No one likes the idea of a workplace in which managers keep a constant eye on employees. Workers find it creepy, and it’s not as if ambitious managers clawed their way up the ladder just to snoop on their underlings all day. Still, much of the surveillance now takes place electronically—in theory, freeing bosses to focus on other matters while monitoring software keeps everyone in line. So office spying isn’t going away.
A study published over the weekend by researchers suggests that electronic surveillance in the workplace is strikingly effective (PDF). An examination of data provided by NCR (NCR), which makes software that examines all activity on restaurants’ point-of-sale systems while looking for suspect patterns, found lower levels of theft under workplace surveillance. NCR even says that employees seem to become more productive in other ways. (more)
Tuesday, August 27, 2013
Friday, August 23, 2013
Boyfriend Tracker app Booted from Google Play
Yesterday the Associated Press reported that the Boyfriend Tracker app, which had seemed to take Brazil like an overbearing wildfire, was removed by Google from its app store with no explanation.
Both the app’s massive popularity (AP estimates around 50,000 downloads in just two months) and its removal raise questions. The former, of course, speaks to a fundamental problem in the security of relationships in Brazil. To be fair, it is certain that the app — called Rastreador de Namorados — would have just as much popularity elsewhere, but this one happened to be in a country famous for its casual liaisons. “In Brazil, we have this culture of switching partners really quickly, so this is a way of dealing with that,” the app’s maker, Matheus Grijo told the AP. “People really appreciate having a tool to help them find out whether they’re being cheated on.” (more)
“Boyfriend Tracker” lets users obtain a call history, receive any incoming or outgoing text messages, identify a partner’s location on a map using GPS, and can turn on the phone to listen in to the surrounding environment. The app also lets users know when a phone is turned off or set to Airplane Mode. The app has to be downloaded on the intended individual phone, with their consent, according to Grijo. The individual can then text message codes to turn on the various tracking options. (more) (video)
Girlfriend Tracker app still available!
(No, just kidding.)
Both the app’s massive popularity (AP estimates around 50,000 downloads in just two months) and its removal raise questions. The former, of course, speaks to a fundamental problem in the security of relationships in Brazil. To be fair, it is certain that the app — called Rastreador de Namorados — would have just as much popularity elsewhere, but this one happened to be in a country famous for its casual liaisons. “In Brazil, we have this culture of switching partners really quickly, so this is a way of dealing with that,” the app’s maker, Matheus Grijo told the AP. “People really appreciate having a tool to help them find out whether they’re being cheated on.” (more)
“Boyfriend Tracker” lets users obtain a call history, receive any incoming or outgoing text messages, identify a partner’s location on a map using GPS, and can turn on the phone to listen in to the surrounding environment. The app also lets users know when a phone is turned off or set to Airplane Mode. The app has to be downloaded on the intended individual phone, with their consent, according to Grijo. The individual can then text message codes to turn on the various tracking options. (more) (video)
Girlfriend Tracker app still available!
(No, just kidding.)
Thursday, August 22, 2013
Homes Hacked Through Wireless Devices - There Really is a Boogeyman
Sleep tight...
CEO Pleads Guilty to Wiretapping Charge
ID - Louis Kraml, the Chief Executive Officer of Bingham Memorial Hospital in Blackfoot, entered a plea of guilty today to a misdemeanor charge of stalking in the second degree...
A Bingham County grand jury indicted Kraml, and former hospital Information Technology Department employees Jack York, Chris Behunin and Tyler Lassen, with various violations of the Idaho wiretap statute...
According to the indictments, the defendants intercepted and recorded phone calls made by and to former hospital doctor Robert Rosin and his staff between June 2009 and August 2010. (more)
A Bingham County grand jury indicted Kraml, and former hospital Information Technology Department employees Jack York, Chris Behunin and Tyler Lassen, with various violations of the Idaho wiretap statute...
According to the indictments, the defendants intercepted and recorded phone calls made by and to former hospital doctor Robert Rosin and his staff between June 2009 and August 2010. (more)
FutureWatch: Eavesdropping via Mind Reading
We continue to keep tabs on the next really big thing in eavesdropping - mind reading. Still way off in the future, advances are being made every year.
Here is the latest...
By analyzing MRI images of the brain with an elegant mathematical model, it is possible to reconstruct thoughts more accurately than ever before. In this way, researchers from Radboud University Nijmegen have succeeded in determining which letter a test subject was looking at. The journal Neuroimage has accepted the article, which will be published soon. A preliminary version of the article can be read online.
‘In our further research we will be working with a more powerful MRI scanner,' explains Sanne Schoenmakers, who is working on a thesis about decoding thoughts. ‘Due to the higher resolution of the scanner, we hope to be able to link the model to more detailed images. We are currently linking images of letters to 1200 voxels in the brain; with the more powerful scanner we will link images of faces to 15,000 voxels.' (more)
Here is the latest...
By analyzing MRI images of the brain with an elegant mathematical model, it is possible to reconstruct thoughts more accurately than ever before. In this way, researchers from Radboud University Nijmegen have succeeded in determining which letter a test subject was looking at. The journal Neuroimage has accepted the article, which will be published soon. A preliminary version of the article can be read online.
‘In our further research we will be working with a more powerful MRI scanner,' explains Sanne Schoenmakers, who is working on a thesis about decoding thoughts. ‘Due to the higher resolution of the scanner, we hope to be able to link the model to more detailed images. We are currently linking images of letters to 1200 voxels in the brain; with the more powerful scanner we will link images of faces to 15,000 voxels.' (more)
Laser Beam Eavesdropping - In the News Again
Since the 1970's, stories about laser listeners have periodically popped up in the news. The common thread is their magical ability to eavesdrop from far away using only an invisible beam of light. Fear mongering is the next element, closely followed by, "very expensive, only the government can buy one."
The reporters are either clueless or haven't done any decent research. Their information sources have vested interests: like governments spreading disinformation; or "de-bugging experts" and spyshop owners hoping the publicity will boost their business. Funny, a working device is never demonstrated, and nobody even claims first-hand knowledge.
Today, the BBC fell victim. Here is the story they published...
The UK government has warned the Guardian newspaper that foreign agents could use laser technology to eavesdrop on them, in the wake of recent surveillance leaks. What are laser listening devices and are they effective? (more)
The theory is sound. CD / DVD players use it on a small scale. YouTube is full of videos demonstrating the technique... under very controlled conditions, with less than sterling results. But, is it really a practical surveillance tool? Click here for our research.
The reporters are either clueless or haven't done any decent research. Their information sources have vested interests: like governments spreading disinformation; or "de-bugging experts" and spyshop owners hoping the publicity will boost their business. Funny, a working device is never demonstrated, and nobody even claims first-hand knowledge.
Today, the BBC fell victim. Here is the story they published...
Not true. |
The theory is sound. CD / DVD players use it on a small scale. YouTube is full of videos demonstrating the technique... under very controlled conditions, with less than sterling results. But, is it really a practical surveillance tool? Click here for our research.
Spybusters Tip #948 - Android Device Manager Allows Remote Locate, Signal & Erase Security for Android Devices
Access the settings by opening the Google Settings app from your Android app drawer and tapping the option for Android Device Manager.
From there you can choose whether to enable remote location or wiping. This lets you login to the Android Device Manager website and find your phone on a map, cause your device to ring so you can find it if it’s in your other pants pocket or lost in couch cushions, or perform a factory reset if the phone’s been lost or stolen. (more)
From there you can choose whether to enable remote location or wiping. This lets you login to the Android Device Manager website and find your phone on a map, cause your device to ring so you can find it if it’s in your other pants pocket or lost in couch cushions, or perform a factory reset if the phone’s been lost or stolen. (more)
Labels:
Android,
App,
cell phone,
find,
GPS,
wireless,
X-Ray Vision
Wednesday, August 21, 2013
Last of the Nixon Tapes Go Online
Forty years after President Richard M. Nixon turned off his secret tape
recorder, the federal government on Wednesday finally released the last
of the historic recordings that have provided an unparalleled insight
into the workings of one of the nation’s most dramatic presidencies...
The 94 tapes released on Wednesday cover conversations from April 9 to July 12, 1973, after which the secret taping system was dismantled when a Nixon aide, Alexander Butterfield, disclosed its existence to Congress. (more)
Get yer hot Tricky Dicky tapes.
Get yer hot tapes here.
The 94 tapes released on Wednesday cover conversations from April 9 to July 12, 1973, after which the secret taping system was dismantled when a Nixon aide, Alexander Butterfield, disclosed its existence to Congress. (more)
Get yer hot Tricky Dicky tapes.
Get yer hot tapes here.
Do You Know Your NSA History? (Pop Quiz - no prize)
When was this published in The New York Times?
"A Federal Court of Appeals recently ruled that the largest and most secretive intelligence agency of the United States, the National Security Agency, may lawfully intercept the overseas communications of Americans even if it has no reason to believe they are engaged in illegal activities. The ruling, which also allows summaries of these conversations to be sent to the Federal Bureau of Investigation, significantly broadens the already generous authority of the N.S.A. to keep track of American citizens."
A. 2013
B. 2003
C. 1993
D. 1983
E. 1973
(Answer)
"A Federal Court of Appeals recently ruled that the largest and most secretive intelligence agency of the United States, the National Security Agency, may lawfully intercept the overseas communications of Americans even if it has no reason to believe they are engaged in illegal activities. The ruling, which also allows summaries of these conversations to be sent to the Federal Bureau of Investigation, significantly broadens the already generous authority of the N.S.A. to keep track of American citizens."
A. 2013
B. 2003
C. 1993
D. 1983
E. 1973
(Answer)
Who Gets the Bill for Government Wiretaps?
Is a major telephone company issuing a surcharge to its customers for legal government wiretapping in what it's calling a "lawful interception recovery fee"?
A Facebook post that went viral, which showed an apparent copy of an AT&T bill with a section reading "Lawful Interception Recovery Fee" under "Surcharges and Other Fees."
Text that accompanied the post, attributed to a Facebook user Kallie Snyder, read: "I called and they said it's a new fee for the ... cost incurred from the government. I don't have anything to hide so if they want to tap my phone go ahead ... but why should I have to pay for it??!!! This is ridiculous, please share this so we can get the word out there. Oh, and check your bills people!!" (more)
100% urban legend hoax.
Phone companies charge the government.
So... if you are a taxpayer, you do pay.
It just doesn't show up as a tapped-line item on your 1040 form.
A Facebook post that went viral, which showed an apparent copy of an AT&T bill with a section reading "Lawful Interception Recovery Fee" under "Surcharges and Other Fees."
Text that accompanied the post, attributed to a Facebook user Kallie Snyder, read: "I called and they said it's a new fee for the ... cost incurred from the government. I don't have anything to hide so if they want to tap my phone go ahead ... but why should I have to pay for it??!!! This is ridiculous, please share this so we can get the word out there. Oh, and check your bills people!!" (more)
100% urban legend hoax.
Phone companies charge the government.
So... if you are a taxpayer, you do pay.
It just doesn't show up as a tapped-line item on your 1040 form.
Spy Drone Pisses Off Dr. Wee
KUALA LUMPUR - The two men, who allegedly spied on the home of MCA Youth chief Datuk Dr Wee Ka Siong (Deputy Minister of Education Malaysia) using a hexacopter, claimed that they were only testing the machine and not spying...
Both men have denied that they are members of a political party...
Dr Wee, when contacted, said the excuses given by the two men were ridiculous and urged police to investigate the matter further.
“Why would a photographer from Kluang come all the way to Cheras to take aerial photographs of my housing area and test the machine?” he said, adding that the footage in the camera showed it to be zooming in on only one or two houses.
He urged the authorities to push for more stringent rules and regulations on the use of such devices.
It was reported that the remote-controlled hexacopter, which had been allegedly spying on his bungalow in Bukit Tiara, Cheras on Aug 8, had fallen on the roof of the balcony of Dr Wee’s neighbour after hitting the lightning arrester. (more)
The Back Story
His neighbour’s 14-year-old son found the vehicle and informed his parents but his parents did not suspect anything amiss and told him to just throw it away.
However, the boy removed a chip attached to a tiny video camera from the vehicle and, together with his 15-year-old sister, played it on the computer. They made the shocking discovery and the family quickly informed Dr Wee.
Dr Wee collected the craft from his neighbor only on Thursday.
Dr Wee, who showed five short video clips extracted from the chip and recorded on Aug 5, said the hexacopter was aimed in the direction of his house and his neighbour’s.
The video clip showed two men handling the hexacopter in its initial clip (Darwin Award!). In another, the camera screen paused when a security guard was going on his patrolling rounds and resumed when the guard moved away. (more)
Both men have denied that they are members of a political party...
Dr Wee, when contacted, said the excuses given by the two men were ridiculous and urged police to investigate the matter further.
“Why would a photographer from Kluang come all the way to Cheras to take aerial photographs of my housing area and test the machine?” he said, adding that the footage in the camera showed it to be zooming in on only one or two houses.
He urged the authorities to push for more stringent rules and regulations on the use of such devices.
It was reported that the remote-controlled hexacopter, which had been allegedly spying on his bungalow in Bukit Tiara, Cheras on Aug 8, had fallen on the roof of the balcony of Dr Wee’s neighbour after hitting the lightning arrester. (more)
The Back Story
His neighbour’s 14-year-old son found the vehicle and informed his parents but his parents did not suspect anything amiss and told him to just throw it away.
However, the boy removed a chip attached to a tiny video camera from the vehicle and, together with his 15-year-old sister, played it on the computer. They made the shocking discovery and the family quickly informed Dr Wee.
Dr Wee collected the craft from his neighbor only on Thursday.
Dr Wee, who showed five short video clips extracted from the chip and recorded on Aug 5, said the hexacopter was aimed in the direction of his house and his neighbour’s.
The video clip showed two men handling the hexacopter in its initial clip (Darwin Award!). In another, the camera screen paused when a security guard was going on his patrolling rounds and resumed when the guard moved away. (more)
Labels:
aerial,
amateur,
blackmail,
cautionary tale,
Darwin,
drone,
dumb,
espionage,
FutureWatch,
spycam,
surveillance
IKEA Store Union's Covert Video Allowed
Canada - Two different panels of the BC Labor Relations Board have made findings in favor of a union’s covert video surveillance at the IKEA store in Richmond, BC. The store has operated behind a picket line since May 13.
With over 300 unionized employees on the outside looking in, and only 27 who have decided to cross the picket line, most store operations have continued. The kids’ ballroom is closed, and the 600 seat cafeteria isn’t serving up Swedish meatballs (or anything else), but otherwise the store is open and sales are being made. That has made the union suspicious that IKEA is getting work done in violation of the law against using replacement workers: - section 68 of the Labor Relations Code.
The union hired private investigators to covertly videotape activity inside the store. It then sought to rely on still pictures taken from the video of certain individuals alleged to be working in violation of section 68.
Both panels rejected IKEA’s argument that the covert video surveillance was in violation of the Privacy Act and the Personal Information Protection Act (“PIPA“) and therefore should not be admitted into evidence. The panels, deciding the cases before them independently, reached similar conclusions for similar reasons. (more)
With over 300 unionized employees on the outside looking in, and only 27 who have decided to cross the picket line, most store operations have continued. The kids’ ballroom is closed, and the 600 seat cafeteria isn’t serving up Swedish meatballs (or anything else), but otherwise the store is open and sales are being made. That has made the union suspicious that IKEA is getting work done in violation of the law against using replacement workers: - section 68 of the Labor Relations Code.
The union hired private investigators to covertly videotape activity inside the store. It then sought to rely on still pictures taken from the video of certain individuals alleged to be working in violation of section 68.
Both panels rejected IKEA’s argument that the covert video surveillance was in violation of the Privacy Act and the Personal Information Protection Act (“PIPA“) and therefore should not be admitted into evidence. The panels, deciding the cases before them independently, reached similar conclusions for similar reasons. (more)
Intel's IT Computer Network PanOptiCop - Code Name "SANTA"
Intel has created a Hadoop-based rig that analyses just about every network event in the company – four to six billion of them on business days - in close to real time so it can spot threats including industrial espionage.
Intel officials declined to name the tool, saying it would not be "productive" to disclose its name, but said it was created by an 80-strong team of big data specialists working from its Israel offices and makes extensive use of Apache Hadoop. Ron Kasabian, Chipzilla's general manager of Big Data, said the tool was developed because conventional malware detection tools – even those from Intel's security-focused subsidiary McAfee – can't find the especially novel or subtle attacks Intel fears.
Kasabian described the tool as analyzing “every access request by every employee, every time they access a file, sharepoint, email or ERP”. Watching all those activities is important because Intel's intellectual property like product designs and manufacturing processes must be very closely guarded. (more)
Snooping A Network Tells All (SANTA)
Oh come on, what else would you call it?
Intel officials declined to name the tool, saying it would not be "productive" to disclose its name, but said it was created by an 80-strong team of big data specialists working from its Israel offices and makes extensive use of Apache Hadoop. Ron Kasabian, Chipzilla's general manager of Big Data, said the tool was developed because conventional malware detection tools – even those from Intel's security-focused subsidiary McAfee – can't find the especially novel or subtle attacks Intel fears.
Kasabian described the tool as analyzing “every access request by every employee, every time they access a file, sharepoint, email or ERP”. Watching all those activities is important because Intel's intellectual property like product designs and manufacturing processes must be very closely guarded. (more)
Snooping A Network Tells All (SANTA)
Oh come on, what else would you call it?
Monday, August 19, 2013
Some Stuff Around the House Which Might Be Spying on You
For Americans concerned about their privacy, the NSA data grabs are daunting, but what about the data grabs happening inside your own home, perpetrated not by the government, but by your coffee machine?
Consider every appliance and every piece of home electronics that you own. Does it gather data about how you use it? Does it connect to the Internet? If so, it could be used to spy on you. Your mobile devices, your TV, and now various other types of home appliances can be wired into a network that can track you. If those networks are hacked, information about your habits and behaviors could be available to people with nefarious goals. The same technological innovation that empowers us also makes us vulnerable to those who would exploit such advances against us.
Here are nine appliances and other systems inside your house that may be spying on you right now, or used to spy on you in the future... (more)
FutureWatch: The "Internet of Things" is in its infancy now. The problem of having more back doors to your home than one is only going to worsen.
Consider every appliance and every piece of home electronics that you own. Does it gather data about how you use it? Does it connect to the Internet? If so, it could be used to spy on you. Your mobile devices, your TV, and now various other types of home appliances can be wired into a network that can track you. If those networks are hacked, information about your habits and behaviors could be available to people with nefarious goals. The same technological innovation that empowers us also makes us vulnerable to those who would exploit such advances against us.
Here are nine appliances and other systems inside your house that may be spying on you right now, or used to spy on you in the future... (more)
FutureWatch: The "Internet of Things" is in its infancy now. The problem of having more back doors to your home than one is only going to worsen.
Sunday, August 18, 2013
Spybusters Tip # 723 - Be Smart - Use a Dumb Phone to Thwart Spyware
Sometimes you just need a dumb phone that can't spy on you.
One that can't hold spyware.
One that can't GPS track you.
One that can't bite you with Bluetooth.
Dumb phones are not always easy to find.
Your local cell phone store wants you to buy smartphones with data plans. Your significant other isn't going to gift you a dumb phone. (A smartphone, maybe, but don't trust it.)
If you are in the market for a spybusting phone, or just a secret second phone, try looking at these...
inKlien Global "The world slimmest card size phone." (turn off Bluetooth)
johnsphones.com "The world's most basic cell phone."
Kyocera Marbl K127 (Virgin Mobile) Cellular Phone
Motorola W260g Prepaid Phone (Tracfone)
Motorola C139 Prepaid Phone (Tracfone)
More Spybusters Tips:
• If you suspect your phone is spying on you, don't completely stop using it until you can collect evidence to prove your case.
• Pick up a cheap, dumb, unblocked secret phone.
-- Don't give out the number.
-- Don't tell anyone you have it.
-- Use a pre-paid SIM card.
-- Use it for very confidential calls only, Let a little information leak via your smartphone. You don't want to tip off your spy that you have gone dark.
-- Completely turn off your smartphone when using your secret phone.
• Block your phone number from being sent. Press *67 before entering the number you want to call. Remember, calls to toll-free numbers like 700, 800, and 900 numbers (and their variants) can not be blocked.
• Rather text than phone? Return to those thrilling days of yesteryear... rent a pager.
inKlien Global's tiny phone |
One that can't hold spyware.
One that can't GPS track you.
One that can't bite you with Bluetooth.
Dumb phones are not always easy to find.
Your local cell phone store wants you to buy smartphones with data plans. Your significant other isn't going to gift you a dumb phone. (A smartphone, maybe, but don't trust it.)
If you are in the market for a spybusting phone, or just a secret second phone, try looking at these...
inKlien Global "The world slimmest card size phone." (turn off Bluetooth)
johnsphones.com "The world's most basic cell phone."
Kyocera Marbl K127 (Virgin Mobile) Cellular Phone
Motorola W260g Prepaid Phone (Tracfone)
Motorola C139 Prepaid Phone (Tracfone)
More Spybusters Tips:
• If you suspect your phone is spying on you, don't completely stop using it until you can collect evidence to prove your case.
• Pick up a cheap, dumb, unblocked secret phone.
-- Don't give out the number.
-- Don't tell anyone you have it.
-- Use a pre-paid SIM card.
-- Use it for very confidential calls only, Let a little information leak via your smartphone. You don't want to tip off your spy that you have gone dark.
-- Completely turn off your smartphone when using your secret phone.
• Block your phone number from being sent. Press *67 before entering the number you want to call. Remember, calls to toll-free numbers like 700, 800, and 900 numbers (and their variants) can not be blocked.
• Rather text than phone? Return to those thrilling days of yesteryear... rent a pager.
Labels:
advice,
cell phone,
counterespionage,
dumb,
privacy,
product
Subscribe to:
Posts (Atom)