Wednesday, January 16, 2013

What Happens When You Lose A Cell Phone?

Vodaphone wondered too...
In The Lost Phone Experiment, Vodaphone planted 100 phones throughout the Netherlands, and tracked their fortunes via a web site.  

They came up with some interesting data about how many are returned, where they traveled to, what they were used for, and by who. Open the site up using Chrome and hit "Translate" so you can read it in English. (more)

Spoiler Alert: About 30% were returned to their owners.

Cautionary Tale - Unsafe Sex, USB Style

Critical control systems inside two US power generation facilities were found infected with computer malware, according to the US Industrial Control Systems Cyber Emergency Response Team.

Both infections were spread by USB drives that were plugged into critical systems used to control power generation equipment, according to the organization's newsletter... (more

(reiteration time) - "If you are not sure where it has been, don't stick it in." 
~ Kevin

Business Espionage: AMD v. Ex-employees

AMD has filed (and been granted) a request for immediate injunctive relief against multiple former employees that it alleges stole thousands of confidential documents. Named in the complaint are Robert Feldstein, Manoo Desai, Nicholas Kociuk, and Richard Hagen. All four left AMD to work at Nvidia in the past year.

The loss of Feldstein was particularly noteworthy, as he’d been the head of AMD’s console initiatives for years. Feldstein was behind the work that landed AMD the Wii U, PS4, and Xbox Durango.

The AMD complaint states that “He [Feldstein] transferred sensitive AMD documents, and in the next six months, the three defendants either did the same thing... 


AMD claims to have forensic evidence that three of the four defendants transferred more than 10,000 confidential files in total, with the names of the files in question matching “either identically or very closely to the names of files on their AMD systems that include obviously confidential, proprietary, and/or trade secret materials related to developing technology.” (more)

Tuesday, January 15, 2013

One in Four Android Apps Pose "High Risk" to Security

Almost 25 percent of Android apps feature code that can access application permissions and cause security vulnerabilities, according to a new study by mobile security firm TrustGo.

Of the 2.3m Android apps analysed by TrustGo in the fourth quarter of 2012, 511,000 were identified as high risk, defined as being able to make unauthorised payments, steal data or modify user settings.

Not all of the apps are universally available. For example, just 10 percent of apps in the US and Western Europe had a high risk for causing security issues. While China was reported to have the most high risk apps available for download. (more)

Friday, January 11, 2013

Stingray - Clandestine Cellphone Tracking Tool - Fights On

The FBI calls it a “sensitive investigative technique” that it wants to keep secret. But newly released documents that shed light on the bureau’s use of a controversial cellphone tracking technology called the “Stingray” have prompted fresh questions over the legality of the spy tool.

Functioning as a so-called “cell-site simulator,” the Stingray is a sophisticated portable surveillance device. The equipment is designed to send out a powerful signal that covertly dupes phones within a specific area into hopping onto a fake network. 

The feds say they use them to target specific groups or individuals and help track the movements of suspects in real time, not to intercept communications. But by design Stingrays, sometimes called “IMSI catchers,” collaterally gather data from innocent bystanders’ phones and can interrupt phone users’ service—which critics say violates a federal communications law. The FBI has maintained that its legal footing here is firm. Now, though, internal documents obtained by the Electronic Privacy Information Center, a civil liberties group, reveal the bureau appears well aware its use of the snooping gear is in dubious territory...

It’s likely that in the months ahead, a few more interesting nuggets of information will emerge. The FBI has told EPIC that it holds a mammoth 25,000 pages of documents that relate to Stingray tools, about 6,000 of which are classified. The Feds have been drip-releasing the documents month by month, and so far there have been four batches containing between 27 and 184 pages each. Though most of the contents—even paragraphs showing how the FBI is interpreting the law—have been heavy-handedly redacted, several eyebrow-raising details have made it through the cut. (more) (Stingray explained)

Van Eck Grown Up - Time to look at eavesdropping on computer emissions again.

1985 - Van Eck phreaking is the process of eavesdropping on the contents of a CRT or LCD display by detecting its electromagnetic emissions. It is named after Dutch computer researcher Wim van Eck, who in 1985 published the first paper on it, including proof of concept.[1] Phreaking is the process of exploiting telephone networks, used here because of its connection to eavesdropping.

2009 - A simple experiment showing how to intercept computer keyboard emissions. 

It is notable that there is: 
no connection to the Internet; 
• no connection to power lines (battery operation); 
• no computer screen in use (eliminates the screen emissions possibility); 
• and no wireless keyboard or mouse. 
Intercepted emissions are solely from the hard-wired keyboard.

The interception antenna is located about one meter away. (This is why we look for antenna wires under desks, and metal parts on desks to which wiring is attached.) 
(video 1) (video 2)

The point is, if one can get an antenna withing close proximity of your computer, what you type belongs to them.

 
December 2012 - Not satisfied with pulling information from your keyboard, injecting information becomes a concern (pay attention investment firms).

"The roughly half-dozen objectives of the Tactical Electromagnetic Cyber Warfare Demonstrator program are classified, but the source said the program is designed to demonstrate ready-made boxes that can perform a variety of tasks, including inserting and extracting data from sealed, wired networks.

Being able to jump the gap provides all kinds of opportunities, since an operator (spy) doesn’t need to compromise the physical security of a facility to reach networks not connected to the Internet. Proximity remains an issue, experts said, but if a vehicle can be brought within range of a network, both insertion and eavesdropping are possible." (more)


2013 is going to be an interesting year. ~Kevin

'Spy News from New York' shows off NYC

New York in stunning 360 degree detail — A photographer has created a stunning interactive image of New York, giving a detailed 360 degree tour of Manhattan.

Click to enlarge.
Sergey Semenov, a Russian, created the image by stitching together thousands of photographs of the city, taken during helicopter tours in 2011.
The interactive graphic has also been "flattened" to create a detailed 2-D image, focused on Central Park and its surrounding skyscrapers.

Mr Semenov won the best amateur award from the International Pano Awards, given out for panoric photographs, for the 2-D image. (more)


Tip: Be sure to click the 'view full screen' link for a spectacular helicopter ride around New York City, without the helicopter.

Thursday, January 10, 2013

Business Espionage Alert: China Now Blocking VPNs

The "Great Firewall of China," designed to prevent its citizens from accessing some overseas content, has apparently undergone an upgrade.

And some observers say this may not only be an effort to stop citizens from reading or viewing Western information, but also to spy on international corporations doing business in the country who encrypt their internal communications...
 

"A number of companies providing virtual private network (VPN) services to users in China say the new system is able to 'learn, discover and block' the encrypted communications methods used by a number of different VPN systems," the report said.

"China Unicom, one of the biggest telecoms providers in the country, is now killing connections where a VPN is detected, according to one company with a number of users in China," the report said.  (more) (more)

Wednesday, January 9, 2013

"1984" Gets a New Look

via creativity-online.com...
You can't judge a book by its cover, but there's no denying that a thoughtful, bold packaging can make all the difference when it comes to picking up a tome from a shelf.

Penguin Press enlisted designer David Pearson to re-do the covers of five classic George Orwell novels. Among them is this standout cover for "1984," with both the title and the author's name "blacked out." In certain lights, you can see the title, however. 

It is of course a nod to the contents of Orwell's dystopian novel, where the misnamed Ministry of Truth rewrites and falsifies history to serve its own purpose. See the covers for other Orwell books by Pearson below. (more)

Brilliant!

Investigative Journalist Finds Electronic Listening Device in Apartment

Ukraine - Lviv investigative journalist Taras Zozulinsky said he discovered an electronic listening device in his apartment on Jan. 6. He thinks it was planted because of his investigation into whether high-ranking police officers in Lviv Oblast are involved in the illicit drug trade.

"I didn't snitch on you. You snitched me!"
Police say they have launched criminal proceedings regarding intentional obstruction of journalistic activities, but complain that the newspaper is obstructing their work.

Zozulinsky said he did not trust the police, so the newspaper decided to give the device to a reliable and independent expert in Europe.

Zozulinsky said he found the device sewn to the label of a towel on a shelf and made a complaint to police the same day. Police interviewed him and searched the apartment at his request, but did not find any other bugs. (more)

My take... Until further evidence is brought forth, I'm saying he stole that towel from a hotel or a local gym, brought it home, and later discovered it had something extra in it. You can learn all about that something extra here. ~Kevin

Book Review - A Cybercop's Guide to Internet Child Safety

I am reading Glen Klinkhart's book, "A Cybercop's Guide to Internet Child Safety." After reading only two chapters, it is clear that this is a must-have book for every parent. 

The book begins with an Author's introduction. It sets the tone, i.e. Glen Klinkhart has not written this book to make a buck, he is on a much larger mission, and has the experience-clout to accomplish it. You see, when he was 15, his older sister was kidnapped, sexually assaulted and murdered. Since then, he made cyber-security his life. Having worked with his team, I know first-hand they are very good at it.

Patriculary impressive is the layout and organization of his advice and guidence. The headlines and sub-heads are clear and concise, as are the explanations which follow. It is an instant, easy-to-understand education for every parent, no matter what their previous level of Internet savvy.

Most parents will find this book is THE answer to, "What can I do?" A few may feel policing their child's cyber-activities is an Sisyphean task, and bury their heads in the silicon. But hey, who ever said parenting was easy, or that everyone was up to the task. At least, "A Cybercop's Guide to Internet Child Safety" now makes this part of parenting do-able. All of us no longer can use ignorance as an excuse. Isn't protecting your child worth $25.00?

Tuesday, January 8, 2013

From those wonderful folks who brought you Godzilla...

Two moments of security Zen, from Japan... SECOM's rentable private security drones.

"Flyzilla"



and... "Flee, puny humans. FLEE!"

   
(more)

Larry Ellison's Sailing Team Gets Caught Spying - Pay $15,000 Fine

Larry Ellison's Oracle Team has been found guilty of spying on the Italian team by an international jury of sailing experts, reports Julia Prodis Sulek at the Mercury News.

The penalty shouldn't hurt too much: they have to give up five days of practice and pay a $15,000 fine. That couch change for billionaire Ellison, one of the world's richest men with a net worth of about $41 billion, according to Bloomberg Billionaires Index.  (more)

Spies & SpyCams at the Supermarket

Germany - A former store detective who worked at the German supermarket Aldi has revealed to news outlet Der Spiegel that in addition to looking out for shoplifters, Aldi wanted him to spy on store employees and install hidden cameras.

"I had to say if an employee was working too slowly, engaged in an affair and reveal other private details such as their financial situation," the anonymous source told Der Spiegel, according to Business Insider.

But the alleged demands for staff surveillance didn't stop there. According to the German news site The Local, which reported on the Der Spiegel exposé, the unnamed source said he was asked to install tiny cameras in staff locker rooms and was threatened with losing his job when he refused. (more)

Computer Anti-Virus King Becomes a Spy?!?! ...you decide.

Remember John McAfee? ...the man who, just weeks ago, went on the run from Belize after his neighbor was found murdered, claiming that the police wanted to kill him and frame him for the murder. 

He fled to Guatamala,...arrived in the US shortly after, and now he’s pecking out his tell-all tale via his blog, where he describes himself as the head of his own private spy operation.

According to the post he... purchased 75 laptops, loaded them with “invisible keystroke logging software,” packaged them back up so none would be the wiser, and gave them away to those in positions of power: law enforcement, government employees, etc. The software then sent McAfee text files of what was typed, and he soon had access to a variety of social media and email accounts.

Soon after, he amassed 23 women and six men whom he calls his operatives; eight of the women, he said, were so accomplished at their missions that they ended up living with him...


Of course, it’s important to remember some things: McAfee is known to be involved in drugs, even having had his place in Belize raided at one point on suspicion of meth manufacturing. (more)