Friday, January 11, 2013

Van Eck Grown Up - Time to look at eavesdropping on computer emissions again.

1985 - Van Eck phreaking is the process of eavesdropping on the contents of a CRT or LCD display by detecting its electromagnetic emissions. It is named after Dutch computer researcher Wim van Eck, who in 1985 published the first paper on it, including proof of concept.[1] Phreaking is the process of exploiting telephone networks, used here because of its connection to eavesdropping.

2009 - A simple experiment showing how to intercept computer keyboard emissions. 

It is notable that there is: 
no connection to the Internet; 
• no connection to power lines (battery operation); 
• no computer screen in use (eliminates the screen emissions possibility); 
• and no wireless keyboard or mouse. 
Intercepted emissions are solely from the hard-wired keyboard.

The interception antenna is located about one meter away. (This is why we look for antenna wires under desks, and metal parts on desks to which wiring is attached.) 
(video 1) (video 2)

The point is, if one can get an antenna withing close proximity of your computer, what you type belongs to them.

 
December 2012 - Not satisfied with pulling information from your keyboard, injecting information becomes a concern (pay attention investment firms).

"The roughly half-dozen objectives of the Tactical Electromagnetic Cyber Warfare Demonstrator program are classified, but the source said the program is designed to demonstrate ready-made boxes that can perform a variety of tasks, including inserting and extracting data from sealed, wired networks.

Being able to jump the gap provides all kinds of opportunities, since an operator (spy) doesn’t need to compromise the physical security of a facility to reach networks not connected to the Internet. Proximity remains an issue, experts said, but if a vehicle can be brought within range of a network, both insertion and eavesdropping are possible." (more)


2013 is going to be an interesting year. ~Kevin

'Spy News from New York' shows off NYC

New York in stunning 360 degree detail — A photographer has created a stunning interactive image of New York, giving a detailed 360 degree tour of Manhattan.

Click to enlarge.
Sergey Semenov, a Russian, created the image by stitching together thousands of photographs of the city, taken during helicopter tours in 2011.
The interactive graphic has also been "flattened" to create a detailed 2-D image, focused on Central Park and its surrounding skyscrapers.

Mr Semenov won the best amateur award from the International Pano Awards, given out for panoric photographs, for the 2-D image. (more)


Tip: Be sure to click the 'view full screen' link for a spectacular helicopter ride around New York City, without the helicopter.

Thursday, January 10, 2013

Business Espionage Alert: China Now Blocking VPNs

The "Great Firewall of China," designed to prevent its citizens from accessing some overseas content, has apparently undergone an upgrade.

And some observers say this may not only be an effort to stop citizens from reading or viewing Western information, but also to spy on international corporations doing business in the country who encrypt their internal communications...
 

"A number of companies providing virtual private network (VPN) services to users in China say the new system is able to 'learn, discover and block' the encrypted communications methods used by a number of different VPN systems," the report said.

"China Unicom, one of the biggest telecoms providers in the country, is now killing connections where a VPN is detected, according to one company with a number of users in China," the report said.  (more) (more)

Wednesday, January 9, 2013

"1984" Gets a New Look

via creativity-online.com...
You can't judge a book by its cover, but there's no denying that a thoughtful, bold packaging can make all the difference when it comes to picking up a tome from a shelf.

Penguin Press enlisted designer David Pearson to re-do the covers of five classic George Orwell novels. Among them is this standout cover for "1984," with both the title and the author's name "blacked out." In certain lights, you can see the title, however. 

It is of course a nod to the contents of Orwell's dystopian novel, where the misnamed Ministry of Truth rewrites and falsifies history to serve its own purpose. See the covers for other Orwell books by Pearson below. (more)

Brilliant!

Investigative Journalist Finds Electronic Listening Device in Apartment

Ukraine - Lviv investigative journalist Taras Zozulinsky said he discovered an electronic listening device in his apartment on Jan. 6. He thinks it was planted because of his investigation into whether high-ranking police officers in Lviv Oblast are involved in the illicit drug trade.

"I didn't snitch on you. You snitched me!"
Police say they have launched criminal proceedings regarding intentional obstruction of journalistic activities, but complain that the newspaper is obstructing their work.

Zozulinsky said he did not trust the police, so the newspaper decided to give the device to a reliable and independent expert in Europe.

Zozulinsky said he found the device sewn to the label of a towel on a shelf and made a complaint to police the same day. Police interviewed him and searched the apartment at his request, but did not find any other bugs. (more)

My take... Until further evidence is brought forth, I'm saying he stole that towel from a hotel or a local gym, brought it home, and later discovered it had something extra in it. You can learn all about that something extra here. ~Kevin

Book Review - A Cybercop's Guide to Internet Child Safety

I am reading Glen Klinkhart's book, "A Cybercop's Guide to Internet Child Safety." After reading only two chapters, it is clear that this is a must-have book for every parent. 

The book begins with an Author's introduction. It sets the tone, i.e. Glen Klinkhart has not written this book to make a buck, he is on a much larger mission, and has the experience-clout to accomplish it. You see, when he was 15, his older sister was kidnapped, sexually assaulted and murdered. Since then, he made cyber-security his life. Having worked with his team, I know first-hand they are very good at it.

Patriculary impressive is the layout and organization of his advice and guidence. The headlines and sub-heads are clear and concise, as are the explanations which follow. It is an instant, easy-to-understand education for every parent, no matter what their previous level of Internet savvy.

Most parents will find this book is THE answer to, "What can I do?" A few may feel policing their child's cyber-activities is an Sisyphean task, and bury their heads in the silicon. But hey, who ever said parenting was easy, or that everyone was up to the task. At least, "A Cybercop's Guide to Internet Child Safety" now makes this part of parenting do-able. All of us no longer can use ignorance as an excuse. Isn't protecting your child worth $25.00?

Tuesday, January 8, 2013

From those wonderful folks who brought you Godzilla...

Two moments of security Zen, from Japan... SECOM's rentable private security drones.

"Flyzilla"



and... "Flee, puny humans. FLEE!"

   
(more)

Larry Ellison's Sailing Team Gets Caught Spying - Pay $15,000 Fine

Larry Ellison's Oracle Team has been found guilty of spying on the Italian team by an international jury of sailing experts, reports Julia Prodis Sulek at the Mercury News.

The penalty shouldn't hurt too much: they have to give up five days of practice and pay a $15,000 fine. That couch change for billionaire Ellison, one of the world's richest men with a net worth of about $41 billion, according to Bloomberg Billionaires Index.  (more)

Spies & SpyCams at the Supermarket

Germany - A former store detective who worked at the German supermarket Aldi has revealed to news outlet Der Spiegel that in addition to looking out for shoplifters, Aldi wanted him to spy on store employees and install hidden cameras.

"I had to say if an employee was working too slowly, engaged in an affair and reveal other private details such as their financial situation," the anonymous source told Der Spiegel, according to Business Insider.

But the alleged demands for staff surveillance didn't stop there. According to the German news site The Local, which reported on the Der Spiegel exposé, the unnamed source said he was asked to install tiny cameras in staff locker rooms and was threatened with losing his job when he refused. (more)

Computer Anti-Virus King Becomes a Spy?!?! ...you decide.

Remember John McAfee? ...the man who, just weeks ago, went on the run from Belize after his neighbor was found murdered, claiming that the police wanted to kill him and frame him for the murder. 

He fled to Guatamala,...arrived in the US shortly after, and now he’s pecking out his tell-all tale via his blog, where he describes himself as the head of his own private spy operation.

According to the post he... purchased 75 laptops, loaded them with “invisible keystroke logging software,” packaged them back up so none would be the wiser, and gave them away to those in positions of power: law enforcement, government employees, etc. The software then sent McAfee text files of what was typed, and he soon had access to a variety of social media and email accounts.

Soon after, he amassed 23 women and six men whom he calls his operatives; eight of the women, he said, were so accomplished at their missions that they ended up living with him...


Of course, it’s important to remember some things: McAfee is known to be involved in drugs, even having had his place in Belize raided at one point on suspicion of meth manufacturing. (more)

Trakdot - Smart Baggage Surveillance

Paranoid about your luggage? 
Did it make the plane? 
Did it make the wrong plane? 
Where is it now? 

In March, you may be able to pinpoint where your luggage is even before the airline!

"Trakdot™ Luggage is constantly monitoring the cellular network to determine it's city location. When you fly, Trakdot™ Luggage knows and goes to sleep. Upon arriving at your destination, Trakdot™ Luggage wakes up and reports it's new location. Depending on your preferences, a text-message or email is sent to you confirming that your luggage has arrived with you." (more)

Apps for Investigators - Takes the legwork out of finding the most useful investigative tools

There are hundreds of thousands of apps out there, but only a select few are truly useful to the private investigator, private detective and law enforcement professional. 

You will find those apps at a new web site called Apps for Investigators.

David Ziegler has done the legwork of testing and evaluating apps for iphones, Androids, Blackberrys and ipad and other tablets. 


The web site lists apps that save investigators time and money, and assists them in the field. A small sampling may be may be seen immediately, and getting to the gold mine requires a simple log-in.

Need to know about new investigator-vetted apps more quickly? Follow Dave on Twitter.

Friday, January 4, 2013

Released: SpyWarn - Android Smartphone Anti-Spyware App

SpyWarn the simple-to-use forensic evaluation tool, used to check Android cell phones for spyware. Its unique forensic methodology makes it impossible to miss active spyware. 

SpyWarn™ begins with a FREE diagnostic survey – like a private consultation with a forensic expert. 

Based on your answers, a vulnerability Threat Level for your phone is computed.

If your Threat Level is low, there is little need to worry. Keep the app handy for future tests. If the Threat Level is medium to high, conduct further testing with SpyWarn PRO (an in-app upgrade). 

Additional features found in SpyWarn PRO:
• Automated analysis of key internal phone functions affected by spyware.
• An eBook version of, "Is My Cell Phone Bugged? Everything you need to know to keep your mobile communications private." (152 pages, $17.95 in hardcover.)
• An automatic Eavesdropping Alert function.
• Data and power statistics.
• A data & power graph.
• A history of every analysis you conduct.


Other "spyware detection" apps only scan for known spyware files. New or well hidden spyware is missed. SpyWarn's unique forensic methodology makes it impossible to miss active spyware. Available at Google Play. (more)

Security Director Alert - VoIP Phone Eavesdropping

Murray Associates warns clients that VoIP phones are inherently less secure than the older style phones. It is one reason they advise disconnecting phones in meeting rooms until they are needed. 

Ang Cui, through his extensive research, has moved this threat from theoretical to very real. 

For in-depth information we recommend viewing his presentation. (video)

High-tech telephones common on many workplace desks in the U.S. can be hacked and turned into eavesdropping devices, researchers at Columbia University have discovered.

The hack, demonstrated for NBC News, allows the researchers to turn on a telephone's microphone and listen in on conversations from anywhere around the globe. The only requirement, they say, is an Internet connection.

Doctoral candidate Ang Cui and Columbia Professor Sal Stolfo, who discovered the flaw while working on a grant from the U.S. Defense Department, say they can remotely order a hacked telephone to do anything they want and use software to hide their tracks. For example, they said they could turn on a webcam on a phone equipped with one or instruct the phone's LED light to stay dark when the phone's microphone has been turned on, so an eavesdropping subject wouldn’t be alerted that their phone has been hacked. (more)

Once upon a time... privacy was the norm.

via cnet.com...

Obama extends government wireless (should be warrantless) wiretapping for another five years -- and the public reacts with a big yawn... 

"Never say die."
...sound of silence greet(ed) the five-year extension of extraordinary spying powers handed to the National Security Agency. Even in an age when attention deficit disorder seems to be the default mode, this was something else. In the closing days of 2012, President Obama signed into law a bill that lets the government avoid judicial review, leaving the NSA free through the end of his term to intercept international e-mails and phone calls without needing a court order. (The new law is awkwardly named the FISA Amendments Act Reauthorization Act of 2012, and it reauthorizes 2008's FISA Amendments Act, which modified the Foreign Intelligence Surveillance Act.) (more)