Undercover video shot in May by a conservative activist shows two corporate distributors of free cell phones handing out the mobile devices to people who have promised to sell them for drug money, to buy shoes and handbags, to pay off their bills, or just for extra spending cash.
The 'Obama phone,' which made its ignominious YouTube debut outside a Cleveland, Ohio presidential campaign event last September, is a project of the Federal Communications Commission's 'Lifeline' program, which makes land line and mobile phones available to Americans who meet low-income requirements. Lifeline was a $2.19 billion program in 2012. (more)
Thursday, June 27, 2013
Wednesday, June 26, 2013
Angelina Jolie Stunt Double's Wiretapping Lawsuit
Eunice Huthart, who says she worked as a stunt double for Angelina Jolie, has filed a lawsuit against News Corp. for intercepting her voice-mail messages.
The complaint was filed in California last week and is believed to be the first claim brought by a victim in the U.S. over the ongoing hacking scandal that has been haunting Rupert Murdoch's company.
Several thousands of people have been identified as phone hacking victims and News Corp. has already paid out hundreds of millions of dollars in settlement money. (more) (lawsuit)
The complaint was filed in California last week and is believed to be the first claim brought by a victim in the U.S. over the ongoing hacking scandal that has been haunting Rupert Murdoch's company.
Several thousands of people have been identified as phone hacking victims and News Corp. has already paid out hundreds of millions of dollars in settlement money. (more) (lawsuit)
Tuesday, June 25, 2013
Google Chrome Camera-Microphone Hijack Trick
An issue, previously fixed by Adobe in October 2011, has reappeared in Google Chrome and allows attackers to take control of webcams and microphones from Flash content. At its heart the problem is an old one: click-jacking.
The trick places a transparent Flash animation panel over an image and then makes the permissions dialog for accessing the webcam and microphone appear. All that is then needed is to convince the user to click on the right part of the image. In security consultant Egor Homakov's proof of concept this is done by using an image which suggests a possibly risque video is available for viewing and placing the play button where the "OK" button on the permissions dialog has been positioned. (more)
The trick places a transparent Flash animation panel over an image and then makes the permissions dialog for accessing the webcam and microphone appear. All that is then needed is to convince the user to click on the right part of the image. In security consultant Egor Homakov's proof of concept this is done by using an image which suggests a possibly risque video is available for viewing and placing the play button where the "OK" button on the permissions dialog has been positioned. (more)
Monday, June 24, 2013
Amazon Has Everything... Even CIA Documents Soon
You can now add “spymaster” to Amazon CEO Jeff Bezos’s various titles. On Friday June 14, a US Government Accountability Office (GAO) report elaborated on previous reports that Amazon had won a $600 million contract to build a “private cloud” for the CIA...[on their employment site,] Amazon is looking for engineers who already have a “Top Secret / Sensitive Compartmented Information” clearance, or are willing to go through the elaborate screening process required to get it. TS/SCI is the highest security clearance offered by the US government, and getting it requires having your background thoroughly vetted. (more)
I know what's going on my "Wish List". ~Kevin
I know what's going on my "Wish List". ~Kevin
Sunday, June 23, 2013
Run Your Own NSA with Your Old Phones and iOS Apps
Odds are, sometimes you wish you could check in on what’s happening around your home from your phone. Problem is, unless you regularly take a dip in your Scrooge McDuck money pool, decent remote-viewable camera technology is still an unaffordable luxury for most. It’s a premium feature for many alarm companies, even though the tech behind it is pretty old, and the prices on warehouse-store offerings can be steep.
People Power’s Presence and Appologics’ Airbeam apps serve roughly the same purpose: repurposing iOS devices you already own into always-connected cameras that you can check in with anywhere. While similar on the surface, the underpinnings of the two apps are very different. We’ll shed some light on why this matters so you can decide which is right for you. (more)
People Power’s Presence and Appologics’ Airbeam apps serve roughly the same purpose: repurposing iOS devices you already own into always-connected cameras that you can check in with anywhere. While similar on the surface, the underpinnings of the two apps are very different. We’ll shed some light on why this matters so you can decide which is right for you. (more)
Saturday, June 22, 2013
"You know, it's just a Toys-r-Us kind of thing."
The FBI employs drones in domestic surveillance operations, Director Robert Mueller revealed, but said they were used in a "very, very minimal way."
Mr Mueller, in Senate testimony on Wednesday, acknowledged for the first time that the Federal Bureau of Investigation uses "very few" drones in a limited capacity for surveillance. (more)
Mr Mueller, in Senate testimony on Wednesday, acknowledged for the first time that the Federal Bureau of Investigation uses "very few" drones in a limited capacity for surveillance. (more)
Friday, June 21, 2013
FREE - BYOD Policy Guidebook
Bring Your Own Device (BYOD) Policy Guidebook
This policy guidebook was created to help guide you through the questions to ask and provide some best practices to consider when establishing your own BYOD policies.
Your employees want to use their own mobile devices for work. This represents a tremendous opportunity for you to extend the benefits of mobile technology to all employees. As more companies embrace the Bring Your Own Device (BYOD) model, many questions arise.
Offered Free by: SAP (more)
This policy guidebook was created to help guide you through the questions to ask and provide some best practices to consider when establishing your own BYOD policies.
Your employees want to use their own mobile devices for work. This represents a tremendous opportunity for you to extend the benefits of mobile technology to all employees. As more companies embrace the Bring Your Own Device (BYOD) model, many questions arise.
Offered Free by: SAP (more)
Thursday, June 20, 2013
They Know Who You Are... and it ain't the NSA!
Many Internet advertisers rely on cookies, digital code stored on your browser. Some websites place multiple cookies when you visit, allowing them to track some of your activity over time (you can see who is tracking you by installing an application such as Ghostery or Abine’s “DoNotTrackMe”).
The problem for marketers is that some users set their browsers to reject cookies or quickly extinguish them. And mobile phones, which are taking an increasing chunk of the Web usage, do not use cookies.
To combat the cookie’s flaws, advertisers and publishers are increasingly turning to something called fingerprinting. This technique allows a web site to look at the characteristics of a computer such as what plugins and software you have installed, the size of the screen, the time zone, fonts and other features of any particular machine. These form a unique signature just like random skin patterns on a finger...
Fingerprinting may prove a more robust tracking technology than cookies because the user’s identify endures even if they erase their cookies. Making changes to your software and settings only makes you more identifiable, not less. An EFF study several years ago found that it is easy to track when someone changes their profiles by adding software updates, for example. You can see what details your computer is transmitting right now by visiting this site. (more)
Try it. You'll be amazed. ~Kevin
The problem for marketers is that some users set their browsers to reject cookies or quickly extinguish them. And mobile phones, which are taking an increasing chunk of the Web usage, do not use cookies.
To combat the cookie’s flaws, advertisers and publishers are increasingly turning to something called fingerprinting. This technique allows a web site to look at the characteristics of a computer such as what plugins and software you have installed, the size of the screen, the time zone, fonts and other features of any particular machine. These form a unique signature just like random skin patterns on a finger...
Fingerprinting may prove a more robust tracking technology than cookies because the user’s identify endures even if they erase their cookies. Making changes to your software and settings only makes you more identifiable, not less. An EFF study several years ago found that it is easy to track when someone changes their profiles by adding software updates, for example. You can see what details your computer is transmitting right now by visiting this site. (more)
Try it. You'll be amazed. ~Kevin
India Launches Wide-Ranging Surveillance Program
India has launched a wide-ranging surveillance program that will give its security agencies and even income tax officials the ability to tap directly into e-mails and phone calls without oversight by courts or parliament, several sources said.
The expanded surveillance in the world's most populous democracy, which the government says will help safeguard national security, has alarmed privacy advocates at a time when allegations of massive U.S. digital snooping beyond American shores has set off a global furor. (more)
The expanded surveillance in the world's most populous democracy, which the government says will help safeguard national security, has alarmed privacy advocates at a time when allegations of massive U.S. digital snooping beyond American shores has set off a global furor. (more)
Wednesday, June 19, 2013
Quote of the Week - Orwell Got it Wrong
"And surveillance has become entertainment, most ironically in 'Big Brother' where people compete to be under constant scrutiny. More revealing than their narcissism is the audience's enthusiastic voyeurism, playing at Thought Police from the couch." — Peter Marks, Associate Professor, senior lecturer in the Department
of English at the University Sydney. He is also a member of the
Surveillance and Everyday Life Research Group
Tuesday, June 18, 2013
"Is Privacy Dead?" - A Question Older Than Many of You
Note the date...
We are still worried about the same things...
(more)
Click to enlarge. |
Click to enlarge. |
New Crowdsourcing App Logs All Street Cameras
You may not be able to control the privacy of your electronic data. But keeping yourself off security cameras? There’s an app for that.
A new crowdsourcing mapping app called Surv gives city dwellers a way to prepare themselves for that kind of privacy infringement by mapping where those cameras are and what they’re used for.
Currently in private beta-mode for New York (and raising money for a wider release on Kickstarter), the app encourages users to post the locations of security cameras around their cities, along with a description of the camera--whether it’s a traffic camera or a police camera, a dome camera or a shielded one. (more)
It was noted that during the recent Boston bombings the FBI asked businesses if they had security videos. One would think, keeping a database of public cameras (proactively) would be an essential part of "Homeland Security". This app might fill that vacuum. How ironic that privacy advocates will build it for them. ~Kevin
A new crowdsourcing mapping app called Surv gives city dwellers a way to prepare themselves for that kind of privacy infringement by mapping where those cameras are and what they’re used for.
Currently in private beta-mode for New York (and raising money for a wider release on Kickstarter), the app encourages users to post the locations of security cameras around their cities, along with a description of the camera--whether it’s a traffic camera or a police camera, a dome camera or a shielded one. (more)
It was noted that during the recent Boston bombings the FBI asked businesses if they had security videos. One would think, keeping a database of public cameras (proactively) would be an essential part of "Homeland Security". This app might fill that vacuum. How ironic that privacy advocates will build it for them. ~Kevin
Labels:
amateur,
App,
FutureWatch,
government,
privacy,
recording,
spycam,
surveillance
Friday, June 14, 2013
FutureWatch - Increased use of Private Search Engines
Traffic at the private search engines StartPage and Ixquick has dramatically increased this week as Internet users react to news of the PRISM data sharing program. Combined, the two search engines served 3.4 million direct private searches on Wednesday, an increase of 500,000 over last week. (more)
FutureWatch: A rise in encryption usage, and a new search engine... GoogleSecure?
FutureWatch: A rise in encryption usage, and a new search engine... GoogleSecure?
Spy News Bites
We're not the only ones...
Russia - President Vladimir Putin has defended the right by Russian special services to wiretap... “If this [wiretapping] is made within the framework of the law, by which the special services’ rules of conduct are guided, this is normal." (more)
Canada has also been electronically eavesdropping on Canadians and others, scouring global telephone records and Internet data for patterns of suspicious activity, a newspaper said Monday. (more)
Panama - A TV journalist and cameraman were detained by police while working on a story... about alleged government wiretaps. (more)
Former Bulgarian interior minister Tsvetan Tsvetanov was indicted Wednesday in connection with a scandal over the irregular wiretapping of top politicians and businessmen, sources said. (more)
Not to be left out...
DC - The IRS... is ordering surveillance equipment that includes hidden cameras in coffee trays, plants and clock radios. The IRS wants to secure the surveillance equipment quickly – it posted a solicitation on June 6 and is looking to close the deal by Monday, June 10. (more)
PA - The Senate Judiciary Committee approved a bill that would... add audio surveillance to security cameras already mounted in school buses. (more)
Taiwan - Taiwan's top intelligence body is seeking a change to the law to expand its power to conduct wiretapping in anti-espionage operations. (more) (copycats)
Nigeria - The Bayelsa (state) Government awarded a contract valued at N3.6 billion for electronic surveillance in the state... to the Chinese Firm, Wali... The governor appealed to residents of the state to cooperate with the contractors... (more)
Unintended Consequences...
NSA leaks will... significantly increase the level of state-sponsored economic espionage directed against American companies. (more)
Sales of George Orwell's dystopian novel 1984 have skyrocketed following revelations about secret US spying on internet data. (more)
Russia - President Vladimir Putin has defended the right by Russian special services to wiretap... “If this [wiretapping] is made within the framework of the law, by which the special services’ rules of conduct are guided, this is normal." (more)
Canada has also been electronically eavesdropping on Canadians and others, scouring global telephone records and Internet data for patterns of suspicious activity, a newspaper said Monday. (more)
Panama - A TV journalist and cameraman were detained by police while working on a story... about alleged government wiretaps. (more)
Former Bulgarian interior minister Tsvetan Tsvetanov was indicted Wednesday in connection with a scandal over the irregular wiretapping of top politicians and businessmen, sources said. (more)
Not to be left out...
DC - The IRS... is ordering surveillance equipment that includes hidden cameras in coffee trays, plants and clock radios. The IRS wants to secure the surveillance equipment quickly – it posted a solicitation on June 6 and is looking to close the deal by Monday, June 10. (more)
PA - The Senate Judiciary Committee approved a bill that would... add audio surveillance to security cameras already mounted in school buses. (more)
Taiwan - Taiwan's top intelligence body is seeking a change to the law to expand its power to conduct wiretapping in anti-espionage operations. (more) (copycats)
Nigeria - The Bayelsa (state) Government awarded a contract valued at N3.6 billion for electronic surveillance in the state... to the Chinese Firm, Wali... The governor appealed to residents of the state to cooperate with the contractors... (more)
Unintended Consequences...
NSA leaks will... significantly increase the level of state-sponsored economic espionage directed against American companies. (more)
Sales of George Orwell's dystopian novel 1984 have skyrocketed following revelations about secret US spying on internet data. (more)
Thursday, June 13, 2013
'I listened to Marilyn die': Private eye who bugged Monroe's house reveals details...
Files shedding new light on Marilyn Monroe's last night alive and her relationships with President John F Kennedy and his younger brother Bobby have emerged 51 years after her death.
Documents belonging to the late Fred Otash, one of Hollywood's most notorious private detectives, were uncovered by his daughter Colleen after being found in a suburban storage unit.
...in his notes, Otash claimed: 'I listened to Marilyn Monroe die.'
He recorded that on August 5 1962, she had a violent argument with the Kennedys and that she felt that she had been 'passed around like a piece of meat'.
The notes read: 'She was really screaming and they were trying to quiet her down.'
'She's in the bedroom and Bobby gets the pillow and he muffles her on the bed to keep the neighbors from hearing. She finally quieted down and then he was looking to get out of there.'
Otash only found out she had died later on.
A red filing cabinet that contained Otash's most sensitive material was removed from his apartment by his lawyer after he collapsed from an apparent heart attack. Its contents were never seen again. (more)
Documents belonging to the late Fred Otash, one of Hollywood's most notorious private detectives, were uncovered by his daughter Colleen after being found in a suburban storage unit.
...in his notes, Otash claimed: 'I listened to Marilyn Monroe die.'
He recorded that on August 5 1962, she had a violent argument with the Kennedys and that she felt that she had been 'passed around like a piece of meat'.
The notes read: 'She was really screaming and they were trying to quiet her down.'
'She's in the bedroom and Bobby gets the pillow and he muffles her on the bed to keep the neighbors from hearing. She finally quieted down and then he was looking to get out of there.'
Otash only found out she had died later on.
A red filing cabinet that contained Otash's most sensitive material was removed from his apartment by his lawyer after he collapsed from an apparent heart attack. Its contents were never seen again. (more)
Labels:
eavesdropping,
employee,
historical,
PI,
weird,
wiretapping
Subscribe to:
Posts (Atom)