China - Three public officials were each sentenced to 20 months in jail for illegally wiretapping a county Communist Party chief of central China's Hunan Province, according to a local court ruling on Tuesday.
Li Yi, an official with the supervision office of the Mayang Miao Autonomous County Committee of the Communist Party of China (CPC), Yang Fan, a Mayang court officer and Liu Yang, a police officer, were guilty of illegal wiretapping and secretly filming a county Party chief, according to the ruling of the district people's court of Hecheng, Huaihua City, which administers Mayang County.
They were guilty of placing hidden cameras in the office of Hu Jiawu, secretary of the CPC Mayang Miao Autonomous County Committee, spying on Hu and storing video footage on a removable disk between March 13 and Oct. 2 in 2012. They used the footage to try and blackmail Hu for promotion, according to the ruling. (more)
Tuesday, October 22, 2013
Landlord, Tenant, SpyCam - What Could Possibly...
I stopped posting these stories a while back, simply because there were so many of them. This is just a reminder. The SpyCam is the Number One illegal eavesdropping tool in use today.
Canada - An employee at a major Canadian broadcaster is facing charges of voyeurism, mischief and defamatory libel. 56-year-old David Sealey was arrested Saturday after a man saw a woman he knew secretly filmed in an online video. He notified the victim, who reported the incident to police.
A search warrant was issued and over 150 voyeuristic videos of women were found on a computer inside Sealey’s home, along with recording devices.
The female victim rented a room from Sealey in the Richmond Ave. and Spadina Ave. area and police believe there could be more victims. (more)
Canada - An employee at a major Canadian broadcaster is facing charges of voyeurism, mischief and defamatory libel. 56-year-old David Sealey was arrested Saturday after a man saw a woman he knew secretly filmed in an online video. He notified the victim, who reported the incident to police.
A search warrant was issued and over 150 voyeuristic videos of women were found on a computer inside Sealey’s home, along with recording devices.
The female victim rented a room from Sealey in the Richmond Ave. and Spadina Ave. area and police believe there could be more victims. (more)
Captain Crunch sez... "Here's looking at you, matey."
It’s not quite “Minority Report”-levels of creepiness, but it’s getting there.
Mondelez International, whose properties include Chips Ahoy, Nabisco, Ritz and other high-profile snack brands, says it’s planning to debut a grocery shelf in 2015 that comes equipped with sensors to determine the age and sex of passing customers.
The shelf, which is hooked up to Microsoft’s Kinect controller, will be able to use basic facial features like bone structure to build a profile of a potential snacker, Mondelez chief information officer Mark Dajani told the Wall Street Journal. While pictures of your actual face won’t be stored (yet), aggregate demographic data from thousands of transactions will be. (more)
I spy a tipping point. We are sailing into Fedup Bay. Watch the backlash, me hardies.
He saw this coming. |
The shelf, which is hooked up to Microsoft’s Kinect controller, will be able to use basic facial features like bone structure to build a profile of a potential snacker, Mondelez chief information officer Mark Dajani told the Wall Street Journal. While pictures of your actual face won’t be stored (yet), aggregate demographic data from thousands of transactions will be. (more)
I spy a tipping point. We are sailing into Fedup Bay. Watch the backlash, me hardies.
Labels:
FutureWatch,
mores,
privacy,
spybot,
surveillance,
tracking
Ex-School IT Director Faces Trial on Wiretapping Charge
PA - The former technology director for Easton Area School District accused of secretly recording a private meeting will face trial in Northampton County Court.
Thomas Drago, 54, acknowledged at a hearing Tuesday that prosecutors have enough evidence to merit a wiretap violation charge. Drago's attorney, Philip Lauer said his client will apply for a first-time offender's program. Drago remains free on $50,000 unsecured bail.
In August, Drago surrendered to authorities for allegedly recording a conversation with school officials without their permission. Drago, 54, of Bushkill Township resigned shortly before an internal probe this year uncovered nude photos on his work computer. (more)
Thomas Drago, 54, acknowledged at a hearing Tuesday that prosecutors have enough evidence to merit a wiretap violation charge. Drago's attorney, Philip Lauer said his client will apply for a first-time offender's program. Drago remains free on $50,000 unsecured bail.
In August, Drago surrendered to authorities for allegedly recording a conversation with school officials without their permission. Drago, 54, of Bushkill Township resigned shortly before an internal probe this year uncovered nude photos on his work computer. (more)
Sunday, October 20, 2013
Doc v. Doc Bugging Ends in House Call to Graybar Motel
India - Spying on his wife landed a qualified doctor husband behind bars on Saturday.
Dr Gyaneshwar Maini, who owns a private hospital, was arrested for keeping a tab on the locations and conversations of his wife, while installing a high-quality Global Positioning System (GPS) along with a micro-mike packed in a black box in the steering wheel of her sedan car for the past eight months.
The victim is also a qualified doctor and employed with a leading private hospital in Mohali.
Police have also decided to take legal action against employees of a private firm, who installed the device in the car of the woman.
The GPS system, along with a mike, was in a black box worth Rs 18,000 ($293.76), which was detected with the help of an expert from a private company, which supplies these gadgets.
The black box was linked with a 10-digit cell number used by Dr Maini's friend. Police said the installer of the device in the car has identified Dr Maini. In her complaint to the police, the woman suspected that there was some instrument in her car, which was keeping a tab on her movements and conversations, about which her husband would come to know even without her telling him. (more)
Dr Gyaneshwar Maini, who owns a private hospital, was arrested for keeping a tab on the locations and conversations of his wife, while installing a high-quality Global Positioning System (GPS) along with a micro-mike packed in a black box in the steering wheel of her sedan car for the past eight months.
The victim is also a qualified doctor and employed with a leading private hospital in Mohali.
Police have also decided to take legal action against employees of a private firm, who installed the device in the car of the woman.
The GPS system, along with a mike, was in a black box worth Rs 18,000 ($293.76), which was detected with the help of an expert from a private company, which supplies these gadgets.
The black box was linked with a 10-digit cell number used by Dr Maini's friend. Police said the installer of the device in the car has identified Dr Maini. In her complaint to the police, the woman suspected that there was some instrument in her car, which was keeping a tab on her movements and conversations, about which her husband would come to know even without her telling him. (more)
Labels:
amateur,
eavesdropping,
GPS,
lawsuit,
spybot,
surveillance,
tracking
No more, "Gee, I thought you said..." — Record Your Cell Phone Calls
Here's a useful item for PIs, Security and LEOs — a way to document important cell phone calls, without app sapping charges. No more, "Gee, I thought you said..."
Recording Cell Phone conversations using apps is not possible on iPhone, Droid or BlackBerry without paying per minute charges. The Call Mynah Cell Phone Recorder gives you complete control of Recording Cell Phone Calls. You decide to Record Mobile Phone Calls or not, set up your Call Mynah to Record Cell Phone (all calls) or only as you choose.
Recording Cell Phone conversations using apps is not possible on iPhone, Droid or BlackBerry without paying per minute charges. The Call Mynah Cell Phone Recorder gives you complete control of Recording Cell Phone Calls. You decide to Record Mobile Phone Calls or not, set up your Call Mynah to Record Cell Phone (all calls) or only as you choose.
- 340 hours of Cell Phone Recording storage
- Connects to any mobile phone via Bluetooth to create a simple Cell Phone Call Recorder
- Automatically Record Cell Phone Calls (manual recording options too)
- Saves all Cell Phone Records, call details (date, time, number, duration, call type)
- Add comments to calls and flag as 'Important'
- Upload calls to your PC for easy management (software supplied)
- 150 Hours standby, 8 hours talking before battery charge
- Call recording warn tone or prompt can be sent to callers (optional)
- Handset, Speakerphone or Headset (supplied) operation
- Security features to prevent unauthorized listening to your calls (more)
Saturday, October 19, 2013
RARE - Politico Admits to Phone Tapping & Butt Bugging
Zambia - Zambian President Admits to Spying on Fellow Officials
During his 2011 election campaign, the current president of Zambia, Michael Sata rose to popularity by playing on anti-Chinese sentiment and the anger of laborers over poor standards at the many large Chinese-run mines in Zambia... According to Global Voices, he tapped the phone of his foreign minister and also planted a bug underneath a chair in the office of the leader of Barotseland region, whose citizens want to secede from Zambia. (more)
During his 2011 election campaign, the current president of Zambia, Michael Sata rose to popularity by playing on anti-Chinese sentiment and the anger of laborers over poor standards at the many large Chinese-run mines in Zambia... According to Global Voices, he tapped the phone of his foreign minister and also planted a bug underneath a chair in the office of the leader of Barotseland region, whose citizens want to secede from Zambia. (more)
Industrial Espionage Threats to Small and Medium-sized Enterprises (SMEs)
The former president of a transportation company in Texas was sentenced in federal court last month to five years in prison for hacking into his former employer’s computer network and stealing proprietary business information he intended to use for his start-up. The case underscores the fact that much like major corporations, small and medium-sized enterprises (SMEs) are targets for industrial espionage.
SMEs are in many ways are more vulnerable than big businesses, which are capable of employing a small army of security specialists to safeguard intellectual property, said Michel Juneau-Katsuya, president and CEO of the Northgate Group, an international security firm based in Canada.
SMEs very often perceive security as an extravagance. “In times of austerity that sin of security expense is one of the first things that get eliminated,” he told IMT.
To a certain extent, the strategic importance of protection has become even more critical for SMEs. When it comes to stolen prototypes or proprietary technology, larger companies seem more capable of absorbing the loss. “If you’re a big guy and you lose a gadget, you can probably recover from that,” he said. “But if you’re a small or medium-sized company, you lose your intellectual property, you might actually break your back and lose your company." (more)
Sometimes it is smart to be extravagant. ~Kevin
SMEs are in many ways are more vulnerable than big businesses, which are capable of employing a small army of security specialists to safeguard intellectual property, said Michel Juneau-Katsuya, president and CEO of the Northgate Group, an international security firm based in Canada.
SMEs very often perceive security as an extravagance. “In times of austerity that sin of security expense is one of the first things that get eliminated,” he told IMT.
To a certain extent, the strategic importance of protection has become even more critical for SMEs. When it comes to stolen prototypes or proprietary technology, larger companies seem more capable of absorbing the loss. “If you’re a big guy and you lose a gadget, you can probably recover from that,” he said. “But if you’re a small or medium-sized company, you lose your intellectual property, you might actually break your back and lose your company." (more)
Sometimes it is smart to be extravagant. ~Kevin
Yet Another Bird Spying Story
Headlines of fowl accused of spying for Israel are making rounds again in Middle Eastern press, with the most recent bird of espionage 'arrested' in Lebanon. Hezbollah and Iranian-affiliated websites reported today that an Israeli 'spy eagle' had been caught this past weekend in Lebanon.
According to one Lebanese news site, the eagle had been caught in the town of Achkout by local hunters who alerted authorities after discovering that the bird had an ID ring attached to its leg with the words "Israel" and "Tel Aviv University" printed on it. (really bad spycraft :)
The Hezbollah- affiliated Al-Manar TV, whose news site's section on Israel is simply called "Enemy Entity," claimed that the eagle was one of many birds sent by Israel to spy and gather information via GPS transmitters across the Middle East. The report pointed to the "arrest of birds carrying similar devices" in Saudi Arabia, Turkey and most recently in Egypt. (more) (sing-a-long)
According to one Lebanese news site, the eagle had been caught in the town of Achkout by local hunters who alerted authorities after discovering that the bird had an ID ring attached to its leg with the words "Israel" and "Tel Aviv University" printed on it. (really bad spycraft :)
"On the lookout for bird spies here." |
Gordon Ramsay Knows What's Cooking... in His Daughter's Bedroom... using a SpyCam
Gordon Ramsay has admitted to being all kinds of inappropriate by revealing he put a video camera in his 15 year old daughter's bedroom to see what she gets up to with her boyfriend.
It seems Ramsay is not the first. Last year an American college student was granted a civil stalking order against her overprotective parents after they installed spying software on her electronic devices.(more)
It seems Ramsay is not the first. Last year an American college student was granted a civil stalking order against her overprotective parents after they installed spying software on her electronic devices.(more)
Business Espionage - Top Businessman Bugs Other Top Businessman
Australia - When prominent Melbourne businessmen Grant Custance and David Morrell first crossed paths in 1975 as students at prestigious Geelong Grammar, neither could have foreseen that almost 40 years later they would be locked in a brutal feud involving police, lawyers, tracking devices and crisis management consultants.
The public stoush between the Toorak heavyweights, which dates to a business deal between the two in 2010 that landed Mr Custance in the Magistrates Court, has taken a new twist, with allegations Mr Custance paid for a private detective to shadow Mr Morrell and scrutinise his ''business practices and moral conduct''.
An electronic tracking device was fitted to Mr Morrell's luxury car in March last year, with other plans to ''manipulate and extract information from mobile phones, computers and listening devices'', according to a report prepared for Mr Custance by private investigator and former police officer Damian Marrett. The two-week surveillance was code-named Operation Bulldog and included extensive background checks, company searches and tailing Mr Morrell, who is a buyer's advocate with an extensive list of wealthy and powerful clients. (more)
The public stoush between the Toorak heavyweights, which dates to a business deal between the two in 2010 that landed Mr Custance in the Magistrates Court, has taken a new twist, with allegations Mr Custance paid for a private detective to shadow Mr Morrell and scrutinise his ''business practices and moral conduct''.
An electronic tracking device was fitted to Mr Morrell's luxury car in March last year, with other plans to ''manipulate and extract information from mobile phones, computers and listening devices'', according to a report prepared for Mr Custance by private investigator and former police officer Damian Marrett. The two-week surveillance was code-named Operation Bulldog and included extensive background checks, company searches and tailing Mr Morrell, who is a buyer's advocate with an extensive list of wealthy and powerful clients. (more)
Thursday, October 17, 2013
Three Tips to Keep Your Mobile Data Safe
Keeping your mobile gear secure while you’re zipping across the grid is tricky business. Laptops and tablets—veritable gold mines of personal information—are popular targets for thieves. Law enforcement officials, meanwhile, could confiscate your smartphone and then examine the data—merely as a result of a routine traffic stop.
If you’re packing an Android device, it gets even trickier, because with such a device, you stand a better chance of falling prey to the booming mobile malware market. Independent malware testing lab AV-Test had less than 10,000 Android malware samples in its database by late 2011. Now, two years later, that number has blossomed to around 1.3 million.
Step One:
Encrypt everything
One of the easiest things you can do to protect an Android or iOS device is to take advantage of built-in hardware encryption. This feature will turn the data on your phone into nearly unreadable junk—unless it's properly unlocked with your password.
Let's start with the easy one: iOS. Owners of iPhones or iPads can rest easy knowing the data is already encrypted, provided you create a passcode from the lock screen.
Step Two:
Keep malware at bay
Android users are particularly vulnerable to malware. Google, unlike Apple, doesn’t vet applications before they go live on Google Play. This has proven an easy way for malware creators to sneak malicious apps onto Google’s app store. Malware-laden apps range from those offering free device wallpaper to games, and even to impostors that try to look like popular apps.
That’s why security vendors such as Avast, Kaspersky, and Lookout offer antivirus and security apps for Android to help keep you secure online. But how good are these apps, really? Back in late 2011, results from the AV-Test lab found that the free solutions were nearly useless.
Step Three:
Go Covert
You can protect your data from being nabbed by a Customs agent and downloaded into some massive data silo in the Utah desert. The Electronic Frontier Foundation suggests an interesting option: Leave the hard drive at home and boot your laptop from an SD card.
(Full instructions on how to create a Ubuntu boot disk or USB boot drive in Ubuntu guide for displaced Windows users.) ...Even if you don’t have any sensitive data to protect, this is such a great, secret-agent-style use for your laptop that you might want to try it simply for the cool factor. (more)
If you’re packing an Android device, it gets even trickier, because with such a device, you stand a better chance of falling prey to the booming mobile malware market. Independent malware testing lab AV-Test had less than 10,000 Android malware samples in its database by late 2011. Now, two years later, that number has blossomed to around 1.3 million.
Step One:
Encrypt everything
One of the easiest things you can do to protect an Android or iOS device is to take advantage of built-in hardware encryption. This feature will turn the data on your phone into nearly unreadable junk—unless it's properly unlocked with your password.
Let's start with the easy one: iOS. Owners of iPhones or iPads can rest easy knowing the data is already encrypted, provided you create a passcode from the lock screen.
Step Two:
Keep malware at bay
Android users are particularly vulnerable to malware. Google, unlike Apple, doesn’t vet applications before they go live on Google Play. This has proven an easy way for malware creators to sneak malicious apps onto Google’s app store. Malware-laden apps range from those offering free device wallpaper to games, and even to impostors that try to look like popular apps.
That’s why security vendors such as Avast, Kaspersky, and Lookout offer antivirus and security apps for Android to help keep you secure online. But how good are these apps, really? Back in late 2011, results from the AV-Test lab found that the free solutions were nearly useless.
Step Three:
Go Covert
You can protect your data from being nabbed by a Customs agent and downloaded into some massive data silo in the Utah desert. The Electronic Frontier Foundation suggests an interesting option: Leave the hard drive at home and boot your laptop from an SD card.
(Full instructions on how to create a Ubuntu boot disk or USB boot drive in Ubuntu guide for displaced Windows users.) ...Even if you don’t have any sensitive data to protect, this is such a great, secret-agent-style use for your laptop that you might want to try it simply for the cool factor. (more)
Labels:
amateur,
Android,
App,
cell phone,
computer,
counterespionage,
encryption,
Tips
Wednesday, October 16, 2013
Eavesdropping on the Brain: Mind-Reading Devices Could be Possible in the Future
Could we read minds? Scientists are certainly one step closer after this latest study. Researchers have managed to collect the first solid evidence that the pattern of brain activity seen in someone performing a mathematical exercise under experimentally controlled conditions very similar to that observed when the person engages in quantitative thought in the course of daily life. The findings could lead researchers to a way to "eavesdrop" on the brain in real life.
"This is exciting and a little scary," said Henry Greely who played no role in the study but is familiar with its contents, in a news release. "It demonstrates, first, that we can see when someone's dealing with numbers and, second, that we may conceivably someday be able to manipulate the brain to affect how someone deals with numbers."
In order to examine the thought processes of volunteers, the researchers monitored electrical activity in a region of the brain called the intraparietal sulcus. This part of the brain is known to be important in attention and hand motion. Previous studies have hinted that some nerve-cell clusters in this area are also involved in numerosity, the mathematical equivalent of literacy.
The scientists used a method called intracranial recording, which allowed them to monitor brain activity while people were immersed in real-life situations. The researchers tapped into the brains of three volunteers who were being evaluated for possible surgical treatment of their recurring, drug-resistant epileptic seizures; this involved removing a portion of the patient's skull and positioning packets of electrodes against the exposed brain surface. (more)
In order to examine the thought processes of volunteers, the researchers monitored electrical activity in a region of the brain called the intraparietal sulcus. This part of the brain is known to be important in attention and hand motion. Previous studies have hinted that some nerve-cell clusters in this area are also involved in numerosity, the mathematical equivalent of literacy.
The scientists used a method called intracranial recording, which allowed them to monitor brain activity while people were immersed in real-life situations. The researchers tapped into the brains of three volunteers who were being evaluated for possible surgical treatment of their recurring, drug-resistant epileptic seizures; this involved removing a portion of the patient's skull and positioning packets of electrodes against the exposed brain surface. (more)
Two Arrested for Eavesdropping on Previous Employer's Conference Call
A man and a woman surrendered at Wilton Police headquarters on warrants issued by Norwalk Superior Court. They were charged with eavesdropping on a former employer.
The two had worked for a business at 64 Danbury Rd and been released from employment in March of 2013. During their employment they had participated in a weekly conference call with other employees beyond the site. During a June 2013 conference call, which included upwards of 50 people one of the employees picked up background noise, according to Wilton Police, and the noise was traced back to the cell phones belonging to the two former employees.
According to Wilton Police, the former employer was concerned because of the confidential nature of the conference calls, which may have included information pertaining to company strategy that might be used by a competitor and information concerning client relationships, billing and operations. (more)
Over the years, you have read many posts here about organizations being victimized by eavesdroppers on their conference calls. Hence...
Spybusters Tip # 879
CrowdCall, a specialized conference-calling app available for iOS and Android smartphones and the web.
Instead of scheduling a dial-in line, e-mailing all parties involved and then hoping everyone calls at the appointed time, CrowdCall's interface lets users choose up to 20 participants from their contacts list and LinkedIn connections and dial them immediately (assuming the contacts have added their phone number to their LinkedIn profiles). When participants answer, they simply push "1" to enter the conference--they don't even need to have the app to participate.
...one feature in particular makes it attractive to small businesses. Because the call originator controls invitations, unauthorized participants can't use dial-in information to access the call, providing a measure of security when discussing sensitive information. (more)
The two had worked for a business at 64 Danbury Rd and been released from employment in March of 2013. During their employment they had participated in a weekly conference call with other employees beyond the site. During a June 2013 conference call, which included upwards of 50 people one of the employees picked up background noise, according to Wilton Police, and the noise was traced back to the cell phones belonging to the two former employees.
According to Wilton Police, the former employer was concerned because of the confidential nature of the conference calls, which may have included information pertaining to company strategy that might be used by a competitor and information concerning client relationships, billing and operations. (more)
Over the years, you have read many posts here about organizations being victimized by eavesdroppers on their conference calls. Hence...
Spybusters Tip # 879
CrowdCall, a specialized conference-calling app available for iOS and Android smartphones and the web.
Instead of scheduling a dial-in line, e-mailing all parties involved and then hoping everyone calls at the appointed time, CrowdCall's interface lets users choose up to 20 participants from their contacts list and LinkedIn connections and dial them immediately (assuming the contacts have added their phone number to their LinkedIn profiles). When participants answer, they simply push "1" to enter the conference--they don't even need to have the app to participate.
...one feature in particular makes it attractive to small businesses. Because the call originator controls invitations, unauthorized participants can't use dial-in information to access the call, providing a measure of security when discussing sensitive information. (more)
Video Game CEO Throws Employees Arrested for Spying Under the Virtual Bus
Two Bohemia Interactive developers have been arrested on
the Greek island of Lemnos for spying, company CEO Marek Spanel
confirmed today. The executive explained on the company's official forums that the firm will not go into further details on the matter.
According to Greek reports surfacing recently, the pair were in possession of videos and photos of military compounds in Lemnos at the time of their arrest. The Greek island is the main location for Bohemia Interactive's upcoming shooter Arma III, with the two reportedly claiming they were collecting reference material for the game.
UPDATE: Bohemia Interactive CEO Marek Spanel has released a statement about the incident, claiming the two employees were visiting the island of Lemnos "with the sole purpose of experiencing the island's beautiful surroundings".
"Since its establishment in 1999, Bohemia Interactive has created games based only upon publicly available information," Spanel said. "We always respect the law and we've never instructed anybody to violate the laws of any country. The same is true for Arma III."
Spanel said the studio is training its efforts on supporting the two employees arrested in Greece, and that he hopes the incident is nothing more than "an unfortunate misunderstanding of their passion as artists and creators of virtual worlds". (more)
According to Greek reports surfacing recently, the pair were in possession of videos and photos of military compounds in Lemnos at the time of their arrest. The Greek island is the main location for Bohemia Interactive's upcoming shooter Arma III, with the two reportedly claiming they were collecting reference material for the game.
UPDATE: Bohemia Interactive CEO Marek Spanel has released a statement about the incident, claiming the two employees were visiting the island of Lemnos "with the sole purpose of experiencing the island's beautiful surroundings".
"Since its establishment in 1999, Bohemia Interactive has created games based only upon publicly available information," Spanel said. "We always respect the law and we've never instructed anybody to violate the laws of any country. The same is true for Arma III."
Spanel said the studio is training its efforts on supporting the two employees arrested in Greece, and that he hopes the incident is nothing more than "an unfortunate misunderstanding of their passion as artists and creators of virtual worlds". (more)
Subscribe to:
Posts (Atom)