PA - Former Philadelphia TV anchor Larry Mendte has learned his fate for spying on his co-worker's computers.
Mendte was snooping on former CBS 3 co-anchor Alycia Lane's emails and releasing personal information about her to the media. His punishment for his evil ways?
• Six months house arrest
• He must wear an electronic monitoring device
• $5,000 fine
• 250 hours of community service
• Three years probation
• Special filtering device on his personal computer
• No contact with Lane
Mendte, 51, had pleaded guilty to one felony count of intentionally accessing a protected computer without authorization and obtaining information, according to Acting U.S. Attorney Laurie Magid.
He had accessed Lane's emails thousands of times according to prosecutors. Lane fired back at Mendte in September by filing a suit in the Common Pleas Court. Lane accuses Mendte of invading her privacy and helping to cause her demise by leaking information to the press. (more) (background)
Tuesday, November 25, 2008
Queen's Electric Teapot 'Bugged'
UK - The samovar was identified as a potential bugging device following a recent sweep by the security services.
The ornate red and yellow urn was presented to the Queen by a Russian aerobatics team about 20 years ago, at the tail end of the Soviet era. It reportedly became a favourite of the Queen Mother, who put it in a corner of a room in the Aberdeenshire estate and apparently showed it off to visitors.
Security services apparently suspected that the complicated eastern European wiring could have concealed a listening device. If true, the teapot could have listened in to the Queen's conversations with prime ministers, world leaders and members of her family.
One retainer told the Daily Express: "The samovar was always a bit of an enigma. No one could work out what the Russians thought we were going to do with it. "The wiring looked as if it came from a Second World War tank and it was not exactly pretty. "No one ever considered it a security risk until a recent sweep by these spooks with their electronic devices. They swept everywhere imaginable, public and private rooms, and the first thing to go was the samovar." (more)
The Russian side of the story...
Mikhail Lyubimov, who served in the Russian secret services in Britain for several decades, says that the story may be a canard, since the alleged bugging model referred to by the Daily Express is both ineffective and useless.
"Buckingham Palace and the Queen were never objects of great interest to us, since the Queen doesn't have an active role in Britain's governance,” he points out.
Moreover, Lyubimov states that the electric device is unlikely to have been a regular guest at government meetings or any negotiations that the Queen might have conducted with important visitors.
Nevertheless, the ex-secret agent recalls an equally strange story, involving a Russian souvenir. In the 1960s, the US ambassador to Russia was presented with a wooden eagle, which stood in the corner of his office for several years before it was discovered that there was a bug embedded in it. (more) (The Great Seal Bug)
The ornate red and yellow urn was presented to the Queen by a Russian aerobatics team about 20 years ago, at the tail end of the Soviet era. It reportedly became a favourite of the Queen Mother, who put it in a corner of a room in the Aberdeenshire estate and apparently showed it off to visitors.
Security services apparently suspected that the complicated eastern European wiring could have concealed a listening device. If true, the teapot could have listened in to the Queen's conversations with prime ministers, world leaders and members of her family.
One retainer told the Daily Express: "The samovar was always a bit of an enigma. No one could work out what the Russians thought we were going to do with it. "The wiring looked as if it came from a Second World War tank and it was not exactly pretty. "No one ever considered it a security risk until a recent sweep by these spooks with their electronic devices. They swept everywhere imaginable, public and private rooms, and the first thing to go was the samovar." (more)
The Russian side of the story...
Mikhail Lyubimov, who served in the Russian secret services in Britain for several decades, says that the story may be a canard, since the alleged bugging model referred to by the Daily Express is both ineffective and useless.
"Buckingham Palace and the Queen were never objects of great interest to us, since the Queen doesn't have an active role in Britain's governance,” he points out.
Moreover, Lyubimov states that the electric device is unlikely to have been a regular guest at government meetings or any negotiations that the Queen might have conducted with important visitors.
Nevertheless, the ex-secret agent recalls an equally strange story, involving a Russian souvenir. In the 1960s, the US ambassador to Russia was presented with a wooden eagle, which stood in the corner of his office for several years before it was discovered that there was a bug embedded in it. (more) (The Great Seal Bug)
A Security Hole So Big Most People Miss It... Wi-Fi
A tip from Roger A. Grimes, Security Adviser, InfoWorld...
"Secure your wireless networks. In today's world, there are few valid excuses for not using WPA2, 802.11i, or 802.1x to secure them. Even "guest" networks. Secure them... Use security management tools and scripts to enforce security policy across as many computers as you can. (more)
Wi-Fi Espionage Trick – WiPhishing
Hackers use an authorized SSID to trap mobile professionals into accessing the illegal access point and thus gaining access to information and data... This type of attack can occur when a mobile professional's laptop or PDA has been configured to automatically connect to an access point using an SSID such as Linksys or tmobile. [result] ...they have connected to an unauthorized access point... the connection was made without their knowledge. (more)
Wi-Fi Espionage Trick – Evil Twin
A hacker prevents access to an authorized Wi-Fi access point and re-directs a mobile professional to a false access point where information or access to networks can be obtained by the unauthorized person. The unauthorized user can also gain access to VPN client software. (more)
Solutions:
• Force laptop wireless cards off when plugged into the corporate LAN.
• Force laptops to connect to company authorized wireless LANs only.
• Force laptops to ignore adhoc connections.
All are easy to implement, and will operate automatically.
Solution Resources:
• Full Solution
• Partial Solution
Additional Recommendation:
• Conduct periodic independent Wi-Fi Security Audits which take into account legal compliance. (more)
"Secure your wireless networks. In today's world, there are few valid excuses for not using WPA2, 802.11i, or 802.1x to secure them. Even "guest" networks. Secure them... Use security management tools and scripts to enforce security policy across as many computers as you can. (more)
Wi-Fi Espionage Trick – WiPhishing
Hackers use an authorized SSID to trap mobile professionals into accessing the illegal access point and thus gaining access to information and data... This type of attack can occur when a mobile professional's laptop or PDA has been configured to automatically connect to an access point using an SSID such as Linksys or tmobile. [result] ...they have connected to an unauthorized access point... the connection was made without their knowledge. (more)
Wi-Fi Espionage Trick – Evil Twin
A hacker prevents access to an authorized Wi-Fi access point and re-directs a mobile professional to a false access point where information or access to networks can be obtained by the unauthorized person. The unauthorized user can also gain access to VPN client software. (more)
Solutions:
• Force laptop wireless cards off when plugged into the corporate LAN.
• Force laptops to connect to company authorized wireless LANs only.
• Force laptops to ignore adhoc connections.
All are easy to implement, and will operate automatically.
Solution Resources:
• Full Solution
• Partial Solution
Additional Recommendation:
• Conduct periodic independent Wi-Fi Security Audits which take into account legal compliance. (more)
Monday, November 24, 2008
What could George Lopez, Billy Ray Cyrus and Jackie Chan possibly have in common?
How about a new family comedy titled The Spy Next Door? Reuters is reporting that the three are now in Albuquerque, N.M., as shooting has already begun on the film. (more) (more)
Corporate Espionage: The hack at an all-time high
Criminals are breaking into personal and corporate computers to steal critical information and money. Don't believe it's not serious -- or that it can't happen to you.
If you haven't gotten the memo, the bad guys are after your money or your company's money... Today's malicious hackers (not all of them, but most of them) and their malware creations are out to steal your money or your identity (which is used to steal your money).
If you find malware on your PC...
• back up your data,
• format the hard drive,
• re-install everything,
• change every password or PIN you used on that computer since its last verifiable clean state,
• and actively monitor your bank account and credit report.
Letting an anti-malware program remove the infection and calling it a day is no longer acceptable.
Find out how you and your company can stay safe, even when you're watching the bottom line: "Good security in recessionary times" (more)
If you haven't gotten the memo, the bad guys are after your money or your company's money... Today's malicious hackers (not all of them, but most of them) and their malware creations are out to steal your money or your identity (which is used to steal your money).
If you find malware on your PC...
• back up your data,
• format the hard drive,
• re-install everything,
• change every password or PIN you used on that computer since its last verifiable clean state,
• and actively monitor your bank account and credit report.
Letting an anti-malware program remove the infection and calling it a day is no longer acceptable.
Find out how you and your company can stay safe, even when you're watching the bottom line: "Good security in recessionary times" (more)
Sunday, November 23, 2008
Twitter Stalkers
"Sometimes you want to follow someone on Twitter, but you don't want them to know you're following them. We present to you TweetStalk ‒ the simple way to stalk Twitter users without having to follow them." (more)
Moral - Stop your confidential Twittering!
Moral - Stop your confidential Twittering!
Spies' Demise - November 2008
Iran - An Iranian businessman convicted of spying for Israel has been executed, according to a statement released today by Iran’s judiciary.
Ali Ashtari was reportedly hanged on Monday. The manager of a telecommunications and security equipment company who dealt with the Iranian military... found guilty of cooperating with the Israeli intelligence agency Mossad...
Iranian state TV showed the balding Ashtari calmly giving what was billed as the confession of a Mossad spy. Ashtari reportedly met with Israeli spooks abroad who gave him surveillance technology to monitor high ranking officials in Iran’s Revolutionary Guards.
“The Israeli spies gave him equipment with built in bugs to be sold to high ranking (military) officials so that Mossad could eavesdrop on everything they said on phones and other telecommunication devices,” said an Iranian journalist who asked not to be named. (more)
---
UK - The man accused of murdering former Russian spy Alexander Litvinenko in London said in a British newspaper on Saturday he was prepared to come to Britain to be questioned about the case. (more)
---
China - A London-based rights group said Saturday that China was preparing to execute a Chinese businessman convicted of spying for Taiwan, and urged Beijing to halt the execution. (more)
---
Germany declined to comment on Saturday on reports that three Germans arrested on suspicion of throwing explosives at an EU office in Kosovo were intelligence officers. (more)
---
Isreal - The end of George W. Bush's term in office marks a golden opportunity for the release of Jonathan Pollard, imprisoned in the US for more than 20 years now, his wife Esther wrote in an emotional plea to Prime Minister Ehud Olmert Saturday evening. (more)
---
Iran - Reported was the arrest of Hossein Derakshan, a Canadian-Iranian who pioneered blogging in Iran and was called the "blogfather" there... He returned to his native Iran from his adoptive Canada last month and various media reported his arrest this week. A website reported that Derakshan confessed to spying for Israel. (more)
---
Ali Ashtari was reportedly hanged on Monday. The manager of a telecommunications and security equipment company who dealt with the Iranian military... found guilty of cooperating with the Israeli intelligence agency Mossad...
Iranian state TV showed the balding Ashtari calmly giving what was billed as the confession of a Mossad spy. Ashtari reportedly met with Israeli spooks abroad who gave him surveillance technology to monitor high ranking officials in Iran’s Revolutionary Guards.
“The Israeli spies gave him equipment with built in bugs to be sold to high ranking (military) officials so that Mossad could eavesdrop on everything they said on phones and other telecommunication devices,” said an Iranian journalist who asked not to be named. (more)
---
UK - The man accused of murdering former Russian spy Alexander Litvinenko in London said in a British newspaper on Saturday he was prepared to come to Britain to be questioned about the case. (more)
---
China - A London-based rights group said Saturday that China was preparing to execute a Chinese businessman convicted of spying for Taiwan, and urged Beijing to halt the execution. (more)
---
Germany declined to comment on Saturday on reports that three Germans arrested on suspicion of throwing explosives at an EU office in Kosovo were intelligence officers. (more)
---
Isreal - The end of George W. Bush's term in office marks a golden opportunity for the release of Jonathan Pollard, imprisoned in the US for more than 20 years now, his wife Esther wrote in an emotional plea to Prime Minister Ehud Olmert Saturday evening. (more)
---
Iran - Reported was the arrest of Hossein Derakshan, a Canadian-Iranian who pioneered blogging in Iran and was called the "blogfather" there... He returned to his native Iran from his adoptive Canada last month and various media reported his arrest this week. A website reported that Derakshan confessed to spying for Israel. (more)
---
Friday, November 21, 2008
How spying was done at BexarMet
TX - Secretly recorded phone conversations, snapshots of computer screens and a program that tracked computer keystrokes all were part of a strategy by former General Manager Gilbert Olivares to spy on top managers at Bexar Metropolitan Water District, according to a court document obtained by the San Antonio Express-News...
“This confirms how pervasive this was over there,” said Elliott Cappuccio, an attorney for two employees who have sued BexarMet over the wiretaps...
When the recordings began, Hopkins said he also launched programs on the computers of Morin, Garza and Oranday. The programs captured every computer keystroke and took screen snapshots about every 30 seconds. (more)
“This confirms how pervasive this was over there,” said Elliott Cappuccio, an attorney for two employees who have sued BexarMet over the wiretaps...
When the recordings began, Hopkins said he also launched programs on the computers of Morin, Garza and Oranday. The programs captured every computer keystroke and took screen snapshots about every 30 seconds. (more)
Bank Security Stank - Databanks Shrank
During the past year, banks have lost more of their customers' personal data than ever before. Countrywide Financial may have become a poster child for U.S. financial institutions ruined by poisonous subprime loans--but junk assets, it turns out, weren't the only element of Countrywide's inner workings that were rotten.
So, allegedly, was one senior financial analyst in the company's subprime mortgage division. According to the reports of FBI officials who arrested him in August, 36-year-old Rene Rebollo spent his Sunday nights last summer copying a total of more than 2 million of Countrywide's customer records to a flash drive and selling the data to identity thieves. Rebollo's case isn't as unique as banks would like to believe... (more) (slide show)
So, allegedly, was one senior financial analyst in the company's subprime mortgage division. According to the reports of FBI officials who arrested him in August, 36-year-old Rene Rebollo spent his Sunday nights last summer copying a total of more than 2 million of Countrywide's customer records to a flash drive and selling the data to identity thieves. Rebollo's case isn't as unique as banks would like to believe... (more) (slide show)
Security Tip #413 - Invisible Secrets (Steganography)
Invisible Secrets 4 hides your private data into innocent looking files, like pictures, or web pages.
It also features: strong encryption algorithms; a locker that allows you to password protect certain applications; a password management solution and a real-random password generator; a shredder that helps you destroy beyond recovery files, folders and internet traces; the ability to create self-decrypting packages; secured password transfer.
Version 4.6 features: Windows Vista compatibility. Free trial. (more)
It also features: strong encryption algorithms; a locker that allows you to password protect certain applications; a password management solution and a real-random password generator; a shredder that helps you destroy beyond recovery files, folders and internet traces; the ability to create self-decrypting packages; secured password transfer.
Version 4.6 features: Windows Vista compatibility. Free trial. (more)
Security Tip #412 - Free Laptop Theft Alarm
Afraid that someone will take your laptop?
Now there is a simple and free solution to this problem!
Laptop Alarm will ring a loud alarm if someone will try to steal your laptop!
When the laptop is disconnected from AC-power (someone pulls the AC adapter plug out) or someone removes or moves the USB mouse the alarm will go off. Version 1.2 adds Mouse movement detection. (more)
Grab a coffee.
Watch a thief steal several laptops in broad daylight!
Now there is a simple and free solution to this problem!
Laptop Alarm will ring a loud alarm if someone will try to steal your laptop!
When the laptop is disconnected from AC-power (someone pulls the AC adapter plug out) or someone removes or moves the USB mouse the alarm will go off. Version 1.2 adds Mouse movement detection. (more)
Grab a coffee.
Watch a thief steal several laptops in broad daylight!
Obama's Cellphone Records Breached
Verizon Wireless disclosed late Thursday that several of its employees accessed and viewed President-elect Barack Obama's personal cellphone account, and said it planned to discipline workers for the privacy breach... The company said it has put all employees with access to the account on leave, with pay, as it sorts out which of those workers accessed the account without a justifiable business purpose. (more)
UPDATE: Verizon Wireless has fired an unspecified number of employees it said had accessed President-elect Barack Obama's old cell phone records without permission. The firings ended an internal investigation into the matter. (more)
Moral: Your information... if they want it, they will get it.
How well you protect your information determines how fast they move on to easier prey. Don't look like lunch. Take an information security specialist to lunch. ~Kevin
UPDATE: Verizon Wireless has fired an unspecified number of employees it said had accessed President-elect Barack Obama's old cell phone records without permission. The firings ended an internal investigation into the matter. (more)
Moral: Your information... if they want it, they will get it.
How well you protect your information determines how fast they move on to easier prey. Don't look like lunch. Take an information security specialist to lunch. ~Kevin
Labels:
advice,
business,
cell phone,
data,
employee,
government,
privacy
FutureWatch - 21st Century Loudspeakers
Imagine a loudspeaker that...
• does not use a magnet
• is ultra-thin (nanometer thickness)
• does not vibrate
• is transparent
• is flexible (enough to be made into clothing)
• can be integrated into a computer or TV screen
Welcome to the world of the Transparent Carbon Nanotube Thin (CNT) Film Loudspeaker.
"Ok, so how does it work?" I hear you say.
When AC electricity courses through carbon nanotubes, it creates heat. Unlike conventional speakers which bump air molecules to create a sound wave, CNTs don't move; they change temperature. It is this temperature oscillation which bumps the air molecules, thus creating sound. Heat is soooo cool!
New idea? No, the thermophone was invented before 1886 and was upgraded in the 1920's. It worked, but not very well. Right idea, wrong materials.
It took 21st Century carbon nanotubes to make this flag sing. (flag)
Why are we interested?
Well, hot cool technologies are always intereting. But, our interests are more sinister. Did you know... many conventional speakers can also be used as microphones. This has made for some interesting eavesdropping installations for us to discover. If nanotube speakers have the same capability... the future will be even more interesting for us. Can't wait to test one! ~Kevin
• does not use a magnet
• is ultra-thin (nanometer thickness)
• does not vibrate
• is transparent
• is flexible (enough to be made into clothing)
• can be integrated into a computer or TV screen
Welcome to the world of the Transparent Carbon Nanotube Thin (CNT) Film Loudspeaker.
"Ok, so how does it work?" I hear you say.
When AC electricity courses through carbon nanotubes, it creates heat. Unlike conventional speakers which bump air molecules to create a sound wave, CNTs don't move; they change temperature. It is this temperature oscillation which bumps the air molecules, thus creating sound. Heat is soooo cool!
New idea? No, the thermophone was invented before 1886 and was upgraded in the 1920's. It worked, but not very well. Right idea, wrong materials.
It took 21st Century carbon nanotubes to make this flag sing. (flag)
Why are we interested?
Well, hot cool technologies are always intereting. But, our interests are more sinister. Did you know... many conventional speakers can also be used as microphones. This has made for some interesting eavesdropping installations for us to discover. If nanotube speakers have the same capability... the future will be even more interesting for us. Can't wait to test one! ~Kevin
Thursday, November 20, 2008
FutureWatch - GPS Tracking to be made illegal?
GA - It is now legal for anyone to track someone with a hidden GPS device on a car. Now, one Georgia lawmaker is introducing a new bill to make the practice against the law.
Georgia State Representative Kevin Levitas said after watching a FOX 5 special report, he decided to take action to stop people from following others with a hidden GPS device.
"My law would prohibit a stranger from going up, or even somebody that knows that person, from going up to their car without their consent whether in a public place or private place and placing a GPS tracking device," said Rep. Levitas. (more)
Private Investigators and spouse-spies will be the ones affected most. Corporate espionage types won't care. Doesn't matter. Businesses hire specialists like us to find these things for them.
Georgia State Representative Kevin Levitas said after watching a FOX 5 special report, he decided to take action to stop people from following others with a hidden GPS device.
"My law would prohibit a stranger from going up, or even somebody that knows that person, from going up to their car without their consent whether in a public place or private place and placing a GPS tracking device," said Rep. Levitas. (more)
Private Investigators and spouse-spies will be the ones affected most. Corporate espionage types won't care. Doesn't matter. Businesses hire specialists like us to find these things for them.
Subscribe to:
Posts (Atom)