An innovator, Robert Wood who is an assistant professor at Harvard University is developing robotic flies. New kind of fabrication process is used in that tiny robot. The functionality of bending folding and stretching will be made possible by the help of polymer and nano carbon fibers. Using these techniques Wood made the world's tiniest robot capable of flying freely and taking pictures. This nano technology can used to make crawling, swimming and jumping bugs. (more)
Sunday, May 23, 2010
The IT Girls
A study of British middle-aged couples found that 14% of wives spy on their husband’s emails, 13% read their mobile phone text messages and 10% check web browser logs. This is roughly twice the level of spousal spying that is found among men. Women are also far better at it than men, the researchers found. It appears that some women develop their IT skills simply to improve their surveillance techniques. (more)
Sex tape scandal spurs wiretapping phobia among deputies
Turkey - With the recent posting online of footage showing former Republican People’s Party (CHP) leader Deniz Baykal with a deputy from his party in an intimate setting, more and more politicians are taking measures against surveillance devices in their offices.
Many deputies are now using the 10-day break in Parliament to clean up their chambers in order to see if there are any bugs or other monitoring devices inside the room. Some have installed jammers or other preventive devices.
More than 75 deputies have employed “hunter” systems to detect hidden cameras and microphones. Fifty deputies have ordered jammers from the Tayama Security Company alone, according to executives at the company, which earlier briefed deputies in Parliament on installing such systems. They also said many deputies took these devices wherever they went. The company sells this system for $700. Parliament officials say other deputies have turned to other companies. (...for professional TSCM sweep services. These are the smart deputies. Save a spot on YouTube for the ones who bought the gadgets.) (more)
Many deputies are now using the 10-day break in Parliament to clean up their chambers in order to see if there are any bugs or other monitoring devices inside the room. Some have installed jammers or other preventive devices.
More than 75 deputies have employed “hunter” systems to detect hidden cameras and microphones. Fifty deputies have ordered jammers from the Tayama Security Company alone, according to executives at the company, which earlier briefed deputies in Parliament on installing such systems. They also said many deputies took these devices wherever they went. The company sells this system for $700. Parliament officials say other deputies have turned to other companies. (...for professional TSCM sweep services. These are the smart deputies. Save a spot on YouTube for the ones who bought the gadgets.) (more)
Saturday, May 22, 2010
GSM Bug Prices Continue to Drop!
A few months ago, we found GSM bugs being sold on ebay in the $19-$60 range. Today, direct-from-the-manufacturer samples are advertised for $13.05. (Quantity pricing is even lower.)
Finding these normally dormant eavesdropping bugs is problematic. Digital Surveillance Location Analysis™ (DSLA™) is one very effective detection technique.
Business executives – You can no longer skate on the chance that one of these won't end up in your Boardroom.
Quarterly eavesdropping detection audits are more important than ever. Be sure your TSCM provider is aware of this new threat, and can effectively deal with it. (Click graphic to enlarge it.)
An Old Score Settled
Italy - Italian magistrates and media are up in arms over a government attempt to restrict wiretaps and slap fines and jail sentences on newspapers that publish transcripts, saying it will help criminals and muzzle the press.
While the centre-right coalition of Prime Minister Silvio Berlusconi says it wants to protect privacy, the opposition says the government is just scrambling to cover up widespread corruption in its ranks with yet another tailor-made law...
The bill languished in parliament for months. But the government quickly dusted it off after newspapers published leaked transcripts from a high-profile graft probe into public work contracts that has tainted Berlusconi's cabinet. (more) (background)
Quote of the Week - The BugNets are Coming
"Remote surveillance is a significantly invasive threat, arguably even more so than identity theft. As it stands now, most vulnerable devices (mobile devices and computers) do not have the protection necessary to distinctly address microphone or camera hijacks. As a growing number of mobile devices with exploitable operation systems gain more reliable Internet access, this long standing problem is reaching a critical potential."
from Roving Bugnet: Distributed Surveillance Threat and Mitigation
by Ryan Farley and Xinyuan Wang
by Ryan Farley and Xinyuan Wang
Mobile Phone Eavesdropping - The Next Level
Imagine sitting in a café and discussing the details of a business proposal with a potential client. Neither you nor the client has a laptop; you're just two people having a conversation. But unbeknownst to you, someone half a world away is listening to every word you say. Later, as you leave, you receive a text message referring to the proposal and demanding money in exchange for silence.
Recent research from two universities suggests that such a remote-eavesdropping scenario may soon be possible.
According to George Mason University researchers Ryan Farley and Xinyuan Wang, cell phones make excellent surveillance devices for remote snoops. In a paper, Farley and Wang discuss a "modernized mic hijacker" [PDF] that an attacker could control over what they call a "roving bugnet." The eavesdropper would use a piece of malware called a "bugbot" to listen in on in-person interactions via a nearby smartphone or laptop. Such attacks would be more likely to target specific people (a wayward spouse, say) than to play a role in widespread attacks on the general public. (more)
Thursday, May 20, 2010
Commercial Quantum Cryptography System Hacked
It is supposed to be absolutely secure – a means to transmit secret information between two parties with no possibility of someone eavesdropping.
Yet quantum cryptography, according to some engineers, is not without its faults. In a preprint submitted late last week to arXiv, Hoi-Kwong Lo and colleagues at the University of Toronto, Canada, claim to have hacked into a commercial quantum cryptography system by exploiting a certain practical “loophole”.
So does this mean high-profile users of quantum cryptography – banks and governments, for example – are in danger of being eavesdropped after all? (more)
Don't even think of saying "pampas ass."
The mayor of the Argentine capital, Buenos Aires, has been indicted on charges of illegal wiretapping of citizens including political and business leaders.
Mauricio Macri has allegedly authorized the secret recordings of many individuals, including politicians and business moguls, in the 1990s...
Mauricio Macri has allegedly authorized the secret recordings of many individuals, including politicians and business moguls, in the 1990s...
Despite his indictment, Macri says he will not resign. (more)
Cordless Phone Question
via The Journal Times...
When we're using cordless phones, can others pick up our conversations?
"Yes, depending on the kind of phone you use," according to a fact sheet from the Privacy Rights Clearinghouse, a nonprofit consumer-oriented group based in California. "In most cases, your cordless phone conversations are probably overheard only briefly and accidentally. But there are people who make it a hobby to listen to cordless phone calls using radio scanners."
Analog phones, which include most older ones, are more susceptible to eavesdropping. Nothing's a guarantee, the mildly paranoid-sounding fact sheet points out, but newer digital models often have better built-in security features.
Those include channel hopping, which constantly changes the frequency during a call, and more complicated stuff known as digital spread spectrum technology (DSST) and digital enhanced cordless technology (DECT). (more)
I created life... and I own it!
Scientists for the first time have created a synthetic cell, completely controlled by man-made genetic instructions, which can survive and reproduce itself, researchers at the private J. Craig Venter Institute announced Thursday. Created at a cost of $30 million, the experimental one-cell organism opens the way to the manipulation of life on a previously unattainable scale.
Synthetic Genomics, a company founded by Dr. Venter, funded the experiments and owns the intellectual property rights to the cell-creation techniques. (more)
Synthetic Genomics, a company founded by Dr. Venter, funded the experiments and owns the intellectual property rights to the cell-creation techniques. (more)
Hope they have a good counterespionage strategy. They will need it.
Monday, May 17, 2010
Testimonial - The Photocopier Security Problem
"Regarding photocopier security, I recovered 8,308 files from a high-capacity Xerox copier in the summer of 2008. The copier was several years old, shared by perhaps two dozen employees, and had a 4 gigabyte IDE hard disk. I recovered both scanned and photocopied TIFF images from user activity as well as TXT, HTML, DOC, PDF, and GIF files. I also recovered about 900 email addresses and file names." ~ from a newsgroup posting this week by a professional electronic evidence recovery specialist.
Photocopier security is only one element of an overall counterespionage strategy. If your organization does not have one. (Or, if you are not sure of the effectiveness of your current one.) Please engage the services of an independent counterespionage security consultant. Don't know where to find one? Click here for a jump start.
Saturday, May 15, 2010
How Do They Do It - Cracking Your Wi-Fi
In China, they sell full Wi-Fi hacking kits.
Any teckie can cobble together their own...
Any teckie can cobble together their own...
"The main piece of the kits, an adapter with a six-inch antenna that plugs into a USB port, comes with a CD-ROM to install its driver and a separate live CD-ROM that boots up an operating system called BackTrack. In BackTrack, the user can run applications that try to obtain keys for two protocols used to secure Wi-Fi networks, WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access). After a successful attack by the applications, called Spoonwep and Spoonwpa, a user can restart Windows and use the revealed key to access its Wi-Fi network." (more) (videos)
Subscribe to:
Posts (Atom)