Thursday, July 22, 2010

Ireland - Louis Walsh has had his phone hacked by an employee of his service provider.

The X Factor judge was shocked to discover that much of his personal information had been accessed and speaking to The Irish Star newspaper he confirmed that gardai have been informed.

“I knew nothing about it at all until the boss of the company contacted me.” Walsh said. 

Revealing that Irish TV presenter and model Glenda Gilson had also been the victim of the same person Louis added: “It just makes me wonder how much of this is going on all the time.” 

“I don’t know how much personal information he managed to gather or how long it was going on. It makes me wary of exchanging confidential information by phone and yet its hard to avoid given the nature of this business.” (more)

NSA Insights

Thursday, 5 August; 12 noon – 1 pm
Washington, DC

Book signing! 
In The Secret Sentry, Matthew M. Aid traces the growth of the National Security Agency from 1945 through critical moments in its history, including the Cold War and its ongoing involvement in Afghanistan and Iraq.

Aid, a visiting fellow at the National Security Archives, explores the agency’s connection to the intelligence failure that occurred when evidence that NSA officials called “ambiguous” was used as proof of Iraqi WMD capability. He also details the intense debate within the NSA over its growing role under the Bush administration to spy on U.S. citizens. Don’t miss this overview of the dramatic evolution of this far-reaching spy agency.

Free! No registration required!
Join the author for an informal chat and book signing.
Can't make it? Buy the book here!

CIA applicant's arrest tops wave of China spy cases

A young Michigan man was quietly arrested last month and charged with lying on a CIA job application about his connection with Chinese intelligence, a case that drew virtually no attention outside his home state.

Glenn Duffie Shriver, 28, of Georgetown Township, Mich., tried to conceal $70,000 in payments from the Beijing government and denied his “numerous” meetings with Chinese intelligence officials, according to the government’s indictment.

Shriver’s arrest on June 22 is just the latest in a virtual tsunami of prosecutions against suspected Chinese agents in the past two years. Many cases are hidden and ongoing... more than 40 Chinese and American citizens have been quietly prosecuted -- most of them successfully -- on espionage-related charges in just a little over two years... a compendium of successful federal prosecutions involving espionage and espionage-related charges against Chinese agents... The list revealed that the Justice Department had convicted 44 individuals in 26 cases since March 2008, almost all of whom are now serving time in federal prisons. (more) (music to applaud by)

Wednesday, July 21, 2010

Bail for Bug Killer Spy?

MA - A federal judge in Worcester is pondering whether to grant bail to a 45-year-old Westborough man who, in a highly unusual case, is accused of economic espionage for allegedly sending trade secrets about insecticides to China.

Kexue Huang faces a dozen counts of economic espionage to benefit a foreign government or instrumentality, as well as five counts of interstate or foreign transport of stolen property.

Assistant US Attorney Scott Garland said only six or seven people had ever been charged with the crime. He said the value of the information that Huang allegedly passed on exceeded $100 million. (more)

Sounds outrageous, but in fairness, bail is only meant to assure the accused shows up for trial. In the article his lawyer mentions, "...his client had a wife and two children in Marlborough and they would all be willing to give up their passports as well as use the $275,000 to $300,000 equity in their home to secure his bail. "It's hard to picture the whole family moving without passports to Canada or any other foreign country," he said. "It's unlikely they would be on the lam for more than 10 minutes. ... This is a responsible person, a well-educated person [with] a good job, assets."

Really? Accused spies have a habit of evaporating recently. (more)

Tuesday, July 20, 2010

Your Very Own "Ex" Files

What do you do when your 'ex' pops up in your Web browser like a nightmare jack-in-the-box?

Create an "Ex" file!
Ah, privacy and sanity restored.
Stalkers are disposed, one "Ex" at a time.
Reduced chance of post-break-up remorse.
It's easy. It's free. It's a no-brainer that zaps your old no-brainers to the bit bin of your Internet world window.

Monday, July 19, 2010

When correctly viewed, Everything is lewd. (I could tell you things about Peter Pan, And the Wizard of Oz, there's a dirty old man!)


CA - An Orange County man is expected to enter pleas in federal court to charges he hacked into hundreds of computers to extort sexually explicit videos from women and teenage girls. 

Prosecutors say 31-year-old Luis Mijangos of Santa Ana is due in a Los Angeles courtroom today. A 16-count indictment charges him with conspiracy, mail fraud, aggravated identity theft, extortion, wiretapping and other charges.

Mijangos allegedly tricked about 230 people into downloading a virus that allowed him to take over their personal computers.

Prosecutors say Mijangos looked into computers for sexually explicit pictures, then threatened to e-mail the files to victims' mailing lists to coerce them into sending him videos of them engaged in sex acts. (more) (Smut)

Spies Escaping (shocking)

A Lebanese man suspected of spying for Israel successfully escaped from Lebanon to Israel on Friday by crossing the border near Bint Jbeil, the Lebanese newspaper A-Nahar reported on Sunday. (more)

The alleged paymaster of a Russian spy ring in the United States spoke no more than necessary. He stayed in modest hotels and dressed for the Mediterranean heat: shorts and untucked shirts. He wore spectacles and a clipped mustache. Just another foreign tourist on a budget, it seemed, in a waterfront city in Cyprus where foreign tourists on budgets are a summertime fixture.

To American officials, the man identified as Christopher Robert Metsos is the spy who got away, a footloose operative who funneled money to U.S.-based accomplices, 10 of whom are in custody. Metsos, the FBI says, was a key player in an underworld of coded instructions, false identities, buried banknotes and surreptitious bag swaps.

“If you saw him on the road, you would say, ‘Good morning’ and you would keep walking,” said Michael Papathanasiou, a lawyer who represented Metsos until he jumped bail in Larnaca last week. “There was really nothing strange about him. He was a very normal, usual guy.” (more)

CALEA VoIP Taps In

The FCC has been moving to treat broadband Internet the same as phone services and with those moves, the FBI's wiretapping authority might be becoming more nebulous.

The agency is lobbying the communications commission to make sure its changes in regulation do not hinder the Communications Assistance for Law Enforcement Act which demands that telecom companies allow law enforcement to use wiretaps on phone lines and VoIP calls.

VoIP wiretapping has been challenged in court a few times unsuccessfully, but changes in regulations could hinder wiretap efforts. It seems like at this moment, however, the FCC has no plans to interfere with the wiretapping rules. (more)

Sunday, July 18, 2010

Bizarre Tale of Cop v. Cop

NY - A retired police officer claims that his next-door neighbor, also a cop, stalked and threatened him, falsely accused him of being a pedophile, and illegally wiretapped his computer. He claims that the intrusive cop, Monroe County's first deputy trained in computer forensics at Quantico, Va., was convicted of felony eavesdropping and misdemeanor official misconduct. (long but interesting)

Saturday, July 17, 2010

"Now Hear This!" by Winston Arrington - Available again!

Now Hear This! Electronic Eavesdropping Equipment Designs by Winston Arrington - Sheffield Electronics - 1997 (NOS)
(Click pictures to enlarge.) 
Winston Arrington's electronic eavesdropping and countersurveillance design book is available again. 

Technically excellent, with some very unusual designs, it contains about 125 schematics; all may be built with a moderate level of experience. There is also a (now dated) countermeasures section which was contributed by me.

This book was never easy to purchase. The first printing had to be ordered directly from Winston, himself. This revised and expanded second edition was only sold briefly via the now shuttered Sheffield Electronics website. And, once in a looong while, a used dog-eared copy would show up on eBay to quickly sell in the $50.-$75. range. None have appeared there recently, however.

The picture of Winston's signature is from my copy of the book. Sadly, Winston is no longer with us to sign more of them.

"Now Hear This!" is a collector's item with historical significance, and a lucky find. 

Long out-of-print, and thought to be no longer available, some "new, old stock" copies are available at amazon.com, for the very first time.

It is not known how many copies are available.

Now Hear This! Electronic Eavesdropping Equipment Designs

Thursday, July 15, 2010

10 Years, gone in a flash.

Wales - A reward is being offered for the safe return of a stolen laptop containing 10 years of a company's work.

Thieves broke into DB Liquid Ltd in Ruthin and made off with two laptops. One contained specialised software in which the firm had invested over £250,000. Company director Geoffrey Williams said the programs would be no use to anyone else, but means systems of work spanning 10 years could be lost to the database constructing firm...

“We’d developed a lot of our system software on the laptop which was backed up on a flash drive,” he said. “But unfortunately that was stolen too which means 10 years of work has gone down the drain.

10 years of work and only a flash drive back-up?!?!
The flash drive was stolen, too!?!?
An investment of over £250,000?!?!
"...would be no use to anyone else..." ?!?!
I'm not buying it. 
Are you? 

I wonder who did, and for how much?
Yours truly, Johnny Dollar.

Lady Gaga meets Mr. Data

The soldier accused of downloading a huge trove of secret data from military computers in Iraq appears to have exploited a loophole in Defense Department security to copy thousands of files onto compact discs over a six-month period. In at least one instance, according to those familiar with the inquiry, the soldier smuggled highly classified data out of his intelligence unit on a disc disguised as a music CD by Lady Gaga. (more)

Spyware on Infected USB Sticks

via Krebsonsecurity.com
Researchers have discovered a sophisticated new strain of malicious software that piggybacks on USB storage devices and leverages what appears to be a previously unknown security vulnerability in the way Microsoft Windows processes shortcut files...

Independent security researcher Frank Boldewin said he had an opportunity to dissect the malware samples, and observed that they appeared to be looking for Siemens WinCC SCADA systems, or machines responsible for controlling the operations of large, distributed systems, such as manufacturing and power plants.

Looks like this malware was made for espionage,” Boldewin said. (more)

The under surveillance comics...

Wednesday, July 14, 2010

Special-Ops vs. Special-Ops

FL - The thieves hit on a weekend when no one was around. The target: a military contractor for the super secret Special Operations Command, the elite commandos who help coordinate the war on terror. The intruders entered through the roof, gaining access to iGov Technologies, which occupies suite 110 in the beige corporate center at 9211 Palm River Road. For the next nine hours, they loaded up more than 3,000 laptop computers and other equipment into two waiting semitrailer trucks. (more

Think your company could withstand an info-theft like this? If not, contact the counterespionage consultant who hosts this Security Scrapbook on their Web site.