Wednesday, July 27, 2011
Corrections Officer Pleads Guilty to Eavesdropping on Superiors
OH - The second of three corrections officers at the Trumbull County Jail has pleaded guilty to reduced charges in an eavesdropping case in which the jail employees were listening to their superiors.
Robert J. Rihel Jr., 46, of Leavittsburg, pleaded guilty to 13 misdemeanor counts of falsification in a bill of information and will undergo a pre-sentence investigation ordered Thursday by Judge John M. Stuard.
Rihel, who was placed on administrative leave without pay, had been indicted on 23 counts of ''interception of wire, oral or electronic communications - a fourth-degree felony.'' The various counts in the indictment say the eavesdropping occurred from July 7 to Nov. 1, 2010. (more) (sing-a-long)
Watergate: David Gergen - White House Files
Why is this man laughing? |
On Woot Today: 8 IR camera, 500 GB DVR Home Surveillance System - $279.99 - Amazing
or four cameras, only $189.99!
No, I'm not out to sell cameras or help Woot. In fact, buy the time you see this, they will probably be sold out.
It just strikes me that the cost of entry to spying/securing up the 'ol castle, small business or any location for that matter has dropped to $35.00 per recording eyeball. And, if that's not enough it will also transmit photos to your smartphone.
It wasn't that long ago that a system like this would cost thousands. Granted, these may not be the highest quality cameras, but really, look at the features.
Warranty: 1 Year Zmodo
Condition: New
Features:
• Surveillance kit includes an 8-channel H.264 real-time standalone DVR, eight indoor/outdoor color IR security cameras, cabling and mounting hardware
• Everything you need to have your surveillance system up and running in your home or business quickly and easily
• The DVR is an 8-channel, fully integrated, real time, and hardware based standalone digital video recorder with 500GB SATA hard drive
• Supports up to 2TB 3.5" SATA hard drive and includes (2) hard drive mounting screws
• A hard drive is not needed when using cameras for surveillance, but is required when using DVR for recording camera images
• The DVR is based on an embedded Linux operating system and includes a remote control for easy setup and operation
• DVR functionality is easily controlled by using either the remote control or the front panel controls on the DVR
• DVR supports network access through Ethernet RJ45 interface
• Supports DVR backup via USB flash drive, removable drive, recorder and network
• The DVR also features the most updated 3G mobile live! Preview via mobile phone
• Use the 15-pin VGA output to connect a computer monitor (not included)
• Playback resolution 704x480
• The cameras included in the kit are weatherproof, day/night, security cameras with 30ft night vision
• Record Mode options include Continuous, Time Schedule, and Motion Detection
• Each camera comes with a 60-foot power and BNC video all-in-one cable
• All eight cameras are powered by one AC adapter using an 8-way power splitter
• Monitor is not included in the package
DVR Features:
• 8 CH H.264 Surveillance DVR
• 500GB Hard Drive Installed
• H.264 Hardware Compression
• Video Input / Output: BNC 8 / BNC 2
• Audio Input / Output: RCA 4 / RCA 2
• Two Type Video Out: TV Monitor BNC Output and PC Monitor VGA Output
• Signal System: NTSC / PAL
• Display: 240 fps
• Record: 240 fps
• Remote Access: Internet Explorer or Netviewer Software
• PTZ via RS485 Port (not with these cameras however)
• Support Remote View via Smart Phone & 3G Mobile with each of those systems below:
a) iPhone™
b) Google Android™
c) Blackberry™ OS V4.7
d) Windows Mobile™ Pro 5.0 & 6.1
e) Symbian™ S60 3rd & S60 5th
Camera Features:
• 1/4” Color Image Sensor
• 420 TV Lines, Horizontal
• 3.6mm Lens
• Signal: NTSC
• IR Irradiation Distance: up to 30ft
• Weatherproof
• Video Connector: BNC
• Power Connector: RCA 12V DC
• Mount: Ceiling or Wall
Don't worry about missing the sale. They will even become less expensive in the future. (more)
Tuesday, July 26, 2011
"Landau details both the internal threat and industrial espionage, and it is not a pretty picture."
Book review by Ben Rothke...
Surveillance or Security?: The Risks Posed by New Wiretapping Technologies is a hard book to categorize. It is not about security, but it deals extensively with it. It is not a law book, but legal topics are pervasive throughout the book. It is not a telecommunications book, but extensively details telco issues. Ultimately, the book is a most important overview of security and privacy and the nature of surveillance in current times...
Surveillance or Security?: The Risks Posed by New Wiretapping Technologies is an extremely important book on the topic of the many risks posed by new wiretapping technologies. Landau has the remarkable talent of taking very broad issues and detailing them in a concise, yet comprehensive manner. The book should be seen as the starting point for discussion on a most important topic.
Landau does an excellent job of detailing how unwarranted surveillance can undermine security and affect our rights, while noting that security for every citizen is paramount to the very spirit of the Constitution.
The book closes with the very principles of what it means to get communications security right and that adhering to these principles cannot guarantee that we will be completely secure. But failure to adhere to them will guarantee that we will not. (more)
Today in Spy History
On July 26, 1947, President Truman signed the National Security Act, creating the Department of Defense, the National Security Council, the Central Intelligence Agency and the Joint Chiefs of Staff. (more)
Sunday, July 24, 2011
Having Trouble Keeping Track of the Phone Hacking Scandal?
The Telegraph key pounds it out.
Below is a list of the alleged victims of phone hacking. This includes public figures, celebrities and others who have accused News International newspapers of hacking, those who are currently bringing legal action and those who brought successful cases in the courts.
Alleged victims
Milly Dowler
Parents of Holly Wells and Jessica Chapman
Families of servicemen and women killed in Iraq and Afghanistan
Relatives of victims and victims of 7/7 bombings
Clarence Mitchell, spokesman for Madeleine McCann’s family
Colin Stagg, accused of Rachel Nickell murder
Elle Macpherson, model
Wayne Rooney, footballer
Hugh Grant, actor
Prince of Wales and Duchess of Cornwall
Simon Hughes, Liberal Democrat deputy leader
Helen Asprey, former royal aide
Michael Mansfield, barrister who represented Mohamed Al Fayed at the Princess Diana inquest
Jamie Lowther-Pinkerton, private secretary to Princes William and Harry
Peter Mandelson, former Labour minister
David Davis, former shadow Home Secretary
Andrew Neil, BBC presenter
Boris Johnson, London Mayor
Sir Ian Blair, former Metropolitan Police commissioner
Paddy Harverson, Prince of Wales’ communication secretary
Vanessa Feltz, presenter
Lembit Opik, former Liberal Democrat MP
Cousin of Jean Charles de Menezes, Brazilian man shot dead by police
Paul O'Grady, presenter and comedian
John Yates, former Metropolitan Police assistant commissioner
David Cook, former Metropolitan Police detective chief superintendent
Seeking legal action
Steve Coogan, actor and comedian
Sky Andrew, former Olympian
Nicola Phillips, assistant to Max Clifford
Andy Gray, broadcaster
Paul Gascoigne, footballer
Sienna Miller, actress
John Prescott, former Labour Deputy Prime Minister
Brian Paddick, former Metropolitan Police assistant commissioner
Brendan Montague, freelance journalist
Chris Bryant, Labour MP
Jude Law, actor
Ryan Giggs, footballer
Chris Tarrant, presenter
Leslie Ash and Lee Chapman, actress and former footballer
Kelly Hoppen, stepmother of Sienna Miller
Kieren Fallon, jockey
George Galloway, former MP
Successful cases
Max Clifford, publicist
Gordon Taylor, chief executive of Professional Footballers’ Association
Jo Armstrong, legal advisor to Gordon Taylor
Tessa Jowell, former culture secretary (offered settlement)
David Mills, lawyer and ex-husband of Tessa Jowell (offered settlement)
Joan Hammell, former aide to John Prescott (offered settlement)
Click to enlarge.
Below is a list of the alleged victims of phone hacking. This includes public figures, celebrities and others who have accused News International newspapers of hacking, those who are currently bringing legal action and those who brought successful cases in the courts.
Alleged victims
Milly Dowler
Parents of Holly Wells and Jessica Chapman
Families of servicemen and women killed in Iraq and Afghanistan
Relatives of victims and victims of 7/7 bombings
Clarence Mitchell, spokesman for Madeleine McCann’s family
Colin Stagg, accused of Rachel Nickell murder
Elle Macpherson, model
Wayne Rooney, footballer
Hugh Grant, actor
Prince of Wales and Duchess of Cornwall
Simon Hughes, Liberal Democrat deputy leader
Helen Asprey, former royal aide
Michael Mansfield, barrister who represented Mohamed Al Fayed at the Princess Diana inquest
Jamie Lowther-Pinkerton, private secretary to Princes William and Harry
Peter Mandelson, former Labour minister
David Davis, former shadow Home Secretary
Andrew Neil, BBC presenter
Boris Johnson, London Mayor
Sir Ian Blair, former Metropolitan Police commissioner
Paddy Harverson, Prince of Wales’ communication secretary
Vanessa Feltz, presenter
Lembit Opik, former Liberal Democrat MP
Cousin of Jean Charles de Menezes, Brazilian man shot dead by police
Paul O'Grady, presenter and comedian
John Yates, former Metropolitan Police assistant commissioner
David Cook, former Metropolitan Police detective chief superintendent
Seeking legal action
Steve Coogan, actor and comedian
Sky Andrew, former Olympian
Nicola Phillips, assistant to Max Clifford
Andy Gray, broadcaster
Paul Gascoigne, footballer
Sienna Miller, actress
John Prescott, former Labour Deputy Prime Minister
Brian Paddick, former Metropolitan Police assistant commissioner
Brendan Montague, freelance journalist
Chris Bryant, Labour MP
Jude Law, actor
Ryan Giggs, footballer
Chris Tarrant, presenter
Leslie Ash and Lee Chapman, actress and former footballer
Kelly Hoppen, stepmother of Sienna Miller
Kieren Fallon, jockey
George Galloway, former MP
Successful cases
Max Clifford, publicist
Gordon Taylor, chief executive of Professional Footballers’ Association
Jo Armstrong, legal advisor to Gordon Taylor
Tessa Jowell, former culture secretary (offered settlement)
David Mills, lawyer and ex-husband of Tessa Jowell (offered settlement)
Joan Hammell, former aide to John Prescott (offered settlement)
(more)
The Number 1 Spybusters Tip that would have saved most of these people from being hacked...
Make sure your voice mail and cell phone both have decent secret passwords.
Don't want to see your name on a list like this someday?
Read more tips from IMCPB)
Labels:
amateur,
book,
business,
cell phone,
computer,
eavesdropping,
email,
employee,
GSM,
Hack,
historical,
lawsuit,
password,
police,
privacy,
spyware,
tracking,
voicemail,
wiretapping
Friday, July 22, 2011
TSCM Inspection Reveals Taps & Bugs In Inspector's Office
India - Karnataka Lokayukta Justice Santosh N Hegde, who is probing illegal mining in the state, on Thursday claimed that his phone has been tapped.
Hegde, a former Supreme Court judge, told PTI that after reports of alleged bugging in the office of Union Finance Minister Pranab Mukherjee surfaced, he had asked a professional to carry out a check in his office.
"(The professional) told me that my telephone has been tapped. Every conversation was being recorded from two sources," he said.
Hegde refused to comment on who could have tapped his phone. The tapping had been going on for the past three-four months, he said. (more)
Tip: Quarterly inspections for bugs and taps (TSCM) within sensitive offices and conference rooms is a generally accepted security practice. (more)
Hegde, a former Supreme Court judge, told PTI that after reports of alleged bugging in the office of Union Finance Minister Pranab Mukherjee surfaced, he had asked a professional to carry out a check in his office.
"(The professional) told me that my telephone has been tapped. Every conversation was being recorded from two sources," he said.
Hegde refused to comment on who could have tapped his phone. The tapping had been going on for the past three-four months, he said. (more)
Tip: Quarterly inspections for bugs and taps (TSCM) within sensitive offices and conference rooms is a generally accepted security practice. (more)
"Murdock, he wrote."
Image courtesy of Guns, Gams, and Gumshoes |
UK - A TV show personally overseen by Rupert Murdoch allegedly bugged the rooms of celebrities, politicians and other guests, the show's musical director told a friend shortly before his death, it has been claimed. The allegations came in a 'frantic' phone call from respected BBC journalist and musician, George Webley, days before Webley's untimely death in May, his friend John Romano said. “I have literally never talked to someone so afraid”, Romano said.
“Before his death, George Webley alleged that a News Corp entity bugged dressing rooms of celebs and politicos as far back as 1990. The allegation, if true, would show that News Corp had a pattern of bugging and hacking over a long period of time that went far beyond a rogue editor or reporter for News of the World,” Romano claimed...
“Murdoch-owned papers bugged people all the time, long before the time frame that they are accused of”, Webley claimed, according to Romano. After remaining silent for many years Webley had in 2011 taken his allegations of illegal bugging activity to UK authorities investigating News Corp, Romano believed, and he now feared for his safety, believing his phone was tapped and he was being followed.
“Before his death, George Webley alleged that a News Corp entity bugged dressing rooms of celebs and politicos as far back as 1990. The allegation, if true, would show that News Corp had a pattern of bugging and hacking over a long period of time that went far beyond a rogue editor or reporter for News of the World,” Romano claimed...
“Murdoch-owned papers bugged people all the time, long before the time frame that they are accused of”, Webley claimed, according to Romano. After remaining silent for many years Webley had in 2011 taken his allegations of illegal bugging activity to UK authorities investigating News Corp, Romano believed, and he now feared for his safety, believing his phone was tapped and he was being followed.
“I’ve pissed some really powerful people off”, Webley told Romano in April this year. The BBC journalist seemed so frightened that Romano asked him if he felt his life was in danger. “No, Murdoch’s game is to destroy your life, not end it”, he replied. One week later, Webley died at home, aged 53. Local authorities are yet to release a report on his death but have not described it as suspicious. (more)
Business Espionage: FBI Thwarts Akamai Info Heist
http://www.bottomsupcomic.com/2009/06/trade-secrets/ |
Elliot Doxer, 42, will admit to providing trade secrets from Cambridge-based Akamai Technologies Inc. over an 18-month period to the agent, whom he believed was an Israeli spy, the U.S. Attorney's Office for Massachusetts said in a statement. A plea hearing is scheduled for Aug. 29. (more)
"Everybody wants to get in on the act." It's not just phone hacking.
UK - Millionaire Labour donor David Abrahams claims he was a victim of phone hacking.
Mr Abrahams, who was plunged into the epicentre of a media storm in 2007 when he was accused of making thousands of pounds of illegal donations to Labour, has revealed how he believes he was the victim of secret bugging...
Now he claims the current phone hacking scandal is simply “the tip of the iceberg.
And he claims bugs and other recording devices were placed in his home, prompting him to call in experts who discovered the electrics at his property had been tampered with.
Today he warns there could be much more to come from the hacking scandal. He told the Chronicle: “It’s not just News International and it’s not just phone hacking.
“They put little video cameras in car aerials and bugs and devices in people’s houses. There are a lot of other factors as well as phone hacking. I’ve had it in my own life far too many times.” (more)
Mr Abrahams, who was plunged into the epicentre of a media storm in 2007 when he was accused of making thousands of pounds of illegal donations to Labour, has revealed how he believes he was the victim of secret bugging...
Now he claims the current phone hacking scandal is simply “the tip of the iceberg.
And he claims bugs and other recording devices were placed in his home, prompting him to call in experts who discovered the electrics at his property had been tampered with.
Today he warns there could be much more to come from the hacking scandal. He told the Chronicle: “It’s not just News International and it’s not just phone hacking.
“They put little video cameras in car aerials and bugs and devices in people’s houses. There are a lot of other factors as well as phone hacking. I’ve had it in my own life far too many times.” (more)
More Reporters Bugging Out
Korea - Police said Friday they are currently investigating telephone calls made between a reporter and politician related to the alleged bugging of a Democratic Party meeting...
The potentially-explosive scandal was disclosed to the public on June 26 when the main opposition Democratic Party filed a complaint with the police, claiming a KBS reporter had bugged a meeting held to discuss strategies over the state-run broadcaster’s controversial plan to raise TV subscription fees. (more)
Thursday, July 21, 2011
Recover a Stolen Laptop with Free Tracking Software
via Rick Broida, PCWorld...
In the last month, two family members and one friend have had laptops stolen right out of their homes. Sadly, none of the systems were equipped with remote-monitoring software, meaning the chances of recovery are just about zero.
To me this serves as a wake-up call; I'm in the process of evaluating various laptop-recovery services to see which one I should deploy on my own machines.
Short-term, I'm equipping my primary, can't-live-without-it laptop with LockItTight. Like similar services, it relies on a small, hidden client program that performs location tracking, Webcam captures, file recovery, and even keylogging. Unlike similar services, LockItTight is free--for one PC, anyway.
After you sign up for and activate your account, you download and run the LockItTight client (which is compatible with Windows XP and later). And that's pretty much the last you see of it; you won't find any evidence of it in the system tray or Programs menu. (Neither will tech-savvy thieves, which is exactly the point.)
To tweak LockItTight's settings and/or find out what your laptop's been up to, you sign into your account via a Web browser. By default, the client will simply report the laptop's position (usually via Wi-Fi, which in my tests was accurate to about 500 meters), but you can also enable screen capture, Webcam capture, key logs, clipboard logs, remote file retrieval, and remote file deletion. (more)
Need something like this for your Mac? Try Adeona, also FREE.
In the last month, two family members and one friend have had laptops stolen right out of their homes. Sadly, none of the systems were equipped with remote-monitoring software, meaning the chances of recovery are just about zero.
To me this serves as a wake-up call; I'm in the process of evaluating various laptop-recovery services to see which one I should deploy on my own machines.
Short-term, I'm equipping my primary, can't-live-without-it laptop with LockItTight. Like similar services, it relies on a small, hidden client program that performs location tracking, Webcam captures, file recovery, and even keylogging. Unlike similar services, LockItTight is free--for one PC, anyway.
After you sign up for and activate your account, you download and run the LockItTight client (which is compatible with Windows XP and later). And that's pretty much the last you see of it; you won't find any evidence of it in the system tray or Programs menu. (Neither will tech-savvy thieves, which is exactly the point.)
To tweak LockItTight's settings and/or find out what your laptop's been up to, you sign into your account via a Web browser. By default, the client will simply report the laptop's position (usually via Wi-Fi, which in my tests was accurate to about 500 meters), but you can also enable screen capture, Webcam capture, key logs, clipboard logs, remote file retrieval, and remote file deletion. (more)
Need something like this for your Mac? Try Adeona, also FREE.
From the Land of Paladin, Have Antidote, Will Travel
Google's search engine is now fighting against a strain of malware that secretly intercepts Web browser activity on Windows PCs. FREE
Infected users will see a big yellow box at the top of search results, directing them to a Google Web page that explains how to remove the malware. That page urges users to download or update their antivirus software, and also provides manual instructions for removing the malware from Windows computers. (To see if you're infected, run any search on Google.com and look for the yellow box.) (more)
Infected users will see a big yellow box at the top of search results, directing them to a Google Web page that explains how to remove the malware. That page urges users to download or update their antivirus software, and also provides manual instructions for removing the malware from Windows computers. (To see if you're infected, run any search on Google.com and look for the yellow box.) (more)
Click to enlarge. |
How to Protect Your Home While Traveling
Fred Burton, former special agent and STRATFOR’s VP of Intelligence, discusses ways to protect your home before you travel. Basic tips. (video)
Sunday, July 17, 2011
Spy Tools: The Evolution of Two Stage Weapons
(1963) Colonel Klebb is a high ranking member of the feared Russian counter-intelligence agency SMERSH, where she serves as the supervisor of Department II (operations and executions)... Klebb attempts to kick Bond with the poison-tipped shoe, but Bond blocks the attack with a chair. (more)
(1975) It wasn’t just Soviet bloc spies who used such techniques, though. In a 1975 US Senate hearing, CIA Director William Colby handed the committee’s chairman a gun developed by his researchers. Equipped with a telescopic sight, it could accurately fire a tiny dart – tipped with shellfish toxin or cobra venom – up to 250 feet. Colby claimed that this and other weapons had never been used, but couldn’t entirely rule out the possibility. (more) (video) BTW, the "dart" is believed to be an icicle. No 'pop gun' jokes, please.
(1978) The assassination of Georgi Markov in London in 1978 by a man with a poison-tipped umbrella was one of the most infamous incidents of the Cold War. The story reads like it is straight out of a super-spy novel. The forensic autopsy findings and results are as sensational as today's TV crime dramas. There is motive,a possible weapon, the known cause of death, and shadow government workings involved. Still there is no killer, and offically there may well never be. (more)
Subscribe to:
Posts (Atom)