About this time last year I reported on hacking Internet-connected video security cameras. Now, let's watch another aspect of the problem, personal webcam spying...
Depending upon how old you are, you will recognize this is a reoccurring theme in works of fiction...
1998 - The Truman Show The film chronicles the life of a man who is initially unaware that he is living in a constructed reality television show, broadcast around the clock to billions of people across the globe.
1964 - Wendy and Me George Burns as landlord would watch his attractive young tenant on what
appears to the modern eye to be a surreptitious closed circuit
television transmission with hidden cameras (he also accomplished this
with his "TV in the den" in later episodes of The Burns and Allen Show).
1949 - 1984 George Orwell predicts a populace kept under constant surveillance by closed-circuit security cameras that transmit footage back to Big Brother.
A persistent headache for IT administrators dealing with BYOD in the workplace is how to keep sensitive company data safe even as more and more employee-owned devices are allowed into the corporate network.
Prey, an open source, cross-platform anti-theft tracker that lets you keep track of all your devices easily in one place. Whatever your device, chances are Prey has you covered as there are installers available for Windows, Mac, Linux, Ubuntu, Android, and iOS.
Prey is easy to use. First off, you download and install the right version for your hardware. Then, after you've created an account and got it set up the way you want, you can forget about it until the day that your device is lost or stolen.
As soon as you discover that your hardware has been lost or stolen, you can activate prey by logging into your account and select the device 'missing-in-action'. Then, Prey's servers send a signal to the device -- either over the Web or with a text message -- that kicks Prey into action, gathering information such as location, hardware details and network status information. You can also capture screen shots, take pictures with the forward-facing camera, and even lock the system down to prevent further intrusion.
Prey offers a free, unlimited, 3-device account for anyone wanting to give the software a try. There are also premium account options that increase the device limit and add features such as automated deployment and full SSL encryption of all gathered data.
Putting a mechanism in place for recovering your lost or stolen hardware before the worst happens gives you a fighting chance of being able to find your hardware, or at worst, keep your data away from prying eyes. (more) Note: My testing revealed one possible glitch. If your device does not have GPS capability (laptop, for example), the location being reported may belong to a service provider's IP address. In my case, the local phone company's DSL lines terminate in a town about 30 miles away. Otherwise, the system works great. No reason not to have this capability. ~Kevin
On Jan. 25, 1915, the inventor of the telephone, Alexander Graham Bell, inaugurated U.S. transcontinental telephone service. (more) By this time wiretapping was already over 50 years old. ~Kevin
Japanese philanderers know their weak spot: the smartphone.
Afraid that girlfriends and wives will spot incoming calls from certain secret someones, Lotharios in Japan are sticking with Fujitsu's old "F-Series" flip phones, the Wall Street Journal reports.
The so-called "infidelity phones" can easily be programmed to conceal calls and texts from particular contacts.
Fujitsu has added similar privacy features to its new lineup. Like the F-Series, these phones signal users with little changes of the antenna or battery mark. Only problem: they require a separate app.
US entrepreneur Neal Desai has designed a similar app called Call and Text Eraser that's been downloaded more than 10,000 times—but he cooed when told about the F-Series: "That's more genius than my app," he said. (more)
Trees in Brazil’s Amazon rainforest are being fitted with mobile phones in an attempt to tackle illegal logging and deforestation.
Devices smaller than a pack of cards are being attached to the trees in protected areas to alert officials once they are cut down and the logs are transported.
Location data is sent from sensors once the logs are within 20 miles of a mobile phone network to allow Brazil’s environment agency to stop the sale of illegal timber. The technology, called Invisible Tracck, which is being piloted by Dutch digital security company Gemalto, has a battery life of up to a year and has been designed to withstand the Amazonian climate. (more)
First the researchers noted that even when there's silence in a Skype call, the software is still generating and sending packets of audio data. After analyzing Skype calls, they found that they could reliably identify those silence packets, because they were only about half the size of packets containing voices. SkyDe (for Skype Hide) encrypts your hidden message, grabs a certain portion of outgoing silence packets, and stuffs the encrypted message into them. (more) Important point: Conventional steganography hides data within photos and pictures. Downside... Your hidden message may languish on servers in multiple places for a long time, where it could eventually be discovered. Sky-De reduces this vulnerability. ~Kevin
Unmanned aerial vehicles (UAVs or "drones") are fast becoming an ever-present eye in the sky, potentially granting governments greater strike and surveillance capabilities than even Orwell’s fictional Big Brother could hope to wield. In response, NYC artist Adam Harvey has created a series of garments which claim to reduce the effectiveness of UAVs.
Harvey’s garments include an anti-drone hoodie and scarf, which are designed to block the thermal imaging cameras used by many airborne drones. The designer also created a burqa which appears to function in much the same way.
Click to enlarge
Harvey is currently selling the designs, and would-be shoppers can pick up an anti-drone hoodie for £315 (or around US$500). The Stealth Wear collection is on display in the UK at Primitive London until January 31. (more)
Developed with Seiichi Gohshi of Kogakuin University, the visor has a near-infrared light source that messes up cameras but doesn't affect the wearer's vision, according to the institute.
They're hardly fashionable, but the lights create noise that prevents computer vision algorithms from extracting the features needed to recognize a face. (more) (get the t-shirt) (sing-a-long)
via one of our Blue Blazer irregulars... (thanks!) From Russian photoblog PhotoShtab.ru comes these great pictures of Cold War-era miniature gadgets that KGB spies and others used to monitor, smuggle, and kill (via RussiaEnglish).
Seeing as we have just seen the new adaptation of John Le Carre's Tinker Tailor Soldier Spy, these photos are a another great reminder of how paranoid and insane that whole 'Cold War' period was. (many more gadgets)
P.S. If you like seeing Cold War spy tools, your really need The Ultimate Spy Book, by historian H. Keith Melton. It is loaded with large glossy photos of the CIA's Greatest Hits, and the fascinating history of spies and their gadgets.
The Act enhances the penalties for certain violations of the Economic Espionage Act.
The purpose of the Act was to amend title 18, United States Code, to provide for increased penalties for foreign and economic espionage.
Under the Act, the upper limit of penalties for individual offenses of Section 1831(a) are increased from $500,000 to $5,000,000 and the upper limit for corporate offenses of Section 1831(b) are increased from $10,000,000 to the greater of $10,000,000 or 3 times the value of the stolen trade secret to the organization, including expenses for research and design and other costs of reproducing the trade secret that the organization has thereby avoided. (more) Why this approach alone has never worked, and what will work... "A Cunning Plan to Protect U.S. from Business Espionage"
Historian Helen Fry, who has written a book called The M Room: Secret Listeners who bugged the Nazis., says the information gleaned by the eavesdropping of the German generals was vitally important to the war effort - so much so that it was given an unlimited budget by the government.
Click to enlarge.
She believes what was learned by the M room operations was as significant as the code-breaking work being done at Bletchley Park.
"British intelligence got the most amazing stuff in bugging the conversations. Churchill said of Trent Park that it afforded a unique insight into the psyche of the enemy. It enabled us to understand the mind-set of the enemy as well as learn military secrets. "If it wasn't for this bugging operation, we may well have not won the war." (more)
A security audit of a US critical infrastructure company last year revealed that its star developer had outsourced his own job to a Chinese subcontractor and was spending all his work time playing around on the internet.
Verizon investigators found that he had hired a software consultancy in Shenyang to do his programming work for him, and had FedExed them his two-factor authentication token so they could log into his account. He was paying them a fifth of his six-figure salary to do the work and spent the rest of his time on other activities...
Further investigation found that the enterprising Bob had actually taken jobs with other firms and had outsourced that work too, netting him hundreds of thousands of dollars in profit as well as lots of time to hang around on internet messaging boards and checking for a new Detective Mittens video. (more)
Not a horse-fly, a real horse. My friend and colleague, Tim Johnson, relates the tail tale...
"I was contacted to do a debugging sweep of a company executive area and an executive residence in a midwestern state. Having concluded the examination of the offices without finding anything I proceeded to the residence where I repeated the process.
During the radio frequency examination I detected a radio frequency that I noted for additional analysis. In doing a further examination of the signal it was determined to be originating from outside the residence. This was done by moving my receiver to different locations and checking the signal strength.
There was a barn located in the general direction of the signal path so I went out and did a further check." (more)