Monday, May 6, 2013
FutureWatch - The Latest in TSCM-ware
A Princeton University team has successfully merged electronics and biology to create a functional ear that can “hear” radio frequencies. The tissue and antenna were merged via the use of an “off-the -shelf” 3D printer, and the results have the potential to not only restore but actually enhance human hearing in the future...
The ear itself consists of a coiled antenna within a cartilage structure, with two wires leading from the base and winding around the helical “cochlea” – the area of the ear that senses sound. The signal registered by the antenna could be connected to a patient's nerve endings in a similar way to a hearing aid, restoring and improving their ability to hear. (more & more)
Labels:
FutureWatch,
Hack,
TSCM,
weird,
wireless,
X-Ray Vision
New York Times - Quote of the Day - Tapped Out On Taps
"I'm so jaded at this point that I'm not surprised. And from my perspective, let them all wear wires. Let's catch everybody. Maybe if we clean out the whole system, we can move forward."
~STATE SENATOR TONY AVELLA, a Queens Democrat, on the disclosure that a second state legislator had been secretly recording conversations with colleagues.
~STATE SENATOR TONY AVELLA, a Queens Democrat, on the disclosure that a second state legislator had been secretly recording conversations with colleagues.
Thursday, May 2, 2013
Secrets of The Dead - Uncensored recordings of Nazi elite
Sixty years after an MI19 bugging operation of German POWs, Secrets of The Dead brings hours of chilling and totally uncensored recordings of Nazi elite to life through intense, full-dialogue dramatic reconstructions.
Hearing these shocking conversations will be like taking a time machine back into psyche of Hitler's Germany. For more, visit http://www.pbs.org/wnet/secrets/
Hearing these shocking conversations will be like taking a time machine back into psyche of Hitler's Germany. For more, visit http://www.pbs.org/wnet/secrets/
Jam Da Cam - Stick it to Da Hacker Man
CamJAMR is a reusable plastic film sticker that fits over camera lenses installed on computers, tablets and smart phones. Web developer Josh Luft, 24...
To thwart any unwanted spying, Luft, who creates websites in Somers, first put Post-It notes over his computer’s web camera. The sticky papers kept falling off, so Luft began researching materials until he settled on a plastic film similar to the removable plastic films that cover screens on new cellphones.
Luft’s website, CamJAMR.com, sells the sticker packages of 12 lens covers for $4.99. The covers have various sizes to fit computer and cellphone cameras. The stickers leave no residue on the lenses, he said.
To thwart any unwanted spying, Luft, who creates websites in Somers, first put Post-It notes over his computer’s web camera. The sticky papers kept falling off, so Luft began researching materials until he settled on a plastic film similar to the removable plastic films that cover screens on new cellphones.
Luft’s website, CamJAMR.com, sells the sticker packages of 12 lens covers for $4.99. The covers have various sizes to fit computer and cellphone cameras. The stickers leave no residue on the lenses, he said.
Today: Hackers 2, FBI 0
A federal magistrate judge has denied (PDF) a request from the FBI to install sophisticated surveillance software to track someone suspected of attempting to conduct a “sizeable wire transfer from [John Doe’s] local bank [in Texas] to a foreign bank account.”
Back in March 2013, the FBI asked the judge to grant a month-long “Rule 41 search and seizure warrant” of a suspect’s computer “at premises unknown” as a way to find out more about these possible violations of “federal bank fraud, identity theft and computer security laws.” In an unusually public order published this week, Judge Stephen Smith slapped down the FBI on the grounds that the warrant request was overbroad and too invasive. In it, he gives a unique insight as to the government’s capabilities for sophisticated digital surveillance on potential targets.
According to the judge’s description of the spyware, it sounds very similar to the RAT software that many miscreants use to spy on other Internet users without their knowledge. (more)
Back in March 2013, the FBI asked the judge to grant a month-long “Rule 41 search and seizure warrant” of a suspect’s computer “at premises unknown” as a way to find out more about these possible violations of “federal bank fraud, identity theft and computer security laws.” In an unusually public order published this week, Judge Stephen Smith slapped down the FBI on the grounds that the warrant request was overbroad and too invasive. In it, he gives a unique insight as to the government’s capabilities for sophisticated digital surveillance on potential targets.
According to the judge’s description of the spyware, it sounds very similar to the RAT software that many miscreants use to spy on other Internet users without their knowledge. (more)
Google Glass Hacked - Everything You See and Hear Transmitted to Anyone
Google's Glass wearable computer have been hacked so video and audio can be transmitted online to anyone.
Hackers have been able to remotely watch and hear everything a wearer does, and today warned 'nothing is safe once your Glass has been hacked.'
Although Glass does not go on sale to the public until next year, the attack raises major security and privacy questions over Google's plans for the device. (more)
Hackers have been able to remotely watch and hear everything a wearer does, and today warned 'nothing is safe once your Glass has been hacked.'
Although Glass does not go on sale to the public until next year, the attack raises major security and privacy questions over Google's plans for the device. (more)
Labels:
amateur,
eavesdropping,
FutureWatch,
Hack,
spycam,
spyware
Computer Expert Hacked Neighbors’ Wi-Fi - Spied on Hundreds
Spain - A pedophile computer expert spied on hundreds of his neighbors by hacking into their Wi-Fi and taking control of their webcams, Spanish police said.
The 34-year-old is accused of recording thousands of hours’ worth of intimate material — which included numerous sexual encounters of his unsuspecting victims.
He then posted some of the footage online. (Darwin Award)
Police say he cracked modem passwords to access PCs. He then installed a Trojan virus — letting him watch via the webcam exactly what the laptop owner was doing. (more)
The 34-year-old is accused of recording thousands of hours’ worth of intimate material — which included numerous sexual encounters of his unsuspecting victims.
He then posted some of the footage online. (Darwin Award)
Police say he cracked modem passwords to access PCs. He then installed a Trojan virus — letting him watch via the webcam exactly what the laptop owner was doing. (more)
Wednesday, May 1, 2013
"When spycam hits your eye, like a big pizza pie, that's-a-boring..."
Yet another strange use for spycams...
...or...
New from the Science Channel... if you like "How It's Made", you'll love "Watch It Made!"
...or...
New from the Science Channel... if you like "How It's Made", you'll love "Watch It Made!"
Tuesday, April 30, 2013
KGB Hotel Listening Post Now a Tourist Museum
Estonia - Old Town Tallinn in Estonia feels like it should be on top of a wedding cake, the old city walls, church steeples, narrow cobblestone streets, and pastel colors putting forth a true Medievil vibe...
There are many hotels located within the Old Town walls to choose from, but if you want a true taste of KGB history during your visit, consider the Sokos Hotel Viru just outside Old Town. Opened in 1972, it's the largest hotel in Estonia with over 500 rooms, and during Soviet occupation, the KGB had an office on the top floor (the 23rd floor, which did not have a button on the elevator).
They always denied their presence, but they bugged the guests, literally.
The KGB tapped 60 rooms, installed mics in the plates in the dining room, instructed elevator attendants to keep track of guests’ comings and goings, and drilled holes through hotel room walls to take photographs and keep a watch on suspected guests, which included visiting journalists and Finnish visitors who would hold meet and greets with their families in the lobby (the visiting Fins weren’t allowed to visit their family in their homes under Soviet Law). Even if you don’t stay the night, be sure to pop in for a drink and to check out the museum that allows you to tour the former KGB offices. (more)
There are many hotels located within the Old Town walls to choose from, but if you want a true taste of KGB history during your visit, consider the Sokos Hotel Viru just outside Old Town. Opened in 1972, it's the largest hotel in Estonia with over 500 rooms, and during Soviet occupation, the KGB had an office on the top floor (the 23rd floor, which did not have a button on the elevator).
They always denied their presence, but they bugged the guests, literally.
The KGB tapped 60 rooms, installed mics in the plates in the dining room, instructed elevator attendants to keep track of guests’ comings and goings, and drilled holes through hotel room walls to take photographs and keep a watch on suspected guests, which included visiting journalists and Finnish visitors who would hold meet and greets with their families in the lobby (the visiting Fins weren’t allowed to visit their family in their homes under Soviet Law). Even if you don’t stay the night, be sure to pop in for a drink and to check out the museum that allows you to tour the former KGB offices. (more)
Sunday, April 28, 2013
Spybuster Tip # 523: Twitter Password Security Test
WARNING
The link below is a clever gag.
Similar sites are password collection scams.
If you take the test on any of them, don't enter real information.
http://www.ismytwitterpasswordsecure.com/
The link below is a clever gag.
Similar sites are password collection scams.
If you take the test on any of them, don't enter real information.
http://www.ismytwitterpasswordsecure.com/
Saturday, April 27, 2013
FutureWatch: Trojan Horse Wi-Fi's and More - In Your Mail
This promotion is legitimate.
But, imagine this small, inexpensive technology as an espionage tool...
Microsoft is putting in real WiFi hardware hotspots inside some copies of the latest issue of Forbes magazine. The unique Office 365 promotion was revealed in a post on the Slickdeals.net message board. The WiFi router, when activated, offers 15 days of free WiFi service via T-Mobile's network on up to five devices at once.
In any case, if you get one of these Forbes magazine ads, keep in mind that the router still needs to be charged; it apparently lasts up to three hours on a single charge. (more)
BTW, for your techie types, it uses a Mediatek chip (RT5350), "The world's smallest wireless router-on-a-chip."
Hiding electronic gadgets in the mail is not a new idea.
Many years ago, a company hollowed out a book, planted a computer mouse inside, and mailed it to top executives.
We detected one of these books during a weekend sweep. It was on an executive's desk, in the unopened mail.
Was it a bug?
Was it a bomb?
No, just a insensitive marketing gag.
Apparently, the company is no longer in business.
FutureWatch: This will happen again, but next time it might be a bug ...or, a bomb.
Regularly scheduled TSCM inspections can find these things lurking in your office.
But, imagine this small, inexpensive technology as an espionage tool...
Microsoft is putting in real WiFi hardware hotspots inside some copies of the latest issue of Forbes magazine. The unique Office 365 promotion was revealed in a post on the Slickdeals.net message board. The WiFi router, when activated, offers 15 days of free WiFi service via T-Mobile's network on up to five devices at once.
In any case, if you get one of these Forbes magazine ads, keep in mind that the router still needs to be charged; it apparently lasts up to three hours on a single charge. (more)
BTW, for your techie types, it uses a Mediatek chip (RT5350), "The world's smallest wireless router-on-a-chip."
Hiding electronic gadgets in the mail is not a new idea.
Many years ago, a company hollowed out a book, planted a computer mouse inside, and mailed it to top executives.
We detected one of these books during a weekend sweep. It was on an executive's desk, in the unopened mail.
Was it a bug?
Was it a bomb?
No, just a insensitive marketing gag.
Apparently, the company is no longer in business.
FutureWatch: This will happen again, but next time it might be a bug ...or, a bomb.
Regularly scheduled TSCM inspections can find these things lurking in your office.
Labels:
advice,
book,
business,
cautionary tale,
computer,
espionage,
find,
FutureWatch,
Hack,
marketing,
TSCM,
weird
Friday, April 26, 2013
How to Bug an Entire Country - Drop Poop & Rocks
During the Cold War, both sides liberally used the “bug”--the remote listening device--to surreptitiously get wind of what the other side was up to by listening in on a room, a building, or, in the case of East Berlin, an entire city.
But in America’s cooling war in Afghanistan, U.S. forces may undertake what could be the biggest bugging operation of all time, planting sensors all over the entire country that could feed the U.S. military intelligence from inside that country for the next two decades. It’s the rough equivalent of bugging an entire country.
The palm-sized devices at the U.S. military’s disposal aren’t listening devices per se, but they would detect anyone moving nearby and report the movement back to an intelligence outpost, letting special operators know when a remote mountain pass or a known smuggling trail is being utilized. Some of the sensors could be buried, others disguised as rocks or other geological artifacts.
The point is, they would be littered all across Afghanistan’s landscape, a lingering legacy of a decade-long conflict that would last 20 years more. (more)
Click to enlarge |
The palm-sized devices at the U.S. military’s disposal aren’t listening devices per se, but they would detect anyone moving nearby and report the movement back to an intelligence outpost, letting special operators know when a remote mountain pass or a known smuggling trail is being utilized. Some of the sensors could be buried, others disguised as rocks or other geological artifacts.
CIA monkey poop sensor - Vietnam era. |
Labels:
CIA,
detection,
government,
Hack,
historical,
spybot,
surveillance,
tracking,
weird
Interesting Security Technologies - Sunpass Bug & Butterfly Authentication
Doug Blakeway, President & CEO, Nanotech Security Corp., reveals new surveillance technologies in the company's Annual Report...
(from their subsidiary) "The CTR-1300 JOEY, a disguised Variable Power Audio Transmitter Utilizing a new LiPo internal battery and incorporated into the Garage Door Opener, EZ Pass, and Sunpass as disguises."
and, the latest in anti-counterfeiting technology...
"Nanotech is developing what it sees as a highly sophisticated and commercially viable nanotechnology for use in anti-counterfeiting as well as product and document authentication. It will potentially be used to authenticate a huge range of items, including currency, legal documents and commercial products.
The specialized optical features are comprised of arrays of hundreds of millions of nano-holes–implanted directly onto various substrates and which emit unique light signatures that we believe cannot be reproduced by a counterfeiter.
KolourOptics® is the trade name for this revolutionary authentication feature which produces nano-scale surface structures similar to those found on the wings of the iridescent blue Morpho Butterfly.
The features can be directly applied to banknotes and other valuable documents and products and will produce light signatures are both “overt” (visible to the naked eye) and some that are “covert” (machine readable only)." (more)
(from their subsidiary) "The CTR-1300 JOEY, a disguised Variable Power Audio Transmitter Utilizing a new LiPo internal battery and incorporated into the Garage Door Opener, EZ Pass, and Sunpass as disguises."
and, the latest in anti-counterfeiting technology...
Click to enlarge. |
The specialized optical features are comprised of arrays of hundreds of millions of nano-holes–implanted directly onto various substrates and which emit unique light signatures that we believe cannot be reproduced by a counterfeiter.
KolourOptics® is the trade name for this revolutionary authentication feature which produces nano-scale surface structures similar to those found on the wings of the iridescent blue Morpho Butterfly.
The features can be directly applied to banknotes and other valuable documents and products and will produce light signatures are both “overt” (visible to the naked eye) and some that are “covert” (machine readable only)." (more)
Spouse Spying Increase Seen By 92% of Divorce Attorneys
In this new age of technology, spy gadgets are no longer just for actors in James Bond movies. Studies show more spouses are using spy equipment to catch the other red-handed.
The American Academy of Matrimonial Lawyers says in the past three years 92 percent of divorce attorneys saw an increase in evidence from text messages, emails and GPS trackers. In fact in 2011, a Minnesota man was thrown in jail for installing a GPS on his wife's car as he searched for proof she was cheating.
The American Academy of Matrimonial Lawyers says in the past three years 92 percent of divorce attorneys saw an increase in evidence from text messages, emails and GPS trackers. In fact in 2011, a Minnesota man was thrown in jail for installing a GPS on his wife's car as he searched for proof she was cheating.
Labels:
amateur,
eavesdropping,
historical,
lawsuit,
mores,
poll,
privacy,
recording,
spycam,
spyware,
surveillance,
survey,
tracking,
wiretapping
Thursday, April 25, 2013
Latest in Government Work Clothes - Immunity Suits
...documents show that the Justice Department secretly agreed to provide AT&T and other participating providers with so-called “2511 letters” that granted them immunity for activity that might otherwise have violated federal wiretapping laws. (more)
Subscribe to:
Posts (Atom)