Taiwan - The Criminal Investigation Bureau (CIB) turned over three suspects to prosecutors yesterday for their allegedly marketing illegal bug devices.
The bureau arrested the three men surnamed Lee, Lin, and Chen after confiscating 197 sets of cutting-edge bugging instruments imported mostly from China.
The three admitted that they had been selling the instruments in their high-tech gadget stores located in Taipei City and adjacent Taipei County as well as through auction stores on the Internet.
The highly sensitive devices were in various forms like wristwatches, cigarette lighters, ballpoint pens, or buttons. (more)
Monday, September 7, 2009
Posted code enables VoIP spying
Along with keyloggers that track what you type, now we have to worry about malicious software that listens in on our voice over Internet Protocol conversations. A Symantec security blog disclosed a new Trojan horse, Tojan.Peskyspy "that records VoIP communications, specifically targeting Skype."... Eavesdropping is a risk, when it comes to industrial espionage, prying spouses or significant others, and political campaigns, as well as political dissidents. (more)
Quote of the Day
"In essence, unless the company premises have been swept for bugs, there’s no guarantee that somebody hasn’t been listening in to your conversations regarding sensitive issues. This could of course result in information regarding the company’s products or services being leaked to competitors in the field. Of course not many corporate managers like to acknowledge the fact that this could happen but the truth is; it can and does happen." - Jacques Amaya, The Tech Edition
SpyCam Story #552 - The Neighbor
FL - The Smith family was under surveillance. Every day. Every time they stepped outside their house. "We feel very violated and afraid," said Carol Smith, speaking for her husband, Terry, and their children.
The source of their fear is Timothy Dederick, with whom they had a long-running dispute over a fence on the boundary between their two properties on Evergreen Drive.
Dederick installed a sophisticated video and audio surveillance system with at least six cameras pointed right at the Smiths' home, authorities said in an affidavit. He was also listening to and recording their conversations.
When Dederick did that, authorities say, he committed a felony... (more)
The source of their fear is Timothy Dederick, with whom they had a long-running dispute over a fence on the boundary between their two properties on Evergreen Drive.
Dederick installed a sophisticated video and audio surveillance system with at least six cameras pointed right at the Smiths' home, authorities said in an affidavit. He was also listening to and recording their conversations.
When Dederick did that, authorities say, he committed a felony... (more)
FutureWatch - SenseCam, your auto diary

Unlike a regular digital camera or a cameraphone, SenseCam does not have a viewfinder or a display that can be used to frame photos. Instead, it is fitted with a wide-angle (fish-eye) lens that maximizes its field-of-view. This ensures that nearly everything in the wearer’s view is captured by the camera, which is important because a regular wearable camera would likely produce many uninteresting images.
SenseCam also contains a number of different electronic sensors. These include light-intensity and light-color sensors, a passive infrared (body heat) detector, a temperature sensor, and a multiple-axis accelerometer. These sensors are monitored by the camera’s microprocessor, and certain changes in sensor readings can be used to automatically trigger a photograph to be taken.
(more) (video)

Double Agent Spyware
Parents who install a leading brand of software to monitor their kids' online activities may be unwittingly allowing the company to read their children's chat messages — and sell the marketing data gathered.
Software sold under the Sentry and FamilySafe brands can read private chats conducted through Yahoo, MSN, AOL and other services, and send back data on what kids are saying about such things as movies, music or video games. The information is then offered to businesses seeking ways to tailor their marketing messages to kids. (more)
Software sold under the Sentry and FamilySafe brands can read private chats conducted through Yahoo, MSN, AOL and other services, and send back data on what kids are saying about such things as movies, music or video games. The information is then offered to businesses seeking ways to tailor their marketing messages to kids. (more)
Joseph Finder - Fiction is just his cover

Is it paranoia if they’re really out to get you?
by katknit
"Corporate espionage is not one of my areas of interest, but this audio book was a gift, so I listened. I have to say, right off, that Finder knows how to write suspense. Adam is a likable protagonist, a young guy entrapped by his own naivete into an untenable predicament. What he finds himself doing, however, is sleazy. As a self-professed slacker, Adam at first feels no compunction about spying, the apparent rewards of his secret mission fueling his need to impress his hypercritical father. But in a matter of days, he finds himself drawn to the CEO of the company he’s meant to undermine, and suddenly, he’s caught in the jaws of a dilemma. For the first time in his life, Adam is forced to grapple with very real and difficult questions of morality. Falling in love only complicates the situation. Ruthless and arrogant CEO’s, high tech spy gadgets, ethical conundra, and gradually escalating danger make for a compelling story, whatever the setting. Finder’s characters are well drawn, although on occasion he goes overboard with types (i.e. Adam’s father and CEO Wyatt.) This thriller came as a pleasant surprise, gripping in spite of its business background." (source)
If this anonymous reviewer only knew...
Paranoia
Joe's latest novel, Vanished
More novels by Joe Finder
Friday, September 4, 2009
How Team of Geeks Cracked Spy Trade
From a Silicon Valley office strewn with bean-bag chairs, a group of twenty-something software engineers is building an unlikely following of terrorist hunters at U.S. spy agencies.
One of the latest entrants into the government spy-services marketplace, Palantir Technologies has designed what many intelligence analysts say is the most effective tool to date to investigate terrorist networks. The software's main advance is a user-friendly search tool that can scan multiple data sources at once, something previous search tools couldn't do. That means an analyst who is following a tip about a planned terror attack, for example, ... (more)
To my security colleagues...
Need a job?
They are looking for an
Information Security Officer.
One of the latest entrants into the government spy-services marketplace, Palantir Technologies has designed what many intelligence analysts say is the most effective tool to date to investigate terrorist networks. The software's main advance is a user-friendly search tool that can scan multiple data sources at once, something previous search tools couldn't do. That means an analyst who is following a tip about a planned terror attack, for example, ... (more)

Need a job?
They are looking for an
Information Security Officer.
Wannabeanextra Tip: Crusie + Diaz = Spy Flick


Counterintelligence Agent - Essential Knowledge

A career in espionage is easily one of the most coveted of al

Who should be on a top 15 spies list?
The question is open to debate. If your favorite didn't make the list, send me their name. I will add them below...
Eli Cohen, an Israeli spy. He is celebrated as a hero in Israel because he has been credited with being a deciding factor in the outcome of the Six-Day War. Caught when his radio transmissions - from Syria to Israel - were detected. (more) (more)
Facebook, Twitter Revolutionizing How Parents Stalk Their College-Aged Kids
For those of you in the US...
Enjoy the holiday weekend and the last few days of summer.
Here to play off the Security Scrapbook - Summer Edition
is The Onion's news team.
Spoof or brilliant idea?
You decide.
(Alternate play off ending.)
Enjoy the holiday weekend and the last few days of summer.
Here to play off the Security Scrapbook - Summer Edition
is The Onion's news team.
Spoof or brilliant idea?
You decide.
(Alternate play off ending.)
Thursday, September 3, 2009
"Yes We Can”
via PCWorld.com...
The chorus of folks singing "meet the new boss, same as the old boss" just got a little bigger and louder yesterday, after the Obama Administration issued "new" rules for border laptop searches that bear an uncanny resemblance to the old rules. (more)
q.v. "Obama's cookies may not go down so easy"
PCWorld's point...
"If you care about your data, leave your laptop at home."
FutureWatch...
The chorus of folks singing "meet the new boss, same as the old boss" just got a little bigger and louder yesterday, after the Obama Administration issued "new" rules for border laptop searches that bear an uncanny resemblance to the old rules. (more)
q.v. "Obama's cookies may not go down so easy"
PCWorld's point...
"If you care about your data, leave your laptop at home."
FutureWatch...

ET, Spy Phome

This is the telephone that detects motion and silently calls whatever number you desire, allowing you to monitor the sound in the room.
It's microphone allows you to listen in on sounds and conversations, enabling you to verify if it's just your cleaning service, a neighbor watering your prized orchids, or a more nefarious plot. Ideal for use in vacation homes or any time you are away, the phone looks like a typical corded telephone and plugs into a standard telephone outlet, requiring no service fees.
It has a sensitive motion detector; when you position it to face a doorway or window and someone triggers the detector, the phone will automatically call any number your enter and let you listen. It also functions as a normal telephone. 8" L x 3" W x 3" D. (11/2 lbs.) Item 77276 $59.95 (more)
Tuesday, September 1, 2009
Spy Pen May Kill $27 Billion Lawsuit

The videos, together with audio recordings obtained by businessmen using watches and pens implanted with bugging devices, appear to implicate Ecuadoran officials and political operatives, including possibly Juan Núñez, the judge overseeing the lawsuit, and Pierina Correa, the sister of Ecuador’s president, Rafael Correa...
The recordings, which Chevron placed on its Web site, are the latest twist in a 16-year legal battle over oil contamination of jungle areas in northern Ecuador. (more)
No kidding! Two hours of covert surveillance video (in Spanish with English sub-titles), with .pdf transcripts, are on Chevron's Web site. A real-life corporate sting. Fascinating.
Think they were using high-tech, expensive surveillance devices?
Think again...
Watch the recordings made with aSpyder Agent Watch purchased out of the SkyMall catalog, and a SkyMall Pen 1: "Sky Mall, Spyer Agent Watch" (Recordings and watch no longer on site.)
Recording 2: "Sky Mall, Spyer Agent Watch" and "Sky Mall, Spy Pen"
Recording 3: "Sky Mall, Spyer Agent Watch" and "Sky Mall, Spy Pen"Recording 4: "Sky Mall, Spyer Agent Watch"
Watch: $149.95
Pen: $149.99
Look on Judge's face: Priceless
Why is this important to you?
Cheap, effective, surveillance gadgets can easily be turned against you and your company.
In this case, a $3 million dollar bribery scheme is revealed, and a $27 billion lawsuit may be lost.
Imagine the damage electronic eavesdropping could do in your business.
Bugs, taps, video and voice recorders provide extreme leverage. For less than the cost of a good dinner out with friends, fortunes can be moved and careers wrecked.
Recommendation: Get a good counterespionage specialist on your team, today.
Two History Spy Mysteries
Mystery 1
Could world-changing series of events in the last century have been influenced by an American president's mistress?
That's one question posed in Cleveland attorney and writer Jim Robenalt's book "The Harding Affair: Love and Espionage during the Great War
." The book deals with (Warren G.) Harding's 15-year affair with Carrie Phillips, the wife of a prominent Marion businessman, and suggests that Phillips may have become a German spy.
The author also questions whether Phillips convinced Harding not to run for the presidency in 1916, which could have affected the United States' involvement in World War I as well as events that later influenced Nazi leader Adolph Hitler's rise to power. (more)
Mystery 2
Was this beekeeper a spy for Stalin?
Dorothy Constance Galton, a university secretary and bee keeper, was investigated by security services who believed she was acting as a go-between for Stalin, secret files disclose.
Galton also came to the attention of the notorious double agent Kim Philby at MI6 who wanted to know what Security Service knew about her.
Her file shows she visited Leningrad on the SS Sibier in August 1934, and by January 1935 was working at London University and had been elected as a delegate from the Association of Women Clerks and Secretaries. (more)
Could world-changing series of events in the last century have been influenced by an American president's mistress?
That's one question posed in Cleveland attorney and writer Jim Robenalt's book "The Harding Affair: Love and Espionage during the Great War
The author also questions whether Phillips convinced Harding not to run for the presidency in 1916, which could have affected the United States' involvement in World War I as well as events that later influenced Nazi leader Adolph Hitler's rise to power. (more)
Mystery 2

Was this beekeeper a spy for Stalin?
Dorothy Constance Galton, a university secretary and bee keeper, was investigated by security services who believed she was acting as a go-between for Stalin, secret files disclose.
Galton also came to the attention of the notorious double agent Kim Philby at MI6 who wanted to know what Security Service knew about her.
Her file shows she visited Leningrad on the SS Sibier in August 1934, and by January 1935 was working at London University and had been elected as a delegate from the Association of Women Clerks and Secretaries. (more)
Subscribe to:
Posts (Atom)