Saturday, February 2, 2013

See What Drones See

These unmanned flying robots–some as large as jumbo jets, others as small as birds–do things straight out of science fiction. 

Much of what it takes to get these robotic airplanes to fly, sense, and kill has remained secret. But now, with rare access to drone engineers and those who fly them for the U.S. military, NOVA reveals the amazing technologies that make drones so powerful as we see how a remotely-piloted drone strike looks and feels from inside the command center.

From cameras that can capture every detail of an entire city at a glance to swarming robots that can make decisions on their own to giant air frames that can stay aloft for days on end, drones are changing our relationship to war, surveillance, and each other. And it's just the beginning. Discover the cutting edge technologies that are propelling us toward a new chapter in aviation history as NOVA gets ready for "Rise of the Drones." 

Sneak preview...

The full program is available on-line. ~Kevin

Experts warn on wire-tapping of the cloud

Leading privacy expert Caspar Bowden has warned Europeans using US cloud services that their data could be snooped on.

In a report, he highlights how the Foreign Intelligence Surveillance Act Amendment Act (FISAAA) allows US authorities to spy on cloud data.

This includes services such as Amazon Cloud Drive, Apple iCloud and Google Drive.

He told the BBC this heralded a new era of "cloud surveillance". (more)

Man held on suspicion of business espionage

UK - A 52-YEAR-OLD man was arrested yesterday in Oxfordshire on suspicion of business espionage. The Metropolitan Police Service made the arrest as part of Operation Tuleta, an investigation into criminal breaches of privacy... The arrest, the 20th in Operation Tuleta, is part of the Kalmyk investigative strand of inquiry relating to computer hacking offenses. (more)

New Report: Drones Could Be Used for Stalking, Voyeurism

The sight of a drone in flight is likely to become a regular occurrence in the United States within the next few years. But the rise of unmanned technology could lead to new crimes like “drone stalking” and “drone trespassing,” lawmakers are being told. 

A Congressional Research Service report published Wednesday, Integration of Drones Into Domestic Airspace: Selected Legal Issues, sets out the many contentious areas around unmanned aircraft. It cautions that in the future, as drones become more easily available to private citizens, we may see the technology used to commit various offenses. This could mean neighbors using drones to infiltrate one another’s gardens as a means of harassment, or a voyeur using one strapped with a camera and microphone to photograph women and listen in on people’s conversations.

“Traditional crimes such as stalking, harassment, voyeurism, and wiretapping may all be committed through the operation of a drone,” the report says. “As drones are further introduced into the national airspace, courts will have to work this new form of technology into their jurisprudence, and legislatures might amend these various statutes to expressly include crimes committed with a drone.”

Of particular note is a section in the report titled “Right To Protect Property From Trespassing Drones.” It outlines that in certain instances, under a section of tort law, “a landowner would not be liable to the owner of a drone for damage necessarily or accidentally resulting from removing it from his property.” This doesn’t necessarily mean that you can “use force”—like shooting the thing down—if someone flies an unmanned aircraft onto your property. But it does mean you could remove a drone from your property without resorting to force, and if it were “accidentally” damaged in that process, you might not be in trouble. (more)

Alerts sent in by our Blue Blaze Irregulars this week...

• "Time to take the glue gun to your USB ports." Data exfiltration using a USB keyboard. 

• "Dust off your information security policy (or start putting one in place…)" Do you have a comprehensive information security program? Many businesses are still operating without one, leaving them open to preventable data breaches.
 
• "Enough already: encrypt those portable devices" The U.S. Federal Trade Commission (FTC) announced it had reached a settlement with a cord blood bank in respect of the loss of nearly 300,000 customers’ personal information. ...The information had been stored on unencrypted backup tapes, an external hard drive and a laptop that were stolen from a backpack left in an employee’s car.

• “This call may be recorded” - Ninth Circuit says disclaimer not always necessary. But it’s still a good idea! 

• "Man cleared of spying on his wife via computer software..." His attorney argued that prosecutors could not prove why Ciccarone used the software.

• "Nestlégate" Court convicts Nestle of "spying" on Swiss activists. (vintage commercial)



Friday, February 1, 2013

From the Business Spy's Toolkit - NoteMark

Unlike other miniature scanners, the NoteMark is equipped with a 5-megapixel sensor with an auto-focus lens that can capture an image instantly. Twisting the top of the pen readies the sensor, while a button on the side activates the shutter.

The sensor is capable of digitizing just about any information put in front of it, from a small blurb in a magazine to an entire whiteboard of notes. Each picture is captured as a sharp 2048 x 1536-resolution JPEG and stored in the pen's 1GB of flash memory, which can hold up to 1,000 images. The pen also features a microphone and can record up to 1,000 one-minute voice clips in WAV format.

It takes one hour to fully charge the scanner through USB, which gives it enough power to take about 300 images. Once the images or audio clips are saved, you can access them by plugging the NoteMark into any Mac or PC and even sync them across computers and mobile devices using software from Evernote.

It's a fairly simple device, but one that could no doubt save a lot of time and hassle for both office workers and James Bond alike. ($124.95)
(more)

Wednesday, January 30, 2013

Free Stuff Alert: Encryption / Compression Program

Sophos Free Encryption
reviewed by
 
Product Information:
Title: Sophos Free Encryption
Company: Sophos Ltd.
Product URL: http://www.sophos.com/en-us/products/free-tools/sophos-free-encryption.aspx
Supported OS: Windows 2000, XP, Vista, 7 and 8
Price: Free
Rating: 5 out of 5
Bottom Line: Sophos delivers an excellent freeware utility for securing document files with sensitive data inside AES encrypted archives. The software is easy to use and offers nice features to boot.

Sophos Free Encryption is a tool that works like a zip program, but with the added aforementioned encryption, which is AES-256-bit for good measure. Digging a bit into this product, I noticed a few niceties that the competition doesn’t really have in the security department, namely in how it handles passwords and the self-extracting archive feature. For a free tool, this beats its competitor SecureZIP by PKWare, which actually costs money to do the same thing. (more)

Also available... FREE Data Security Toolkit ~Kevin

Friday, January 25, 2013

Who's Watching Your Webcam

About this time last year I reported on hacking Internet-connected video security cameras. Now, let's watch another aspect of the problem, personal webcam spying...


Depending upon how old you are, you will recognize this is a reoccurring theme in works of fiction...

1998 - The Truman Show
The film chronicles the life of a man who is initially unaware that he is living in a constructed reality television show, broadcast around the clock to billions of people across the globe.

1964 - Wendy and Me
George Burns as landlord would watch his attractive young tenant on what appears to the modern eye to be a surreptitious closed circuit television transmission with hidden cameras (he also accomplished this with his "TV in the den" in later episodes of The Burns and Allen Show). 

1949 - 1984 
George Orwell predicts a populace kept under constant surveillance by closed-circuit security cameras that transmit footage back to Big Brother.

1939 - Television Spy

FutureWatch: Dual Personality Smartphones

A persistent headache for IT administrators dealing with BYOD in the workplace is how to keep sensitive company data safe even as more and more employee-owned devices are allowed into the corporate network.

 

Fujitsu Laboratories is working on a solution to the problem which its engineers hope to roll out some time this year. (more)

Security Directors: FREE Security White Paper - "Surreptitious Workplace Recording ...and what you can do about it."   

Security Director Alert: Free Anti-Theft Tracking for PC & Phone

Prey, an open source, cross-platform anti-theft tracker that lets you keep track of all your devices easily in one place. Whatever your device, chances are Prey has you covered as there are installers available for Windows, Mac, Linux, Ubuntu, Android, and iOS.

Prey is easy to use. First off, you download and install the right version for your hardware. Then, after you've created an account and got it set up the way you want, you can forget about it until the day that your device is lost or stolen.

As soon as you discover that your hardware has been lost or stolen, you can activate prey by logging into your account and select the device 'missing-in-action'. Then, Prey's servers send a signal to the device -- either over the Web or with a text message -- that kicks Prey into action, gathering information such as location, hardware details and network status information. You can also capture screen shots, take pictures with the forward-facing camera, and even lock the system down to prevent further intrusion.

Prey offers a free, unlimited, 3-device account for anyone wanting to give the software a try. There are also premium account options that increase the device limit and add features such as automated deployment and full SSL encryption of all gathered data.
 

Putting a mechanism in place for recovering your lost or stolen hardware before the worst happens gives you a fighting chance of being able to find your hardware, or at worst, keep your data away from prying eyes. (more)

Note: My testing revealed one possible glitch. If your device does not have GPS capability (laptop, for example), the location being reported may belong to a service provider's IP address. In my case, the local phone company's DSL lines terminate in a town about 30 miles away. Otherwise, the system works great. No reason not to have this capability. ~Kevin

Today in Telephone History

On Jan. 25, 1915, the inventor of the telephone, Alexander Graham Bell, inaugurated U.S. transcontinental telephone service. (more)

By this time wiretapping was already over 50 years old. ~Kevin

Thursday, January 24, 2013

Flip Phones Keep Japanese Wives from Flipping Out

Japanese philanderers know their weak spot: the smartphone. 

Afraid that girlfriends and wives will spot incoming calls from certain secret someones, Lotharios in Japan are sticking with Fujitsu's old "F-Series" flip phones, the Wall Street Journal reports. 

The so-called "infidelity phones" can easily be programmed to conceal calls and texts from particular contacts.

Fujitsu has added similar privacy features to its new lineup. Like the F-Series, these phones signal users with little changes of the antenna or battery mark. Only problem: they require a separate app. 

US entrepreneur Neal Desai has designed a similar app called Call and Text Eraser that's been downloaded more than 10,000 times—but he cooed when told about the F-Series: "That's more genius than my app," he said. (more)

If a tree falls in the forest, and nobody hears it...

Trees in Brazil’s Amazon rainforest are being fitted with mobile phones in an attempt to tackle illegal logging and deforestation.

Devices smaller than a pack of cards are being attached to the trees in protected areas to alert officials once they are cut down and the logs are transported. 

Location data is sent from sensors once the logs are within 20 miles of a mobile phone network to allow Brazil’s environment agency to stop the sale of illegal timber. The technology, called Invisible Tracck, which is being piloted by Dutch digital security company Gemalto, has a battery life of up to a year and has been designed to withstand the Amazonian climate. (more)

Wednesday, January 23, 2013

Audio Steganography - SkyDe, as in Skype Hide

Those awkward silences during phone calls can communicate a lot. Especially if you're sending hidden messages during them. 

Computer scientists at the Warsaw University of Technology have come up with a way to secretly send nearly 2000 bits of encrypted data per second during a typical Skype conversation by exploiting the peculiarities of how Skype packages up voice data. They reported their findings this week...

First the researchers noted that even when there's silence in a Skype call, the software is still generating and sending packets of audio data. After analyzing Skype calls, they found that they could reliably identify those silence packets, because they were only about half the size of packets containing voices. SkyDe (for Skype Hide) encrypts your hidden message, grabs a certain portion of outgoing silence packets, and stuffs the encrypted message into them. (more)

Important point: Conventional steganography hides data within photos and pictures. Downside... Your hidden message may languish on servers in multiple places for a long time, where it could eventually be discovered. Sky-De reduces this vulnerability. ~Kevin

Who Is Tracking You On-Line - Infographic

How do the digital detectives on the net snare you? 
This infographic makes the mysterious, fathomable...
 
See the full graphic here.