Egypt's former intelligence chief Omar Suleiman died from a rare disease affecting the heart and kidneys, according to the U.S. clinic where he was undergoing medical tests at the time.
Suleiman, who died at age 76, was fallen Egyptian president Hosni Mubarak's last deputy and one of his most trusted advisers. He stepped briefly into the limelight when he was made vice president days before Mubarak was ousted in a popular uprising last year.
"General Omar Suleiman ... passed away due to complications from amyloidosis, a disease that affects multiple organs including the heart and kidneys," the Cleveland Clinic said in a statement. (more)
Monday, July 23, 2012
Bugging History - May 13, 1966
Photo Tag: The extent of the business in snooping devices is indicated by the growth in contrivances to detect wiretaps and "bugs". Some merely warn the intended victim, while others jam or scramble the snooping. This telephone de-bugging meter discovers any transmitter (bug) in the phone or in the lines leading to it. De-bugging devices are bought mostly by business executives who suspect espionage by competitors. (AP Photo/Robert Kradin) (more)
It was never unusual for news reporters to get the facts wrong when reporting on business espionage, bugging or general electronic snooping. It still isn't unusual. The photo actually shows how a carbon microphone from the common phone of the day could easily be replaced by one which also transmitted the voice via radio.
Due to the simple installation, it was generally referred to as a "drop-in bug". To the untrained eye, both looked legitimate, but your ear could tell! The internal carbon granules inside the microphone sounded like sand when shaken. In order to build the bug inside the housing, the carbon had to be emptied out to allow space for the electronics and micro-mic. Those bugged mics were silent when shaken.
Another photo from the same era, shows two ways to tap a phone: the drop-in bug, and the big suction cup induction coil near the earpiece. Both seem crude by today's standards.
Most modern
handsets are sealed units. Dropping anything in them is problematic.
There are still a few, however, that are screwed together.
Inspecting today's telephones require more than a trained eye, because there may not be anything to see.
Conversations from VoIP phones travel as computer bits which may be collected far from the phone instrument. In fact, some VoIP phones transmit room audio even when they are supposedly hung up.
Other business telephone systems have many eavesdropper-friendly features built right into them, no extra hardware needed. Just program the features correctly and listen-in.
Think your phone system is bugged or tapped? Give me a call. ~Kevin
Labels:
advice,
amateur,
espionage,
Hack,
historical,
TSCM,
VoIP,
wiretapping
Sunday, July 22, 2012
Michael Murdock's Atomic Powered Surveillance Bot
Click to enlarge |
Created by Michael Murdock of Sabor Design Studios. Visit him at, Sabor Designs. (more)
Thursday, July 19, 2012
Smartphone Spying on the Rise
...how you would you feel if you found out that the smartphone in the palm of your hand was spying on you?
"Violated. Violated, very violated," said Andres Torres of East Hartford. "I'd be pretty creeped out, actually," Maddie Weed of Tolland told NBC Connecticut. "That's not cool." "I'm scared now! They could be looking at us," said Magdelena Santiagon of Hartford.
According to Kessler International, cases of malicious smartphone apps posing on markets as free or low-cost applications are on the rise. (more)
View more videos at: http://nbcconnecticut.com.
According to Kessler International, cases of malicious smartphone apps posing on markets as free or low-cost applications are on the rise. (more)
Was Skype reworked by Microsoft to make it easier to wiretap?
Skype supernodes are being centralized by Microsoft, but they deny wiretapping. But there's this patent they have to intercept VoIP phone calls...
Back in May, skype-open-source reported Skype, owned by Microsoft, had replaced user-hosted P2P supernodes with Linux grsec systems hosted by Microsoft. The shock wasn't that Microsoft is hosing Skype on Linux servers, but that centralization makes it possible to wiretap Skype communications. One big advantage of Skype has always been the decentralized and encrypted service was secure from eavesdropping.
Microsoft denies this, but the company applied for a patent on a technology called Legal Intercept to monitor and record Skype calls. Applied for before they purchased Skype, Microsoft specifically mentions intercepting calls on that service in the patent application. Conspiracy theorists now say they understand why Microsoft paid what seemed to be an unusually high price for Skype. (more)
Back in May, skype-open-source reported Skype, owned by Microsoft, had replaced user-hosted P2P supernodes with Linux grsec systems hosted by Microsoft. The shock wasn't that Microsoft is hosing Skype on Linux servers, but that centralization makes it possible to wiretap Skype communications. One big advantage of Skype has always been the decentralized and encrypted service was secure from eavesdropping.
Microsoft denies this, but the company applied for a patent on a technology called Legal Intercept to monitor and record Skype calls. Applied for before they purchased Skype, Microsoft specifically mentions intercepting calls on that service in the patent application. Conspiracy theorists now say they understand why Microsoft paid what seemed to be an unusually high price for Skype. (more)
Monkey Discovers Game Reserve’s ‘Hidden’ Spy Cam, Takes Smug Self-Shot
According to the Houston Zoo, this seemingly self-satisfied monkey has a good reason to "smile": He's uncovered the camera set up by a Borneo-based game reserve to spy on him.
"Looks like someone knew about the 'hidden' cameras," tweeted the zoo. Naturally, monkeys don't bare teeth to express joy or amusement, they do so to communicate anger.
Given that he's being spied on by a game reserve, I'd say he's earned the right to be pissed. (more)
Given that he's being spied on by a game reserve, I'd say he's earned the right to be pissed. (more)
William "Bill" Bennett - Friend & Respected Colleague - RIP
The following was composed by a close friend of Bill's and expresses the feelings of many...
With a heavy heart I write this note about the passing of a good friend and a great man William “Bill” Bennett. He passed away July 14, 2012 at home after a stint in the hospital. He was 85 years old.
With a heavy heart I write this note about the passing of a good friend and a great man William “Bill” Bennett. He passed away July 14, 2012 at home after a stint in the hospital. He was 85 years old.
Bill was a former senior
Special Agent with the California Department of Justice whose career spanned
more than thirty years. He
investigated many of the major crimes that occurred during his tenure including
the Charles Manson case and the Sonny Barger – Hell’s Angels investigations.
He retired in 1985 and partnered
with John P. Reisinger in Walsingham Associates to perform TSCM services (bug
sweeps) and investigations. Bill
was a licensed private investigator.
Upon John’s passing in 2000
Bill kept the firm going.
Bill’s believed in Glenn
Whidden’s philosophy of the two day sweep, recording the RF spectrum the day
before the sweep and checking it again the day of the sweep.
Bill’s personal TSCM philosophy,
which stemmed from his extensive experience in the use of electronic surveillance
in his government service, was that searching for bugs was heavy emphasis on
the physical search. He felt that
searching for electronic surveillance devices was like searching for narcotics
or contraband.
He had a son Patrick who was
active in the TSCM business who passed from an accidental drowning in
2009. He was married to Patricia
for 33 years who passed in 2010.
He was a member of the
following organizations:
Association of Former Intelligence Officers (AFIO)
American Society for Industrial Security (ASIS)
Business Espionage Control & Countermeasures Association
(BECCA)
California Peace Officer Association (CPOA)
California Department of Justice (DOJ, Ret.)
Chief Special Agents Association (CSAA)
California Association of Licensed Investigators (CALI)
Espionage Research Institute (ERI)
High Technology Crime Investigation Association (HTCIA)
He was a true gentleman and
a man of integrity whose presence as a friend and in the industry will be
missed.
Tuesday, July 17, 2012
Death of an Icon - The Master Padlock
Just to look at it brings back the smell of your high school locker room, but like your old U.S. Keds, it is not the new kid Keds of today. Both have morphed into the 21st Century, new and improved.
Master Padlock no more, they call it 1500eDBX, but you "person of the future" may call it dialSpeed!
Product Features:
• Electronic directional interface offers speed, ease of use, & multiple personalized codes
• Organize and protect personal and valuable information with secure, convenient, digital storage at the Master Lock Vault
• Vault enabled - permanent Backup Master Code at masterlockvault.com. Never Forget Your Combination Again!
• Comes with resettable Primary Code & option for 3 additional Guest Codes
• Ready to use – includes installed, replaceable CR2032 battery for 5 years of life
• 2-1/16" (51mm) wide metal body can be opened one-handed without looking
• Maximum security with anti-shim technology
• Boron carbide shackle for increased cut resistance
• For INDOOR USE only. Do not allow lock to get wet
Best Used For:
• School, Employee, & Athletic Lockers
• Cabinets
• Indoor Storage Lockers
(more) (sing-a-long)
Product Features:
• Electronic directional interface offers speed, ease of use, & multiple personalized codes
• Organize and protect personal and valuable information with secure, convenient, digital storage at the Master Lock Vault
• Vault enabled - permanent Backup Master Code at masterlockvault.com. Never Forget Your Combination Again!
• Comes with resettable Primary Code & option for 3 additional Guest Codes
• Ready to use – includes installed, replaceable CR2032 battery for 5 years of life
• 2-1/16" (51mm) wide metal body can be opened one-handed without looking
• Maximum security with anti-shim technology
• Boron carbide shackle for increased cut resistance
• For INDOOR USE only. Do not allow lock to get wet
Best Used For:
• School, Employee, & Athletic Lockers
• Cabinets
• Indoor Storage Lockers
(more) (sing-a-long)
How Cabbies Cheat the Fare Dispatch System
Australia - A Melbourne taxi driver has exposed a sophisticated scam that some operators are using to override taxi meters and stay at the top of the fare dispatch system.
The Silver Top driver has told the ABC that some drivers are using remote electronic devices and radio frequency jammers to trick the cab companies into giving them work when they are not in the area.
The equipment is easily purchased at online sites like eBay.
Neil Sach from the Victorian Taxi Association fears hundreds of drivers could be in on the scam. (more with video)
The scam is likely being used by cabbies, truckers, police and others worldwide; wherever GPS tracking is being used.
Note: eBay has recently policed the sale of these devices on their site, however, they remain available on other sites.
Or, DIY...
The Silver Top driver has told the ABC that some drivers are using remote electronic devices and radio frequency jammers to trick the cab companies into giving them work when they are not in the area.
The equipment is easily purchased at online sites like eBay.
Neil Sach from the Victorian Taxi Association fears hundreds of drivers could be in on the scam. (more with video)
The scam is likely being used by cabbies, truckers, police and others worldwide; wherever GPS tracking is being used.
Note: eBay has recently policed the sale of these devices on their site, however, they remain available on other sites.
Or, DIY...
Click to enlarge. |
Increasing Government Surveillance Powers Meets Backlash
Australia - Any proposal by the government to increase its own power should be treated with scepticism.
Double that scepticism when the government is vague about why it needs that extra power. Double again when those powers are in the area of law and order. And double again every time the words "national security" are used.
So scepticism - aggressive, hostile scepticism, bordering on kneejerk reaction - should be our default position when evaluating the long list of new security powers the Federal Government would like to deal with "emerging and evolving threats".
The Attorney-General's Department released a discussion paper last week detailing security reform it wants Parliament to consider. (more)
Double that scepticism when the government is vague about why it needs that extra power. Double again when those powers are in the area of law and order. And double again every time the words "national security" are used.
So scepticism - aggressive, hostile scepticism, bordering on kneejerk reaction - should be our default position when evaluating the long list of new security powers the Federal Government would like to deal with "emerging and evolving threats".
The Attorney-General's Department released a discussion paper last week detailing security reform it wants Parliament to consider. (more)
Saturday, July 14, 2012
Another SpyCam'er Shoots Himself - Darwin Award
The Wallingford Police Department released a photograph of the person who they said they would like to speak with after a camera was discovered inside a Walmart dressing room in early June.
Police said the camera was set up inside the dressing room and was only recording for a short period of time before it was discovered by an employee.
Police said there was no indication that anyone was actually filmed while undressing.
He is described as a man in his early 20s and was wearing a light green-striped shirt and a Hartford Whalers tan colored hat.
(more)
Click to enlarge. |
Police said there was no indication that anyone was actually filmed while undressing.
He is described as a man in his early 20s and was wearing a light green-striped shirt and a Hartford Whalers tan colored hat.
(more)
Own Your Own Spy Plane Drone - Costs Less Than an iPad
Remote control helicopters were a fad not too long ago, but who needs that when you can fly a remote control plane, which also acts as spy vehicle collecting video (and audio) as you fly.
Red5 has just introduced its Spy Hawk plane, which comes with a 5 megapixel camera attached to the nose. The aircraft beams the video back to your 3.5-inch screen which is embedded in the controller. The plane can be controlled within a 600 feet radius and comes with 4GB of SD card storage.
The Spy Hawk also features a stabilization system which makes it much easier to fly as well as an autopilot switch which will keep the plane at the correct altitude. The aircraft can stay in the air for about 30 minutes thanks to its 7.4v lithium-ion polymer. (more)
Red5 has just introduced its Spy Hawk plane, which comes with a 5 megapixel camera attached to the nose. The aircraft beams the video back to your 3.5-inch screen which is embedded in the controller. The plane can be controlled within a 600 feet radius and comes with 4GB of SD card storage.
The Spy Hawk also features a stabilization system which makes it much easier to fly as well as an autopilot switch which will keep the plane at the correct altitude. The aircraft can stay in the air for about 30 minutes thanks to its 7.4v lithium-ion polymer. (more)
14 incredibly creepy surveillance technologies that Big Brother will be using to spy on you
"14 incredibly creepy surveillance technologies that Big Brother will be using to spy on you"
Q. How could you pass up a headline like that?
A. You can't.
(more)
My favorite...
Hijacking Your Mind
The
U.S. military literally wants to be
able to hijack your mind. The theory is that this would enable
U.S. forces to non-violently convince
terrorists not to be terrorists anymore. But obviously the potential for abuse
with this kind of technology is extraordinary. The following is from a recent
article by Dick Pelletier…
The Pentagon's
Defense Advanced Research Projects Agency (DARPA) wants to understand the
science behind what makes people violent, and then find ways to hijack their
minds by implanting false, but believable stories in their brains, with hopes of
evoking peaceful thoughts: We're friends, not enemies. Critics say this
raises ethical issues such as those addressed in the 1971 sci-fi movie, A
Clockwork Orange, which attempted to change people's
minds so that they didn't want to kill anymore. Advocates, however,
believe that placing new plausible narratives directly into the minds of
radicals, insurgents, and terrorists, could transform enemies into kinder,
gentler citizens, craving friendship. Scientists have known
for some time that narratives; an account of a sequence of events that are
usually in chronological order; hold powerful sway over the human mind, shaping
a person's notion of groups and identities; even inspiring them to commit
violence.
Mobile Phones and Privacy
Mobile phones are a rich source of personal information about individuals. Both private and public sector actors seek to collect this information.
Facebook, among other companies, recently ignited a controversy by collecting contact lists from users’ mobile phones via its mobile app. A recent Congressional investigation found that law enforcement agencies sought access to wireless phone records over one million times in 2011. As these developments receive greater attention in the media, a public policy debate has started concerning the collection and use of information by private and public actors.
To inform this debate and to better understand Americans’ attitudes towards privacy in data generated by or stored on mobile phones, we commissioned a nationwide, telephonic (both wireline and wireless) survey of 1,200 households focusing upon mobile privacy issues. (more) (download Mobile Phones and Privacy)
Facebook, among other companies, recently ignited a controversy by collecting contact lists from users’ mobile phones via its mobile app. A recent Congressional investigation found that law enforcement agencies sought access to wireless phone records over one million times in 2011. As these developments receive greater attention in the media, a public policy debate has started concerning the collection and use of information by private and public actors.
To inform this debate and to better understand Americans’ attitudes towards privacy in data generated by or stored on mobile phones, we commissioned a nationwide, telephonic (both wireline and wireless) survey of 1,200 households focusing upon mobile privacy issues. (more) (download Mobile Phones and Privacy)
Labels:
cell phone,
data,
government,
law,
mores,
police,
poll,
privacy,
survey,
wireless,
wiretapping
Subscribe to:
Posts (Atom)