Monday, November 26, 2012

Mannequin Spies - Will Dummy Shoppers Revolt?

An Italian firm selling mannequins that secretly monitor the age, race and gender of customers using facial recognition software has come under fire from privacy groups. The information logged by the dummies is then used to implement more effective marketing strategies by stores in the US and Europe.

And the manufacturer now plans to add audio recording to the dummies' capabilities, listening in on customers' discussions about their clients' products.

Click to enlarge
The mannequins, known as "EyeSee" are manufactured by Italian company Almax and retail for £3,200 each.

Privacy campaigners agree, describing the technology as "creepy" and "totally disproportionate."


Emma Carr, deputy director of campaign group Big Brother Watch, told the Daily Mail newspaper: "The use of covert surveillance technology by shops, in order to provide a personalised service, seems totally disproportionate.

"The fact that the cameras are hidden suggests that shops are fully aware that many customers would object to this kind of monitoring


"Keeping cameras hidden in a mannequin is nothing short of creepy." (more)

As Seen on Predicted on TV in 1960!

(YouTube)
 

Sunday, November 25, 2012

Patent Wars - VoIP Wiretaps

After Microsoft acquired Skype, we looked at a Microsoft patent called "Legal Intercept" meant for monitoring and recording VoIP communications. At that time, there were questions about if Microsoft would ruin Skype by making a backdoor for easy spy and pry government and law enforcement access. But a California-based company called VoIP-Pal already had such a surveillance patent that is meant to "allow government agencies to 'silently record' VoIP communications."

The Microsoft patent was filed in December 2009, but a company called Digifonica (International) Limited had filed a similar wiretapping VoIP patent in 2007. Then, in May 2012, VoIP-Pal attained five VoIP patents from the acquisition of Digifonica Gibraltar. One of the five patents is called "Lawful Intercept" and is meant for "intercepting VoIP and other data communications." (more)

Saturday, November 24, 2012

Spy College... for your 21st Century careers

At the University of Tulsa school, students learn to write computer viruses, hack digital networks and mine data from broken cellphones. Many graduates head to the CIA or NSA.

Stalking is part of the curriculum in the Cyber Corps, an unusual two-year program at the University of Tulsa that teaches students how to spy in cyberspace, the latest frontier in espionage.

Students learn not only how to rifle through trash, sneak a tracking device on cars and plant false information on Facebook. They also are taught to write computer viruses, hack digital networks, crack passwords, plant listening devices and mine data from broken cellphones and flash drives.

It may sound like a Jason Bourne movie, but the little-known program has funneled most of its graduates to the CIA and the Pentagon's National Security Agency, which conducts America's digital spying. Other graduates have taken positions with the FBI, NASA and the Department of Homeland Security. (more)

From our "Persistence is Futile" file...

Top code-breakers at one of Britain's intelligence agencies, the GCHQ, say they have failed to decipher a message found attached to the leg of a dead Second World War pigeon. (more)

Can YOU crack the code?
RE HHAT VM RIYNZ LXJT MJRBTXAN
Give up? Crack it here. Your code number is 1943.

Student Balks at Stalk (Psst. Just make the tags more stylish.)

A court challenge has delayed plans to expel a Texan student for refusing to wear a radio tag that tracked her movements.

Style is everything in high school.*
Religious reasons led Andrea Hernandez to stop wearing the tag that revealed where she was on her school campus.

The tags were introduced to track students and help tighten control of school funding.

A Texan court has granted a restraining order filed by a civil rights group pending a hearing on use of the tags.

ID badges containing radio tags started to be introduced at the start of the 2012 school year to schools run by San Antonio's Northside Independent School District (NISD). The tracking tags gave NISD a better idea of the numbers of students attending classes each day - the daily average of which dictates how much cash it gets from state coffers. (more)


In other tracking news...

Thursday, November 22, 2012

Holiday Shopping Safety Infographic

Click to enlarge.
Click to enlarge.

Defending Privacy at the U.S. Border: A Guide for Travelers Carrying Digital Devices


Thanks to protections enshrined in the U.S. Constitution, the government generally can’t snoop through your laptop for no reason. 

But those privacy protections don’t safeguard travelers at the U.S. border, where the U.S. government can take an electronic device, search through all the files, and keep it for a while for further scrutiny – without any suspicion of wrongdoing whatsoever. (more) (pdf guide)

Wednesday, November 21, 2012

The Wall Street Wiretap Sword Of Damocles

Mark Pomerantz, a former federal prosecutor, says the government wants everybody on Wall Street to believe all their conversations are being taped.

Pomerantz tells MarketWatch that the perception of wiretaps being employed in a widespread way is great for deterrence. However, he said he didn’t think they were being employed extensively by federal prosecutors. (more)

Tuesday, November 20, 2012

Researchers Find iOS is Rich Target for Spying Software

Takeaway: The popularity of Apple devices makes them a prime target for spying programs, malware, and simple thievery.

According to a report in TechWeek Europe, researchers have found that spying programs like SpyEra, SpyBubble and StealthGenie are used by attackers much more heavily on devices running iOS. In two samplings of infected devices, Israeli mobile security company Lacoon found that significantly more iOS devices were being targeted over other mobile operating systems (74 % in one sampling and 52 % in a second sampling).

Attackers are, of course, taking advantage of the relative popularity of Apple devices, and are using the spying programs in highly targeted attacks — for example, against business executives — “to watch over personal and business data, letting the attackers view all the victim’s emails, text messages and geo-location information.” (more)

Friday, November 16, 2012

City Hall Fingered for Eavesdropping - Claims 'Inadvertance'

Chicago City Hall officials violated Illinois' strict eavesdropping law when they ‘inadvertently’ recorded conversations with Chicago Tribune reporters without their consent.

The Tribune sent the city a letter Friday demanding that officials stop secretly recording conversations with reporters. The newspaper also requested copies of the recorded conversations.

“This failure was due to inadvertence – not some practice or plan to record interviews without consent,” City Attorney Stephen Patton stated in a letter responding to the Tribune. (more)

What the Well Dressed Spy Wants for Christmas

Upon first glance, it appears to be a standard pair of cuff links.

However, a covert, hidden handcuff key has been engineered in to the design. This concealed hand cuff key will to open almost all Standard Hand cuffs. It’s also designed to hold your French Cuffs closed. A must have for any international SPY or the average citizen looking for some styling carbon fiber inlaid cuff links that happen to open hand cuffs.

*WARNING: The use of this product may result in you being shot.*


Don’t Break the law. 

You are not Bond'ed. (more) (more weird cufflinks)

Thursday, November 15, 2012

Scientific Breakthrough Gives Paranoids Another Thing to Worry About

Click to enlarge.
A tiny ear-powered device extracts energy from an ear and transmits information wirelessly to a nearby radio. (more)

2012 China Report Released... no surprises.

The U.S.-China Economic and Security Review Commission was created by Congress to report on the national security implications of the bilateral trade and economic relationship between the United States and the People's Republic of China.

"This Report conveys our findings from the past year, along with providing recommendations to Congress about how best to respond to some of the problems we have identified."
2012 REPORT TO CONGRESS
 
Excerpts:

"Travelers to China sometimes report Chinese officials tampering with their electronic devices upon entry or exit. Customs or border enforcement entities may perform or enable such activities."

"Some corporate entities in China may engage in, support, or benefit from cyber espionage. The prevalence of stste-owned or -controlled enterprises in the telecommunications and IT sectorsin China mean that such activities would often constitute state sponsorship."


Just coincidence?
 

Wednesday, November 14, 2012

This Week in Spy News

The chairman of Stow College in Glasgow has resigned after a row over a recorded conversation on a device branded a "spy-pen". (more)
 

Outdated laws have created loopholes that allow government and law enforcement agencies to request information and conduct electronic surveillance without warrants. The piece of legislation at the heart of the issue is the Electronic Communications Privacy Act, passed in 1986. (more)
 

Ex-British spy, turning 90, happily living in Russia... 
The spy, George Blake, betrayed British intelligence starting in the 1950s; he was found out in 1961 and sentenced to 42 years in prison. But he escaped five years later using a rope ladder made of knitting needles, made his way to the Soviet Union and has been living out his last years serenely in a cottage outside Moscow. (more)

Two Simple Spy Tricks That David Petraeus Could Have Used To Hide His Affair...

Does the head of the world's top spy agency really think he can hide behind a Gmail account and a pseudonym? Apparently so. Even bumbling Boris Badenov from "Rocky and Bullwinkle" would have known better. (more)

The Maryland Transit Administration is bugging buses in Baltimore, and the bugged buses are what’s bugging civil rights advocates. Buses already have cameras, but ten buses now have microphones that are supposed to add to security by recording what’s said between passengers and the drivers. (more)

How to Stop Spies from Digging Up Your Personal Information...

The spies in our lives aren't like the ones in movies—they take the form of a suspicious lover, obsessive coworker, or jealous "friend." While you can't distrust everyone you meet and lead a happy life, you can protect your personal information from falling into the wrong hands. Here's how to guard yourself from spies without slipping into a state of constant paranoia. (more)

The chairman of Pirelli, Marco Tronchetti Provera, will go to trial
over a long-running probe into alleged use of Telecom Italia data to snoop on Italy's elite, a judicial source said on Monday. (
more)

How to Snap Top Secret Photos Without Anyone Noticing...

Ever needed to snap a picture in a quiet building without anyone noticing? Or maybe you need to document misbehavior without getting caught? Taking snapshots on the sly isn't easy, but a few tricks can help you capture a moment without another soul noticing. (more)
 

Steampunk Spy-Fi: Real-life gadgets perfect for a Victorian Era James Bond...
What if the majesty of On Her Majesty's Secret Service was Queen Victoria? (more)

In France, a Mission to Return the Military's Carrier Pigeons to Active Duty...

Grounded After Modern Communication Devices Soared, Birds May Offer Low-Tech Solutions; No Round Trips (more)