FL - A Pensacola man is facing charges accused of taking photos of a woman in a public bathroom. Security video shows the suspect, Johnathan Smith going into the bathroom at Books-a-Million on Davis Highway.
A few minutes later the victim runs out, screaming for help.
Escambia deputies say, Smith took off running with witnesses in pursuit. Smith later told deputies that he knew what he did was wrong. (more)
---
FL - Two women who were spied on and videotaped by a former Gainesville police officer have sued the city, the officer and former Chief Norman Botsford, claiming that the city failed to maintain policies and procedures that could have prevented the voyeurism.
The two were among the victims for which officer Brett Robison was charged with seven counts of video voyeurism in 2010. He pleaded no contest last year to a charge of official misconduct in a plea agreement that dropped the seven charges. (more)
---
FL - A man faces child pornography and double-digit video voyeurism charges after a female victim witnessed him filming her at a Publix grocery store, according to a police report.
Police first arrested the man, 41-year-old Charles Korst. Police say that Korst placed a camera in a hand held basked and used it to film the undergarments of a woman shopping at the Publix located on 1700 North Monroe Street.
Police obtained a search warrant for Korst's home, which was in walking distance from the store, based on the belief that the camera and digital media used in the crime were inside.
On the same day, police executed the warrant. During a search, they found an external hard drive hidden behind a dresser drawer.
After reviewing the files of the hard drive, police say they found evidence that Korst filmed under the skirts of multiple women at many different locations. Some of the locations appear to be Target, Wal-mart, Home Depot and Publix. (more)
Wednesday, February 15, 2012
SpyCam Story #650 - The Down Under Bus'ted
Australia - Detectives on Sydney’s north shore have arrested and charged a bus driver with voyeurism offences.
It’s alleged the 48-year-old man installed an upward-facing camera in the floor of a State Transit Authority bus near the front ticket machine last Thursday (9 February 2012) filming unsuspecting passengers.
Police allegedly seized a number of computers and electronic storage devices containing thousands of indecent images of females – taken in public places, including onboard STA buses – dating back to 2009. The victims, which include many schoolchildren, are seemingly unaware they are being filmed. (more)
Police allegedly seized a number of computers and electronic storage devices containing thousands of indecent images of females – taken in public places, including onboard STA buses – dating back to 2009. The victims, which include many schoolchildren, are seemingly unaware they are being filmed. (more)
SpyCam Story #649 - Florida's SpyCam (almost) Law
FL - The Florida Senate has unanimously approved a bill that increases the charges related to the crime known as "video voyeurism."
Senators approved the bill (SB 436) on Tuesday by a 40-0 vote after adding an amendment clarifying that people under 19 can't be charged with a felony.
This bill increases video voyeurism offenses that are now first-degree misdemeanors to third-degree felonies. It also increases current third-degree felony video voyeurism offenses to second-degree felonies. And it makes clear that people have a "reasonable expectation of privacy" inside a home. (more)
Senators approved the bill (SB 436) on Tuesday by a 40-0 vote after adding an amendment clarifying that people under 19 can't be charged with a felony.
This bill increases video voyeurism offenses that are now first-degree misdemeanors to third-degree felonies. It also increases current third-degree felony video voyeurism offenses to second-degree felonies. And it makes clear that people have a "reasonable expectation of privacy" inside a home. (more)
Monday, February 13, 2012
CONTEST ALERT - Wednesday Noon (EST) - Next 3 Weeks
The famous Security Scrapbook contest back!
Every Wednesday (noon EST) for the next three weeks we will post a spy question. The first correct answer received wins!
Click to enlarge. |
We post this alert to give everyone an equal chance, as readers of the e-mail version receive these posts the following next day.
The prize - our Limited Edition Special Agent Black T-Shirt.
("How limited," I hear you say.)
Well, there are only three in the whole world! (one medium, one large, one x-large) And, they will be awarded in that order. So if you're a big Special Agent, wait for the last contest.
Did you know you could design custom t-shirts yourself? It's easy. I made these myself at ooShirts.com. They have a DIY on-line design lab! All types of t's, all colors, all prices. These are the Champion brand with the logo on the left sleeve.
ooShirts also provides design help, if needed. They suggested I use brighter colors to have the logo stand out better. They were 100% correct, but I went with muted gray and red for a subtle look (Special Agents don't have to shout it.) The shirt shows the colors correctly. The enlargement is brightened to show the fine detail of the printing, just look at the dots! This was a test run for us. We're thrilled.
As with all printing, the more you do the cheaper it gets, but even just doing three is affordable enough for special one-time occasions, like showing up with, "Will you marry me?" Happy Valentine's Day! ~Kevin
Deshredding Reveals Massive Cold War Identity Theft
The reconstructed contents of 500 trash bags offer new insights into the extent of spying activities by the East German secret police, or Stasi, in West Germany.
As the German regional public broadcaster RBB recently reported, the Stasi ran an extensive program of stealing identities of tens of thousands of West German citizens to enable their spies to operate freely in the West...
This massive fraud came to light when the agency of the Federal Commissioner for the Stasi records completed the reconstruction of about a million torn-up documents, or the contents of about 500 trash bags. The reconstruction was accomplished, for the most part, through meticulous work by hand. (more)
Spybusters Security Tip: Never use a stripcut shredder. Always crosscut, particle, or pulp shred your sensitive wastepaper. Computerized document reconstruction (de-shredding programs) are available.
Labels:
advice,
cautionary tale,
data,
dumpster,
government,
Hack,
shredder,
spybot
Weekend Movie Review - Safe House
by Erin Biglow...
It probably isn’t much of a spoiler to mention that the titular location featured in Safe House, a CIA action thriller starring Denzel Washington and Ryan Reynolds as an unlikely mentor-protégé dynamic duo, turns out to be anything but secure.
Despite being designed as an off-the-grid shelter in which to discreetly perform harrowing interrogation techniques or hide a suspect, the “safe house” in Safe House ends up seeing enough blazing gunfire and breaches of national security to give rookie agent Matt Weston (Reynolds) reason to reassess his stalled climb up the company ladder. (...company ladder, get it? Very funny, Biglow.) (more)
It probably isn’t much of a spoiler to mention that the titular location featured in Safe House, a CIA action thriller starring Denzel Washington and Ryan Reynolds as an unlikely mentor-protégé dynamic duo, turns out to be anything but secure.
Despite being designed as an off-the-grid shelter in which to discreetly perform harrowing interrogation techniques or hide a suspect, the “safe house” in Safe House ends up seeing enough blazing gunfire and breaches of national security to give rookie agent Matt Weston (Reynolds) reason to reassess his stalled climb up the company ladder. (...company ladder, get it? Very funny, Biglow.) (more)
Video: Multi-Billion Dollar Industrial Espionage Explained
Real Life Example: Titanium dioxide is a commonly used substance. It is in paint, but also shows up in sunscreen and food coloring. Hundreds of thousands of tons are shipped around the world every year.
Decades ago, DuPont developed secret processes to make high-quality titanium dioxide in a manner that is less toxic than the traditional production method. The process, which made it the most efficient maker in the world, is a closely held trade secret. Global sales of the product, which is dominated by DuPont, are $12 billion annually.
Titanium oxide makers in China use an older, more toxic, less efficient manufacturing process. But in 2010, Jinzhou Titanium Industry announced that it had achieved high-quality status production like DuPont. That claim may be tied to the apparent theft of DuPont trade secrets. (more)
Labels:
business,
employee,
espionage,
government,
Hack,
lawsuit,
leaks,
photocopier,
spybot,
spyware,
trade secret,
VoIP,
wiretapping
"Can cell and satellite phones really be intercepted and decrypted?"
I often get this question. The quick answer is, yes. But it is hard to fathom without seeing some proof.
There are dozens of companies selling equipment to do this. Their customers are mainly governments. The products are pricy. ABILITY is one supplier...
"ABILITY was founded in 1993 by a team of experts in military intelligence and communications who were joined by specialists in electronics and mathematics. Their goal was simple but extraordinarily complex – to devise state of the art interception and decryption solutions that would serve the needs and ever-increasing challenges of security and intelligence agencies, military forces, police and homeland security services around the world.
The ability to deliver both interception and decryption.
"ABILITY was founded in 1993 by a team of experts in military intelligence and communications who were joined by specialists in electronics and mathematics. Their goal was simple but extraordinarily complex – to devise state of the art interception and decryption solutions that would serve the needs and ever-increasing challenges of security and intelligence agencies, military forces, police and homeland security services around the world.
The ability to deliver both interception and decryption.
Our uniqueness is in our complete capabilities in both interception of communications as well as their clear decryption. ABILITY has nearly two decades of proven ability in the service of leading security agencies, law enforcement and armed forces around the globe!
We specialize in off-air interception of cellular and satellite communication networks and deciphering solutions for cellular and satellite communications."
We specialize in off-air interception of cellular and satellite communication networks and deciphering solutions for cellular and satellite communications."
FutureWatch
Price drop. "Researchers at Ruhr University Bochum, in Germany, think they have managed to crack two popular encryption protocols, known as A5-GMR-1 and A5-GMR-2. These are commonly used in the Thuraya satellite phones used across swathes of Africa, the Middle East and North Asia. (Thuraya has yet to respond to the revelations.) The researchers hope that their paper, published on their website, will help interested parties fix the flaw. More importantly, perhaps, it might prompt phone-makers to act. "We can assume that this has probably been known about since the beginning of this century," says Benedikt Driessen, one of the authors of the new paper. He and his colleagues say that it takes about $2,000 worth of gear and half an hour to decipher a satellite phone call." (more)
Saturday, February 11, 2012
14 Counterespionage Tips for Your Next China Trip
via The New York Times...
When Kenneth G. Lieberthal, a China expert at the Brookings Institution, travels to that country, he follows a routine that seems straight from a spy film.
He leaves his cellphone(1) and laptop(2) at home and instead brings “loaner” devices(3), which he erases(4) before he leaves the United States and wipes clean the minute he returns(5). In China, he disables Bluetooth(6) and Wi-Fi(7), never lets his phone out of his sight(8) and, in meetings, not only turns off his phone(9) but also removes the battery(10), for fear his microphone could be turned on remotely.
He connects to the Internet only through an encrypted(11), password-protected(12) channel, and copies and pastes his password from a USB thumb drive(13). He never types in a password directly(14), because, he said, “the Chinese are very good at installing key-logging software on your laptop.”
What might have once sounded like the behavior of a paranoid is now standard operating procedure for officials at American government agencies, research groups and companies that do business in China and Russia... (more)
Draw Cubby and Become a Police Sketch Artist... for FREE
"Cubby" is the guy who just mugged you.
Now, you can draw him for the police!
SketchFace, created by Ali Daneshmandi, is an incredible free web application for creating a photo-realistic facial composite pictures.
Be warned. You will probably blow the rest of your weekend playing with this. ~Kevin
Ali's amazing story...
I started to learn using computer when I was 18 by learning Photoshop! Yes, I didn’t know how to use computers but I’d wanted to learn Photoshop :D . There was no one around me to help me on that. So I started by myself by trial and error besides reading Photoshop Help. This made me a self learner later on... I am a continue learner who is always anxious to create great and cool user experiences.
Ali's amazing story...
Cubby |
Friday, February 10, 2012
$250 million “Bluetooth Jacking” Scam Ring Busted
The video above is a scam known as the “Bluetooth Jacking” scam, where the criminal takes your cellphone’s ID via a bluetooth device, and they force your phone to call a high premium phone line where you get charged by the minute. The criminal may get away with $20 – $50 before you realize what happened.
The crime is not just for low level criminals, an even more sophisticated type of scam actually clones your entire phone and allows the criminals to make calls to International numbers and could possibly take your identity. The Secret Service just busted a ring of people pulling off this kind of crime.
On February 1, the U.S. Attorney for the Southern District of New York announced charges against 12 defendants for participating in a $250 million cell phone cloning scheme. (more)
The crime is not just for low level criminals, an even more sophisticated type of scam actually clones your entire phone and allows the criminals to make calls to International numbers and could possibly take your identity. The Secret Service just busted a ring of people pulling off this kind of crime.
On February 1, the U.S. Attorney for the Southern District of New York announced charges against 12 defendants for participating in a $250 million cell phone cloning scheme. (more)
Spybusters Tip #416: Keep your Bluetooth turned off when you are not using it.
SpyCam Story #648 - SpyCam Stops Animal Cruelty
Australia - A Sydney abattoir has stopped slaughtering and faces closure and prosecution after hidden-camera footage of chilling animal cruelty emerged.
The NSW Food Authority ordered the immediate halt yesterday to slaughter at the Hawkesbury Valley Meat Processors at Wilberforce, in Sydney's west, after seeing undercover footage apparently taken by a worker at the abattoir. (more - with disturbing video)
Weekend Movie Tip - Safe House
Supposedly Matt Weston is a spy for the CIA, stationed in South Africa. But in reality, he’s little more than a glorified housekeeper.
His job is to oversee a “safe house,” a secure, off-the-grid installation where other agents — the real agents — can hide a friend or brutally interrogate an enemy. Every day, Matt turns the key, turns on the lights and waits for the doorbell to ring.
Then one day it does, and all hell breaks loose. (more)
His job is to oversee a “safe house,” a secure, off-the-grid installation where other agents — the real agents — can hide a friend or brutally interrogate an enemy. Every day, Matt turns the key, turns on the lights and waits for the doorbell to ring.
Then one day it does, and all hell breaks loose. (more)
Today in Spy History - 50 Years Ago - Francis Gary Powers
On a bridge outside Berlin one gloomy morning 50 years ago Friday stood Francis Gary Powers, the pilot of a CIA spy plane that was shot down over the Russian Ural mountains. He had waited 21 months for this moment. He had survived a plane crash, weeks of harsh interrogation and the brutal conditions of a Soviet prison. He was on the threshold of freedom, and his heart was thumping heavily.
On the opposite end of the steel-trussed Glienecke Bridge was Col. Rudolph Abel, the highest-ranking Russian intelligence officer to be caught spying in the United States.
At 8:52 a.m., the two men began walking forward. They passed each other and made eye contact. Neither said a word.
It was a dramatic — and surprisingly peaceful — end to a political crisis at a time of extreme tensions between the United States and the Soviet Union. (more)
At 8:52 a.m., the two men began walking forward. They passed each other and made eye contact. Neither said a word.
It was a dramatic — and surprisingly peaceful — end to a political crisis at a time of extreme tensions between the United States and the Soviet Union. (more)
Thursday, February 9, 2012
Government Security Conference and Expo - April 2-4
GovSec returns to Washington, DC for its 11th year with a Conference and a free* admission Expo!
This year the Government Security Conference and Expo, is joining forces with the Contingency Planning & Management, Network-Centric Security, and U.S. Law Enforcement Conferences. By combining these events attendees can make integrated buying decisions at one event.
Topics include:
*Critical Infrastructure Protection
*Counter Terrorism: Domestic & International
*Cyber Terrorism and Cybercrime
*Contingency Planning & Management
*Network-Centric Security
Expo includes:
*Agency Briefings
*Mobile Apps Experience
*Keynote Presentations
*Security Clearance Mini Workshop
*CISSP Exam Prep Clinic
*Force & Firearms Championship
*K-9 Explosive Detection Team Demo
*Bomb Squad Response and Robots Demo
*2011 Espionage Debrief
....and much more!
Opening Keynotes
Ralph S. Boelter, Assistant Director, FBI Counterterrorism Division
Gordon M. Snow, Assistant Director, FBI Cyber Division.
Wednesday Keynote
Senator George J. Mitchell, Former U.S. Special Envoy for Middle East Peace.
*$50 fee for non-government attendees registering after February 27.
This year the Government Security Conference and Expo, is joining forces with the Contingency Planning & Management, Network-Centric Security, and U.S. Law Enforcement Conferences. By combining these events attendees can make integrated buying decisions at one event.
Topics include:
*Critical Infrastructure Protection
*Counter Terrorism: Domestic & International
*Cyber Terrorism and Cybercrime
*Contingency Planning & Management
*Network-Centric Security
Expo includes:
*Agency Briefings
*Mobile Apps Experience
*Keynote Presentations
*Security Clearance Mini Workshop
*CISSP Exam Prep Clinic
*Force & Firearms Championship
*K-9 Explosive Detection Team Demo
*Bomb Squad Response and Robots Demo
*2011 Espionage Debrief
....and much more!
Opening Keynotes
Ralph S. Boelter, Assistant Director, FBI Counterterrorism Division
Gordon M. Snow, Assistant Director, FBI Cyber Division.
Wednesday Keynote
Senator George J. Mitchell, Former U.S. Special Envoy for Middle East Peace.
*$50 fee for non-government attendees registering after February 27.
Subscribe to:
Posts (Atom)