The Justice Department has dropped its investigation into a former department attorney who tipped off the media about the Bush administration's warrantless eavesdropping program.
The department informed Thomas Tamm's attorneys that he will not be prosecuted for the leak that then-President George W. Bush called a breach of national security.
Tamm has said he called The New York Times about the program because it "didn't smell right" and he thought the public had a right to know. (more)
Tuesday, April 26, 2011
NSA Whistleblower - On the Hook
Closed hearings are being held this week ahead of the trial of a former National Security Agency employee accused of mishandling classified information.
Thomas Drake is charged with violating espionage laws without being accused of spying. Instead, he's accused of shredding documents, deleting files from his computer and lying to investigators. Supporters claim he's being punished for blowing the whistle on inefficiencies and mismanagement at the NSA. (more)
Thomas Drake is charged with violating espionage laws without being accused of spying. Instead, he's accused of shredding documents, deleting files from his computer and lying to investigators. Supporters claim he's being punished for blowing the whistle on inefficiencies and mismanagement at the NSA. (more)
SpyCam Story #606 - The Power of One SpyCam
It's a hammer. |
The Wall Street Journal’s Lester Aldrich wrote, “The video, which has been posted to the internet, pressured live-cattle futures on the Chicago Mercantile Exchange. Traders were concerned its graphic nature would cause a pullback in consumer demand for beef…
The video helped to push June futures down 1.3% to $1.1565 a pound after the contract hit a two-week high earlier in the trading day.” (more) (disturbing video)
Sony Shuts Down Online PlayStation Network - Personal Data Hacked
Sony Corp. said a hacker has obtained customer information, potentially including credit-card numbers, for the 77 million members of its online PlayStation Network, which has forced the company to take down its service.
The Japanese electronics giant said it has informed PlayStation Network customers that personal information—including names, addresses, billing history and birthdays—was obtained by an "unauthorized person" following a hacking attack that caused Sony to shut down its Internet gaming service last week. Sony said customer credit-card numbers may also have been compromised.
The Japanese game maker said it has hired a security firm to conduct an investigation into what happened. In the mean time, Sony said it expects to restore its Internet gaming service within a week. (more)
The Japanese electronics giant said it has informed PlayStation Network customers that personal information—including names, addresses, billing history and birthdays—was obtained by an "unauthorized person" following a hacking attack that caused Sony to shut down its Internet gaming service last week. Sony said customer credit-card numbers may also have been compromised.
The Japanese game maker said it has hired a security firm to conduct an investigation into what happened. In the mean time, Sony said it expects to restore its Internet gaming service within a week. (more)
Monday, April 25, 2011
Competitive Intelligence - Made to Sound Nasty
Rumors. Inside dirt. Gossip.
Let’s just say you have your sources—moles on the floor of the NYSE, guys who know guys, a certain colonel who’s worked his way up the ranks of Russian intelligence.
And, of course, a little up-and-comer called Facebook.
Which brings us to ContentAide, a new service devoted to spying on the Facebook pages of your enemies, online now. (more)
Let’s just say you have your sources—moles on the floor of the NYSE, guys who know guys, a certain colonel who’s worked his way up the ranks of Russian intelligence.
And, of course, a little up-and-comer called Facebook.
Which brings us to ContentAide, a new service devoted to spying on the Facebook pages of your enemies, online now. (more)
Saturday, April 23, 2011
Brain Sucking Cell Phone Spider
The "Universal Forensic Extraction Device" sounds like the perfect cell phone snooping gadget.
Its maker, Israel-based Cellebrite, says it can copy all the content in a cell phone -- including contacts, text messages, call history, and pictures -- within a few minutes. Even deleted texts and other data can be restored by UFED 2.0, the latest version of the product, it says.
And it really is a universal tool. The firm says UFED works with 3,000 cell phone models, representing 95 percent of the handset market. Coming soon, the firm says on its website: "Additional major breakthroughs, including comprehensive iPhone physical solution; Android physical support – allowing bypassing of user lock code, (Windows Phone) support, and much more." For good measure, UFEC can extract information from GPS units in most cars.
The gadget isn't a stalker's dream; it's an evidence-gathering tool for law enforcement. Cellebrite claims it’s already in use in 60 countries. (more)
Its maker, Israel-based Cellebrite, says it can copy all the content in a cell phone -- including contacts, text messages, call history, and pictures -- within a few minutes. Even deleted texts and other data can be restored by UFED 2.0, the latest version of the product, it says.
And it really is a universal tool. The firm says UFED works with 3,000 cell phone models, representing 95 percent of the handset market. Coming soon, the firm says on its website: "Additional major breakthroughs, including comprehensive iPhone physical solution; Android physical support – allowing bypassing of user lock code, (Windows Phone) support, and much more." For good measure, UFEC can extract information from GPS units in most cars.
The gadget isn't a stalker's dream; it's an evidence-gathering tool for law enforcement. Cellebrite claims it’s already in use in 60 countries. (more)
Labels:
cell phone,
espionage,
FutureWatch,
GSM,
Hack,
password,
privacy,
product
Friday, April 22, 2011
The Car Whisperers
With a modest amount of expertise, computer hackers could gain remote access to someone's car -- just as they do to people's personal computers -- and take over the vehicle's basic functions, including control of its engine, according to a report by computer scientists from UC San Diego and the University of Washington.
Although no such takeovers have been reported in the real world, the scientists were able to do exactly this in an experiment conducted on a car they bought for the purpose of trying to hack it. Their report, delivered to the National Academy of Sciences' Transportation Research Board, described how such unauthorized intrusions could theoretically take place.
Because many of today's cars contain cellular connections and Bluetooth wireless technology, it is possible for a hacker, working from a remote location, to take control of various features -- like the car locks and brakes -- as well as to track the vehicle's location, eavesdrop on its cabin and steal vehicle data, the researchers said. They described a range of potential compromises of car security and safety. (more) (research paper) (the other car whisperers)
Because many of today's cars contain cellular connections and Bluetooth wireless technology, it is possible for a hacker, working from a remote location, to take control of various features -- like the car locks and brakes -- as well as to track the vehicle's location, eavesdrop on its cabin and steal vehicle data, the researchers said. They described a range of potential compromises of car security and safety. (more) (research paper) (the other car whisperers)
Invisibility
The prospect of rendering objects invisible has intrigued researchers for centuries.
Transformation optics based invisibility cloak design is now bringing this goal from science fictions to reality and has already been demonstrated experimentally in microwave and optical frequencies. However, the majority of the invisibility cloaks reported so far have a spatially varying refractive index which requires complicated design processes. Besides, the size of the hidden object is usually small relative to that of the cloak device.
Here we report the experimental realization of a homogenous invisibility cloak with a uniform silicon grating structure. The design strategy eliminates the need for spatial variation of the material index, and in terms of size it allows for a very large obstacle/cloak ratio. A broadband invisibility behavior has been verified at near-infrared frequencies, opening up new opportunities for using uniform layered medium to realize invisibility at any frequency ranges, where high-quality dielectrics are available. (more)
Transformation optics based invisibility cloak design is now bringing this goal from science fictions to reality and has already been demonstrated experimentally in microwave and optical frequencies. However, the majority of the invisibility cloaks reported so far have a spatially varying refractive index which requires complicated design processes. Besides, the size of the hidden object is usually small relative to that of the cloak device.
Here we report the experimental realization of a homogenous invisibility cloak with a uniform silicon grating structure. The design strategy eliminates the need for spatial variation of the material index, and in terms of size it allows for a very large obstacle/cloak ratio. A broadband invisibility behavior has been verified at near-infrared frequencies, opening up new opportunities for using uniform layered medium to realize invisibility at any frequency ranges, where high-quality dielectrics are available. (more)
"Chaos" - A Spy's Demise
CBS has pulled the low-rated spy series “Chaos” from its schedule after three episodes. The dramedy, which starred Freddy Rodriguez and Eric Close, debuted to 6.4 million viewers in its April 2 premiere but managed only a 1.1 rating in the key demographic of adults 18-49. (more)
Thursday, April 21, 2011
iPhone 4 turns TrackPhone
Two researchers have uncovered a secret file on iPhones that keeps a record of where the phone has been and when it was there — a file that is unencrypted and stored by default.
A sample map built using the program
The security experts, Alasdair Allan and Pete Warden, created a program that lets you see just what your phone knows of your whereabouts — and it’s a creepy sight. There’s no evidence that the file is transferred to Apple, but the maps produced by the program show details stretching back months.
“Ever since iOS 4 arrived, your device has been storing a long list of locations and time stamps,” said Mr. Allan, a technology author, in a post on the website of technology publisher O’Reilly. He and Mr. Warden, a former Apple employee, are presenting their findings Wednesday at the Where 2.0 conference put on by the publisher. The Guardian newspaper also has reported on their discovery.
Apple did not immediately respond to a request for comment. (more)
A sample map built using the program
The security experts, Alasdair Allan and Pete Warden, created a program that lets you see just what your phone knows of your whereabouts — and it’s a creepy sight. There’s no evidence that the file is transferred to Apple, but the maps produced by the program show details stretching back months.
“Ever since iOS 4 arrived, your device has been storing a long list of locations and time stamps,” said Mr. Allan, a technology author, in a post on the website of technology publisher O’Reilly. He and Mr. Warden, a former Apple employee, are presenting their findings Wednesday at the Where 2.0 conference put on by the publisher. The Guardian newspaper also has reported on their discovery.
Apple did not immediately respond to a request for comment. (more)
Wednesday, April 20, 2011
Woman Who Drove into River with Kids Victim of Spying
NY - The deadbeat dad of the three drowned Hudson River kids subjected their mother to a campaign of torment that included spying on her and forbidding her from having friends or flings -- even though they were not together, her grieving boyfriend told The Post. (more)
Stalker Uses: SpyCam, GPS Tracker, Bugs and Cell Phone Spyware
Australia - A man has been charged for bugging his ex-girlfriend's house and car with GPS and video devices after their relationship turned sour, police claim.
Police will allege the 53-year-old Alfred Cove man stalked his 40-year-old ex-girlfriend for many months.
It's claimed the couple were in a relationship for eight years, during which the man hired several private investigators to follow the woman.
After their relationship ended in mid-2010 police claim the man entered the woman's home on several occasions and installed listening and recording devices.
It is also claimed he placed a GPS tracker on her car and mobile phone, and followed her consistently. (more)
Police will allege the 53-year-old Alfred Cove man stalked his 40-year-old ex-girlfriend for many months.
It's claimed the couple were in a relationship for eight years, during which the man hired several private investigators to follow the woman.
After their relationship ended in mid-2010 police claim the man entered the woman's home on several occasions and installed listening and recording devices.
It is also claimed he placed a GPS tracker on her car and mobile phone, and followed her consistently. (more)
The Case of the Spying Apps
Cellphone users say they want more privacy, and app makers are listening.
No, they're not listening to user requests. They're literally listening to the sounds in your office, kitchen, living room and bedroom.
A new class of smartphone app has emerged that uses the microphone built into your phone as a covert listening device -- a "bug," in common parlance.
But according to app makers, it's not a bug. It's a feature!
The apps use ambient sounds to figure out what you're paying attention to. It's the next best thing to reading your mind. (more) (the solution)
No, they're not listening to user requests. They're literally listening to the sounds in your office, kitchen, living room and bedroom.
A new class of smartphone app has emerged that uses the microphone built into your phone as a covert listening device -- a "bug," in common parlance.
But according to app makers, it's not a bug. It's a feature!
The apps use ambient sounds to figure out what you're paying attention to. It's the next best thing to reading your mind. (more) (the solution)
Saturday, April 16, 2011
SpyCam Spied at Berkeley's Cafe Med
CA - In a "revoltin development" the Med’s 50 year ban on tourist photography and ESPECIALLY an alphabet soup of spying agencies like F.B.I., C.I.A., C.B.S., N.B.C., O.N.I.--has sputtered... Call it big brother; call it the eyeball on high, call it Orwell.
Installers of the eye, Craig Becker, 59, the Med's owner and two university students with a hot business model put up the petite eyeball more than two weeks ago.
The students plan to install the geeky eyeballs in other Berkeley cafes and businesses so that students can spy on their friends.
But--FLASH: Big Brother is now blooie, victim of either chronic neck droop, a staff intervention, or customer sabotage.
Sabotaged, Blooie, blotto, or just plain broke. It now spends its once active filming life mis-aimed at the ceiling with what Berkeley's Poet Laureate, Julia Vinograd calls a "celestial stare." (more)
Installers of the eye, Craig Becker, 59, the Med's owner and two university students with a hot business model put up the petite eyeball more than two weeks ago.
The students plan to install the geeky eyeballs in other Berkeley cafes and businesses so that students can spy on their friends.
But--FLASH: Big Brother is now blooie, victim of either chronic neck droop, a staff intervention, or customer sabotage.
Sabotaged, Blooie, blotto, or just plain broke. It now spends its once active filming life mis-aimed at the ceiling with what Berkeley's Poet Laureate, Julia Vinograd calls a "celestial stare." (more)
Friday, April 15, 2011
"So does this mean you won't marry me again, Brian?"
NASCAR chairman Brian France has sued his former wife, accusing her of tape recording telephone conversations to extort money from him.
In a lawsuit filed Friday, Brian France claims his ex-wife, Megan France, has recorded multiple telephone conversations with him without his consent. He is asking a federal judge to issue an injunction barring Megan France from engaging in additional “intercepts of wire communications” between the two and distributing the contents of the recordings.
Brian and Megan France have been married and divorced twice, Brian France noted in his lawsuit. Their second divorce was finalized on April 29, 2008. (more)
In a lawsuit filed Friday, Brian France claims his ex-wife, Megan France, has recorded multiple telephone conversations with him without his consent. He is asking a federal judge to issue an injunction barring Megan France from engaging in additional “intercepts of wire communications” between the two and distributing the contents of the recordings.
Brian and Megan France have been married and divorced twice, Brian France noted in his lawsuit. Their second divorce was finalized on April 29, 2008. (more)
Subscribe to:
Posts (Atom)