Sunday, February 22, 2009

Kelly Monroe Turner’s extraordinary eavesdropping device

At 1:07 a.m. on the morning of Oct. 1, 1910, the walls of the Los Angeles Times building succumbed to a immense explosion.

Men, mortar and equipment were dispersed into the night air and a fire erupted. When the dust eventually settled, 21 newspaper employees were dead and 100 others were injured, many seriously.

Newspapers called the tragedy “the crime of the century.”

William J. “Billy” Burns, famed anti-union private detective, was hired to solve the crime...

Burns’ investigation of the dynamiting brought national notoriety to three Terre Haute men: Eugene V. Debs, Frank P. Fox and Kelly Monroe Turner...

The March 30, 1912 issue of “Scientific American” and the Science and Invention section of the June 15, 1912 issue of “The Literary Digest” contained lengthy articles describing Turner’s invention and its use in the case... (Burns extensive use of Dictograph equipment later led to him being investigated for wiretapping.)

Turner, a native of Pimento and later a Terre Haute, Indiana resident, invented the dictograph, an eavesdropping device that “solved the crime” in December 1911 and sent John J. and James B. McNamara, represented by legendary Clarence Darrow, to prison. Placed in the McNamaras’ jail cells, the device “heard” the men admit to the crime...

In the June 1912 issue of “Popular Electricity,” novelist Edward Lyell Fox wrote: “In the past six months the dictograph has revolutionized crime prevention. In walls, under sofas and chairs, in chandeliers, behind desks, beside a window, it is the unseen listener to secret conversations. The secret of prison cells have been tapped, hotel rooms and offices have given up incriminating conversation… It has figured sensationally in the undoing of dynamiters, legislative bribe takers, grafters high and crooks low, across the continent.” (more)

The 100th anniversary of the Dictograph is coming up soon. Turner would be stunned by today's eavesdropping and wiretapping technology. Also stunned are its victims. Make sure you are not one of them. Call me. I have a time-proven (30+ years) protection program waiting to solve your concerns. ~Kevin

Lincoln's spy. In Jefferson Davis' home!

William Jackson was a slave in the home of Confederate president Jefferson Davis during the Civil War. It turns out he was also a spy for the Union Army, providing key secrets to the North about the Confederacy.

William Jackson, a slave, listened closely to Jefferson Davis' conversations and leaked them to the North.

Jackson was Davis' house servant and personal coachman. He learned high-level details about Confederate battle plans and movements because Davis saw him as a "piece of furniture" -- not a human, according to Ken Dagler, (sic) author of "Black Dispatches," which explores espionage by America's slaves...

...slaves who served as spies were able to collect incredibly detailed information, in large part because of their tradition of oral history. Because Southern laws prevented blacks from learning how to read and write, he said, the slave spies listened intently to minute details and memorized them...

Jackson wasn't the only spy. There were hundreds of them... One of the most iconic spies was Harriet Tubman, who ran the Underground Railroad... (more)

Friday, February 20, 2009

Skype in the Crosshairs

Suspicious phone conversations on Skype could be targeted for tapping as part of a pan-European crackdown on what law authorities believe is a massive technical loophole in current wiretapping laws, allowing criminals to communicate without fear of being overheard by the police.

The European investigation could also help U.S. law enforcement authorities gain access to Internet calls. The National Security Agency (NSA) is understood to believe that suspected terrorists use Skype to circumvent detection.

While the police can get a court order to tap a suspect's land line and mobile phone, it is currently impossible to get a similar order for Internet calls on both sides of the Atlantic. (more)

MP3 Player Doubles As SpyCam

from the seller's web site...
"The common Mini MP3 Player, which comes with other useful and powerful features. This Player is included a camera and a mic, which can be used as a video camera recorder, voice recorder and still image camera." $46. (
more)

Thursday, February 19, 2009

Business Espionage - Secret Windows OS Stolen

Australia - An unnamed Telstra executive has sparked a major security scare at Microsoft after a phone loaded with a secret upcoming version of the Windows Mobile operating system was stolen out of his pocket in Spain.

The phone belonged to Telstra chief executive Sol Trujillo, who was testing the device before its release at the end of the year, News Ltd reported. But a spokesman for the telco would not confirm this.

The spokesman said the phone - developed by HTC and loaded with Microsoft's top-secret Windows Mobile 6.5 operating system - was in the possession of another unnamed Telstra executive at the time of the theft.


The incident could have serious implications for Microsoft as Windows Mobile 6.5 has hardly been touched by anyone outside the company and high-level telco executives.


Leaks regarding the features and early bugs in the software could mar its launch, which would be damaging as Microsoft is pinning its hopes on Windows Mobile 6.5 to give it an edge over new competitors such as the iPhone and Google's Android operating system. (
more)

Job opportunity...
Telstra is the Australian telephone company. They are probably looking for a new assistant to the president.

Security opportunity...
This loss might have been preventable. Hire a good counterespionage consultant to help protect your company's intellectual property and detect electronic surveillance (eavesdropping, wiretapping and data theft).
Contact me for recommendations, worldwide. ~Kevin

This unfortunate high-value loss was forwarded to us by Jayde Consulting in Australia.
"Jayde Consulting provides professional and discrete services to protect sensitive, confidential and commercially valuable information from electronic eavesdropping, surveillance and espionage."

Credit card numbers stolen... blah, blah, blah.

We hear it every day.
Here we go again...


Hackers broke into a computer at Wyndham Hotels and Resorts last July and stole tens of thousands of customer credit card numbers, the hotel chain warns.


The break-in occurred at a property belonging to a Wyndham franchisee, but that computer was linked to other company systems. "That intrusion enabled a hacker to use the company server to search for customer information located at other franchised and managed property sites," the company said in a statement disclosing the breach.

The data was then uploaded to a Web site during July and August of 2008, Wyndham said. The company estimates that 41 Wyndham hotels and resorts were affected by the breach before it was discovered by the company's information security team in mid-September. (more)

Is data theft preventable?
Lots of people think so.
Explore the solutions being offered...
Voltage Security
PGP Corporation
Protegrity
TriGeo

Make your phone lie.

People are making Caller ID lie for them... "Spoofcard allows me to make my calls truly private. I can display any number on the Caller ID, record my calls and change my voice." Try it yourself. Free. (more)

Make your phone confess.

Hate blocked Caller ID calls?
Force a confession out of them.

Here's how...

"Trapcall will unblock and reveal the actual caller ID (and name) when a call has been blocked. No software or download needed! ...Record all of your incoming calls! ...Read your voicemail messages via SMS while in a meeting, class, movie or other busy area! ...Block unwanted callers! ...Billing name and address!"

Try it out. Free. (more)

FutureWatch - The 10 Trillion Bit, 2-Bit Drive

Keeping track of your data will become soon more difficult...
Ting Xu, a professor at the University of California, Berkeley and Thomas Russell, a professor at the University of Massachusetts at Amherst, have created a technique that could, theoretically, pack a disk the size of a quarter with 10.5 terabits (more than 10 trillion bits) of data, the equivalent of 250 DVDs. (more)

Until then, we can still cram a lot of data into a Murray Associates Spy Coin. They are going fast. Find out how you can get one. (more)

Wednesday, February 18, 2009

"Holy Firewall, Splatman!"

New data shows businesses may be clueless about proxy abuse in their organizations...

Schools long have struggled with savvy students who run anonymous Web proxy tools to bypass Web filters and secretly access banned Websites and content. But the use of these potentially dangerous tools within the enterprise appears to be more widespread than was once thought.

A new study released today indicates that businesses may be clueless about the breadth of the problem: While 15 percent of IT managers report that Web filter bypass tools are in use in their organizations, it turns out that these tools are actually in use in three out of four organizations, according to FaceTime Communications, which polled both IT managers and its own customers on the topic.

"In some cases, the perception is not reality," says Frank Cabri, vice president of marketing and product management for FaceTime, whose customers provided the actual usage data in the study. "This doesn't surprise us -- but the difference [in perception and reality] is dramatic." (more)

"...employee use of Web 2.0 applications such as Instant Messaging, IPTV, VoIP and Social Networking on corporate networks exceeds IT estimates by up to 10 times." (more)

Why is all this important to you?
• Your IT folks are not seeing this end run. ($)
• You are probably paying your employees to surf, not work. ($$)
• It is an open back door to your intellectual property. ($$$)

You know it's a bad law when...

Swedish intelligence official quits over wiretapping law...

Sweden - Anders Björck, a high-ranking Moderate Party politician and former defence minister has resigned from his post as head of Sweden’s intelligence oversight agency in protest against the country’s controversial wiretapping law... because he lacks confidence in the new surveillance measure which came into force January 1st... "I've thought it over carefully. The laws and the oversight activities now under consideration don’t foster privacy or efficacy." (
more)

Greek Olympic Committee President Bugged

via WhiteSparks...
Greek police are investigating the discovery of an object they believe could be a covert listening device in the Athens office of Greek Olympic Committee president Minos Kyriakou.

In a statement released on Friday, Attica regional police confirmed they had been called to Kyriakou's office late on Thursday evening.

"In the evening hours of February 5, 2009 our service was informed about the existence at the office of the president of the Hellenic Olympic Committee of a suspicious object that appeared like a microphone for monitoring conversations," the statement said.

"The police were requested to investigate the incident. The object was collected and was forwarded for further examination, the result of which is still pending."

The investigation comes less than a week before the election for the new president of the committee which Kyriakou is contesting with Spyros Kapralos, the chairman of the Athens Stock Exchange. (more)

WhiteSparks is a free email newsletter sponsored by WhiteRockGlobal, a premier TSCM consultancy located near London. Contact them for a subscription: whitenews@whiterockglobal.com

Sneaky USB Flash Drives

Sneaking spyware in to plant on your computers?
Sneaking company secrets out from their computers?
Recording your private meetings?
Whatever the goal, drive-by spy devices are becoming harder to catch; especially USB drives.

Here is a quick update so you will know it when you see it.


from the seller's website...
Surveillance style pen containing a micro sized video camcorder with 4 GB of memory. Get the mission completed with this awesome secret agent DV pen, often called a "spy pen" in the trade.

Sitting in your shirt pocket, standing in the pen cup or lying on the desk, no-one will ever notice as you secretly capture their every move. The built in flash stores the video until it is ready to be downloaded to a computer via USB, and with 4GB's of memory you can record hours of surveillance or interviews in between trips back to the office. (more with video)

All metal cross shaped necklace containing an 8 GB USB flash drive.

These days a USB flash drive is as necessary as your house keys. Whether you are taking large work files back and forth from the office or are sharing pictures and music with friends, nothing beats the convenience of a USB thumb drive. Well, why not make sure yours fits the person you are? This is a elegant all-metal cross that has a built in 8GB's of memory so you should have space to keep in its heart. (more)

All metal heart shaped necklace containing an 8 GB USB flash drive.

These days a USB flash drive is as necessary as your house keys. Whether you are taking large work files back and forth from the office or are sharing pictures and music with friends, nothing beats the convenience of a USB storage drive. Well, why not make sure the one you get fits the person who is going to carry it? This is an elegant all-metal and jeweled heart necklace that has a built in 8GB's of memory so you or your loved one will have enough space to keep those treasured memories close at heart. (more)

Realistic looking watermelon containing 8GB of USB flash memory. If you want more than to just plug your old fashioned USB stock in, this novelty USB memory stick that is right up your alley. Just remove the tip to reveal the USB connection, and watch people gape at your one of a kind computer accessory. (more)

Does someone near you always seem to know who's calling you?

Perhaps they have one of these... linked to your cell phone.

Bluetooth bracelet with vibration function and caller ID display.

Spybusters Tip # 429 - Keep Bluetooth turned off when not in use. (more)

Monday, February 16, 2009

Business Espionage - Spanish Spies, Fruit Flies

Throughout the world, Israel is considered a superpower when it comes to the development of new citrus fruit species, but now, Israeli farmers are accusing their Spanish counterparts of stealing a new species, and have recently filed a lawsuit against them. Commercial spying attempts have lead the developers of the new species to grow their fruits in hidden fields , "but afterwards the species grew in an open orchard," said Chai Benyamini, secretary-general of Israel's Citrus Growers’ Association.

"The Spanish send people who enter the orchard for a minute, cut off a citrus branch from the new species, and send it to Spain, and this is how we lose some NIS 200,000 ($48,900) a year," he explained.

The main species in question is a new breed of tangerine, called Or, that was developed in Israel and has been patented. (
more)

Moral: Every business is an espionage target. It's the money. Doesn't matter if your selling Testarossa's or tangerines — you are a target.

Make counterespionage part of your business security program.
We can help.