkers with over one in three young Australians admitting to checking their partner's text messages, and more than 280,000 having been being involved in a text-checking related break-up.
The research reveals:
• 10% of young Australians have been involved in a breakup as a result of text-checking
• 59% of text checkers check their partner's phone when they shower
• Women (38%) are more likely than men (28%) to check their partner's texts
• 76% of text checkers do so in secret
• 73% of text checkers found out things they later wished they hadn't
• 44% of sneaky text checkers have discovered flirtatious or sexual texts, ranging from harmless flirtation (32%) to full blown sexual texts from someone else (19%)
• The most common places text checkers operate is while their partner is showering (59%), in the same room (41%) or on the toilet (35%)
With the aim of squashing the nation's obsession with text checking, Virgin Mobile introduces a new service for those customers concerned about their partner's snoopy tendencies. Customers can simply text the word 'snoop' to 1978 99 99 to have a text from 'SEXY' sent to their phone. When the text message is opened by a paranoid partner, the message will remind the checker to have trust in their loved one.
Author, relationship expert and text-checking guru, Samantha Brett says that text checking is rampant in relationships across the world... (press release)
...and for the very, very paranoid...
TextSpy (the deleted text message reader)
The research reveals:
• 10% of young Australians have been involved in a breakup as a result of text-checking
• 59% of text checkers check their partner's phone when they shower
• Women (38%) are more likely than men (28%) to check their partner's texts
• 76% of text checkers do so in secret
• 73% of text checkers found out things they later wished they hadn't
• 44% of sneaky text checkers have discovered flirtatious or sexual texts, ranging from harmless flirtation (32%) to full blown sexual texts from someone else (19%)
• The most common places text checkers operate is while their partner is showering (59%), in the same room (41%) or on the toilet (35%)
With the aim of squashing the nation's obsession with text checking, Virgin Mobile introduces a new service for those customers concerned about their partner's snoopy tendencies. Customers can simply text the word 'snoop' to 1978 99 99 to have a text from 'SEXY' sent to their phone. When the text message is opened by a paranoid partner, the message will remind the checker to have trust in their loved one.
Author, relationship expert and text-checking guru, Samantha Brett says that text checking is rampant in relationships across the world... (press release)
...and for the very, very paranoid...
TextSpy (the deleted text message reader)
The seemingly endless case of PI Pellicano seems to be ending... we hope.
CA - A federal prosecutor claimed Tuesday that taped phone calls between Hollywood private eye Anthony Pellicano and a high-powered lawyer showed they were conducting illegal wiretaps, even though the alleged wiretapped recordings have never been found.
In his closing argument, Assistant U.S. Attorney Daniel Saunders played a phone conversation for jurors in which Pellicano told attorney Terry Christensen that all the information he would be gathering would be kept between them. Christensen agreed...
While old-fashioned private eyes pounded the pavement for information, Pellicano "sat in his office and listened to wiretaps," Saunders said. (more)
In his closing argument, Assistant U.S. Attorney Daniel Saunders played a phone conversation for jurors in which Pellicano told attorney Terry Christensen that all the information he would be gathering would be kept between them. Christensen agreed...
While old-fashioned private eyes pounded the pavement for information, Pellicano "sat in his office and listened to wiretaps," Saunders said. (more)
Art Imitates Strife - Living the Spylife
Spooks: Code 9 a 'Spy Babies' Spin-off for BBC (more) (preview)
Fifty Dead Men Walking - Film about British spy brings controversy to TIFF (more)
Traitor is unusually thoughtful spy thriller (more) (trailer)
Terrence Howard tells the New York Times that a song on his debut album, "Shine Through It," is about the ways in which he stalked his ex-wife immediately following their split. "I wrote that song ("No. 1 Fan") as a stalker," said the actor. (more)
Fifty Dead Men Walking - Film about British spy brings controversy to TIFF (more)
Traitor is unusually thoughtful spy thriller (more) (trailer)
Terrence Howard tells the New York Times that a song on his debut album, "Shine Through It," is about the ways in which he stalked his ex-wife immediately following their split. "I wrote that song ("No. 1 Fan") as a stalker," said the actor. (more)
Tuesday, August 26, 2008
August - Spies Dropping Like Flys - RIP
A Soviet spy codenamed "Zephyr" who worked undercover with his wife in Europe and the United States for more than a quarter of a century has died aged 101, Russia's foreign intelligence agency (SVR) said... The agency issued a glowing tribute to spy Mikhail Mukasei... (more)
Former Israeli spy chief Binyamin Gibli dies... A former Israeli intelligence chief who tried to stop Britain abandoning its military presence on the Suez canal by staging bomb attacks there has died aged 89. (more)
Wolfgang Vogel, East German spy swapper, dies at 82 (more)
Soviet dissident author Alexander Solzhenitsyn dies at 89 - a former prisoner of war caught by the Germans during World War II, then returned home only to face charges of being a spy... (more)
Grayston L. Lynch, a hero of the anti-Castro movement for his leadership in the Bay of Pigs invasion, where fired the first shot of the battle, died at 85... (more)
Television and stage actor Terence Rigby has died at his home aged 71 - featured in shows including Tinker, Tailor, Soldier, Spy. (more)
Former Israeli spy chief Binyamin Gibli dies... A former Israeli intelligence chief who tried to stop Britain abandoning its military presence on the Suez canal by staging bomb attacks there has died aged 89. (more)
Wolfgang Vogel, East German spy swapper, dies at 82 (more)
Soviet dissident author Alexander Solzhenitsyn dies at 89 - a former prisoner of war caught by the Germans during World War II, then returned home only to face charges of being a spy... (more)
Grayston L. Lynch, a hero of the anti-Castro movement for his leadership in the Bay of Pigs invasion, where fired the first shot of the battle, died at 85... (more)
Television and stage actor Terence Rigby has died at his home aged 71 - featured in shows including Tinker, Tailor, Soldier, Spy. (more)
Labels:
art,
CIA,
employee,
espionage,
government,
miscellaneous
Come gather 'round people, Wherever you roam
Mobile phones, BlackBerrys, emails, social networking... Never before has it been so easy to cheat on a partner.
And admit that the waters, Around you have grown
But has technology made it simply too difficult for philanderers to cover their tracks?
And accept it that soon, You'll be drenched to the bone.
Day-to-day actions, such as taking the bus to work and buying a magazine on the way, used to be ephemeral. But today, every journey, every communication, every penny spent, is logged and stored.
If your time to you, Is worth savin'
As we move through life, we leave millions of specks of electronic evidence. Stored on hard drives and mainframes, this data acts like specks of DNA sprayed across the bedsheet of cyberspace. It's all there waiting to incriminate us.
Then you better start swimmin', Or you'll sink like a stone
As science drags us forward, it's a safe prediction that within the next decade, traditional affairs – the ones with longevity, the ones that take planning, scheming and logistics – will have vanished altogether. (more)
For the times they are a-changin'.
And admit that the waters, Around you have grown
But has technology made it simply too difficult for philanderers to cover their tracks?
And accept it that soon, You'll be drenched to the bone.
Day-to-day actions, such as taking the bus to work and buying a magazine on the way, used to be ephemeral. But today, every journey, every communication, every penny spent, is logged and stored.
If your time to you, Is worth savin'
As we move through life, we leave millions of specks of electronic evidence. Stored on hard drives and mainframes, this data acts like specks of DNA sprayed across the bedsheet of cyberspace. It's all there waiting to incriminate us.
Then you better start swimmin', Or you'll sink like a stone
As science drags us forward, it's a safe prediction that within the next decade, traditional affairs – the ones with longevity, the ones that take planning, scheming and logistics – will have vanished altogether. (more)
For the times they are a-changin'.
Cooking up Espionage, with Julia Child
Before she mastered the secrets of French cooking, Julia Child was enrolled in the school of espionage.
The famous chef let slip the story of her war-era spying in a 2002 autobiography, but the release of thousands of documents from the U.S. national archives on Thursday confirms her participation in a secret organization formed by President Franklin Roosevelt during the Second World War.
Hidden among the 750,000 classified pages released Thursday is a picture of the vast spy network of military and civilian operatives called the Office of Strategic Services (OSS). (more) (more) (audio) (OSS Society)
Trivia...
She helped develop shark repellent, critical in protecting explosives used to sink German U-boats during World War II. It kept sharks out of the way of the torpedoes. Later, she put people in the way of Tournedos and other epicurean delights.
The famous chef let slip the story of her war-era spying in a 2002 autobiography, but the release of thousands of documents from the U.S. national archives on Thursday confirms her participation in a secret organization formed by President Franklin Roosevelt during the Second World War.
Hidden among the 750,000 classified pages released Thursday is a picture of the vast spy network of military and civilian operatives called the Office of Strategic Services (OSS). (more) (more) (audio) (OSS Society)
Trivia...
She helped develop shark repellent, critical in protecting explosives used to sink German U-boats during World War II. It kept sharks out of the way of the torpedoes. Later, she put people in the way of Tournedos and other epicurean delights.
"What could possibly go wrong, Herr HAL?"
German electronics company Siemens has gone a step further, developing a complete “surveillance in a box” system called the Intelligence Platform, designed for security services in Europe and Asia.
It has already sold the system to 60 countries.
The system integrates tasks typically done by separate surveillance teams or machines, pooling data from sources such as telephone calls, email and Internet activity, bank transactions and insurance records. It then sorts through this mountain of information using software that Siemens dubs “intelligence modules”. (more) (more)
It has already sold the system to 60 countries.
The system integrates tasks typically done by separate surveillance teams or machines, pooling data from sources such as telephone calls, email and Internet activity, bank transactions and insurance records. It then sorts through this mountain of information using software that Siemens dubs “intelligence modules”. (more) (more)
Quote of the Day - Cindy Sounds Bugged
Cindy Sheehan, American activist, running for Congress.
"So I walked into my room and bigger than life, there was a man standing by my desk holding the room phone with a screwdriver in his hand!
I immediately said; "What the hell are you doing? Are you putting a bug on my phone?" He looked like he got caught with his hand in the cookie jar and stammered out: "N--no, we are having problems with the phone." I told him to get out of my room because my phone was fine and I called the front desk and the person at the front desk stammered something out about "problems" with some of the phones." (more)
Obviously, this was not handled well. No follow through, no credibility. Next time, get to the bottom of it. Call hotel security. Demand proof of identity. Not satisfied? Think a crime is being committed? Call the police. Press charges.
If you think you have found a bug, wiretap, spycam or other form of electronic surveillance, follow this advice.
"So I walked into my room and bigger than life, there was a man standing by my desk holding the room phone with a screwdriver in his hand!
I immediately said; "What the hell are you doing? Are you putting a bug on my phone?" He looked like he got caught with his hand in the cookie jar and stammered out: "N--no, we are having problems with the phone." I told him to get out of my room because my phone was fine and I called the front desk and the person at the front desk stammered something out about "problems" with some of the phones." (more)
Obviously, this was not handled well. No follow through, no credibility. Next time, get to the bottom of it. Call hotel security. Demand proof of identity. Not satisfied? Think a crime is being committed? Call the police. Press charges.
If you think you have found a bug, wiretap, spycam or other form of electronic surveillance, follow this advice.
Monday, August 25, 2008
Wi-Fi Eavesdropping Breakthrough
The growth of shared Wi-Fi and other wireless computer networks has increased the risk of eavesdropping on Internet communications, but researchers at Carnegie Mellon University's School of Computer Science and College of Engineering have devised a low-cost system that can thwart these "Man-in-the-Middle" (MitM) attacks.
The system, called Perspectives, also can protect against attacks related to a recently disclosed software flaw in the Domain Name System (DNS), the Internet phone book used to route messages between computers. (more)
When was your last Wi-Fi Security Audit conducted?
Did it include a Compliance Report?
Did you know which laws require you to be Wi-Fi compliant?
Find out... here.
In the meantime...
Download a FREE copy of Perspectives for Foxfire v3.
The system, called Perspectives, also can protect against attacks related to a recently disclosed software flaw in the Domain Name System (DNS), the Internet phone book used to route messages between computers. (more)
When was your last Wi-Fi Security Audit conducted?
Did it include a Compliance Report?
Did you know which laws require you to be Wi-Fi compliant?
Find out... here.
In the meantime...
Download a FREE copy of Perspectives for Foxfire v3.
Sunday, August 24, 2008
GSM Bug Roundup
15 new GSM bugs - eavesdropping devices which can be listened to from anywhere in the world by simply dialing their cell phone number - are featured here, and on ebay here.
Why do we mention it?
So you know your vulnerabilities.
P.S. Murray Associates developed a unique inspection method to find them.
Why do we mention it?
So you know your vulnerabilities.
P.S. Murray Associates developed a unique inspection method to find them.
Quote of the Day - A New Yorker Ponders... Surveillance
"Oh, there’s also a poster in a window across the street that reads: If you can see this, you’re spying on me. It makes me think about how many people could be spying on me right now, what with my blinds open and desk light on, while I awkwardly blow my nose and type this entry. Then again, I’m sure I’d be watching my neighbors if I were staring out my window and someone’s light happened to be on. Voyeurism: every New Yorker’s favorite pastime - it’s like live reality TV!" ~ Nina Yiamsamatha (August 24, 2008)
Subscribe to:
Posts (Atom)