WA - A Lake City couple believes a burglar hacked into their cloud-based nanny cam and has been using it to monitor when they are and aren't home and possibly record their "private bedroom activities," according to the Seattle Police Department.
For the past two months, the victims have been arriving home to find items disturbed and missing in their apartment...
The victims told officers the system is easily hacked, and they believe someone has been monitoring their camera and knows when they leave the apartment...
Officers encouraged the couple to stop using the nanny cam and to contact building management with their concerns. (more)
Friday, February 7, 2014
Olympic Sized Gaffe - We have surveillance video of hotel showers...
Responding to the western campaign of "deliberate sabotage" in the media, Paul Sonne of WSJ reports, Russian deputy prime minister Dmitry Kozak said, "We have surveillance video from the hotels that shows people turn on the shower, direct the nozzle at the wall and then leave the room for the whole day."
(Say What?!?!?!)
Then an aide whisked Kozak away before he could answer any follow-up questions...
...former NSA operative John Schindler has some counter-surveillance advice for Sochi's shower users... Shut door and run shower hot for 10 minutes. Clear spot on mirror is the cam. (more)
(Say What?!?!?!)
Then an aide whisked Kozak away before he could answer any follow-up questions...
...former NSA operative John Schindler has some counter-surveillance advice for Sochi's shower users... Shut door and run shower hot for 10 minutes. Clear spot on mirror is the cam. (more)
Click to enlarge. |
Labels:
advice,
cautionary tale,
dumb,
employee,
government,
political,
privacy,
spycam
Totally Invasive Video Surveillance Can Be Good For You
The US Food and Drug Administration (FDA) has now approved a device for use after an incomplete procedure (colonoscopy) that is minimally invasive and can achieve similar imaging results to a colonoscopy. PillCam Colon is a pill-sized camera that is swallowed and passes through a patient's gastrointestinal tract.
The device itself is a pill-sized video camera measuring 12 x 33 mm (0.47 x 1.3 in) that captures color video from both of its ends at 4 or 35 frames per second. An LED provides the necessary illumination for image capture and, once swallowed by the patient, it wirelessly relays footage to a recording device worn by the patient for approximately 10 hours. (more)
The device itself is a pill-sized video camera measuring 12 x 33 mm (0.47 x 1.3 in) that captures color video from both of its ends at 4 or 35 frames per second. An LED provides the necessary illumination for image capture and, once swallowed by the patient, it wirelessly relays footage to a recording device worn by the patient for approximately 10 hours. (more)
Labels:
advice,
biometric,
detection,
FutureWatch,
optics,
product,
spybot,
X-Ray Vision
Wednesday, February 5, 2014
Quote of the Day - On retaining privacy...
"It is amazing how lame people are. In today’s world, it is easy to hide. Just unplug." ~MW
The K5 Security Robot - aka Robopanopticop, or R-2 D-brief
Knightscope officials envision its K5 system playing a role in
community policing...
“Knightscope’s autonomous technology platform is a fusion of
robotics, predictive analytics and collaborative social engagement
utilized to predict and prevent crime,” the company states on its
website. That means that in addition to sophisticated intelligence,
surveillance and reconnaissance capabilities, the K5 is equipped with
analytics enabling it to detect threats to people or property and summon
police.
• Able to scan an area in 270-degree sweeps to photographically map it.
• Four mid-mounted cameras can scan up to 1,500 license plates per minute
• 5-foot high, 300-lb.
• Equipped with optical character recognition, omnidirectional imaging, thermal imaging, microphones, air quality sensors, ultrasonic and infrared sensors, radar for determining the range, altitude, direction or speed of objects and lidar technology for measuring distance to an object. (more)
• Able to scan an area in 270-degree sweeps to photographically map it.
• Four mid-mounted cameras can scan up to 1,500 license plates per minute
• 5-foot high, 300-lb.
• Equipped with optical character recognition, omnidirectional imaging, thermal imaging, microphones, air quality sensors, ultrasonic and infrared sensors, radar for determining the range, altitude, direction or speed of objects and lidar technology for measuring distance to an object. (more)
Labels:
biometric,
drone,
FutureWatch,
police,
product,
spybot,
surveillance
Athletes, Beware the Sochi Spy Games
The telecommunications, e-mail and social network presence of athletes and others attending the Olympics will be under intense scrutiny before, during and after the events. These communications will be exploited for competitive advantage, political-economic intelligence, hints of sedition, identity theft and manufacturing future access...
Athletes can expect to have been profiled from the moment they are named to a team... There may be attempts to entrap or break into a circle of trusted friends or groups. Athlete and their electronics will have already been exposed... Simply visiting Sochi-related websites may be enough to infect a computer with spyware.
During the Games, it is reasonable to assume that all phone calls, e-mail, texts, web browsing, online banking and access to voice mail will be intercepted and exploited. Athletes who hope to take home medals may be taking home something else on their laptop instead...
Strategy discussed in team dressing rooms or over the airwaves will be subject to eavesdropping, whereas team radio communications are also vulnerable to electronic warfare tactics: deception, spoofing, interference or jamming at critical moments during play...
Consider that Russian security services share a cozy relationship with organized crime, who stand to benefit from information collected from the state espionage infrastructure. Consequently, banking and identification information are at also at risk. (more)
Obfuscation idea. |
During the Games, it is reasonable to assume that all phone calls, e-mail, texts, web browsing, online banking and access to voice mail will be intercepted and exploited. Athletes who hope to take home medals may be taking home something else on their laptop instead...
Strategy discussed in team dressing rooms or over the airwaves will be subject to eavesdropping, whereas team radio communications are also vulnerable to electronic warfare tactics: deception, spoofing, interference or jamming at critical moments during play...
Consider that Russian security services share a cozy relationship with organized crime, who stand to benefit from information collected from the state espionage infrastructure. Consequently, banking and identification information are at also at risk. (more)
Data Spying: Feb. 11 To Become “The Day We Fight Back”
The ACLU, Greenpeace, Reddit, Mozilla and a number of other organizations have banded together to fight back against data spying.
Data spying has become a hot topic in the U.S., ever since Edward Snowden blew the whistle on the National Security Agency’s data mining programs... Now a group of organizations and businesses are uniting in an effort to raise awareness about data spying.
The ACLU, Greenpeace and other organizations have put together the website TheDayWeFightBack.org, letting everyone know that they’re planning to make a big statement on Feb. 11. That’s the date when we will see a bunch of Internet ads protesting the U.S. government’s data spying programs...
According to the site, U.S. Internet users will see banners which urge them to call or email Congress about the data spying issue. (more)
Data spying has become a hot topic in the U.S., ever since Edward Snowden blew the whistle on the National Security Agency’s data mining programs... Now a group of organizations and businesses are uniting in an effort to raise awareness about data spying.
The ACLU, Greenpeace and other organizations have put together the website TheDayWeFightBack.org, letting everyone know that they’re planning to make a big statement on Feb. 11. That’s the date when we will see a bunch of Internet ads protesting the U.S. government’s data spying programs...
According to the site, U.S. Internet users will see banners which urge them to call or email Congress about the data spying issue. (more)
Labels:
government,
mores,
NSA,
political,
privacy,
surveillance,
tracking,
wiretapping
Tuesday, February 4, 2014
Bugging Lawyer Sentenced to Two Years
A former California divorce lawyer who admitted bugging a car was sentenced on Monday to two years in prison for illegal eavesdropping and tax evasion.
Mary Nolan, 62, of Oakland pleaded guilty to charges of evading more than $400,000 in federal taxes and causing her staff to plant a listening device in the vehicle of “N.F.,” identified as a client’s estranged spouse... Nolan gave up her law license and agreed to repay $469,000 in back taxes, according to an FBI press release.
Nolan was among the defendants caught up in the so-called “dirty DUI” scandal in which a private investigator hired alluring women to drink with the husbands of divorce clients at bars. The women would then invite the men to follow them in their cars, and police would be called to investigate a DUI. (more)
Mary Nolan, 62, of Oakland pleaded guilty to charges of evading more than $400,000 in federal taxes and causing her staff to plant a listening device in the vehicle of “N.F.,” identified as a client’s estranged spouse... Nolan gave up her law license and agreed to repay $469,000 in back taxes, according to an FBI press release.
Nolan was among the defendants caught up in the so-called “dirty DUI” scandal in which a private investigator hired alluring women to drink with the husbands of divorce clients at bars. The women would then invite the men to follow them in their cars, and police would be called to investigate a DUI. (more)
Monday, February 3, 2014
Spy History: Business Espionage in the 18th Century
UK - Derby and Derbyshire have been known for cutting-edge technology since the early 18th century.
ESPIONAGE was the murky business that kick-started Britain's industrial revolution and made Derby the world's first industrial town.
In the 17th and the first couple of decades of the 18th century, silk woven in Derby could not compete with Italian rivals.
John Lombe traveled to Piedmont (Italy) to find out how the fine-quality silk there was spun.
He made drawings of Italian machinery and smuggled them back to the UK to patent kit that would wind, spin and twist silk.
On his return to England, he arranged for engineer George Sorocold to construct a five-story factory to be powered by water from the Derwent.
It was the first operation of its kind in the country and has a strong claim to be the world's first successful use of the factory system. (more)
...and then...
Samuel Slater, an early English-American industrialist known as the "Father of the American Industrial Revolution", the "Father of the American Factory System" and "Slater the Traitor" (in the UK) ...because he brought British textile technology to America with a few modifications fit for America.
He learned textile machinery as an apprentice to a pioneer in the British industry.
He brought the knowledge to America where he designed the first textile mills, went into business for himself and grew wealthy.
By the end of Slater's life he owned thirteen spinning mills and had established tenant farms and towns around his textile mills such as Slatersville, Rhode Island.
Guess where Sam was born...
Derbyshire, England June 9, 1768. (more)
ESPIONAGE was the murky business that kick-started Britain's industrial revolution and made Derby the world's first industrial town.
In the 17th and the first couple of decades of the 18th century, silk woven in Derby could not compete with Italian rivals.
John Lombe traveled to Piedmont (Italy) to find out how the fine-quality silk there was spun.
He made drawings of Italian machinery and smuggled them back to the UK to patent kit that would wind, spin and twist silk.
On his return to England, he arranged for engineer George Sorocold to construct a five-story factory to be powered by water from the Derwent.
Lombe's Mill, viewed across the River Derwent, 18th century. |
...and then...
Samuel Slater, an early English-American industrialist known as the "Father of the American Industrial Revolution", the "Father of the American Factory System" and "Slater the Traitor" (in the UK) ...because he brought British textile technology to America with a few modifications fit for America.
He learned textile machinery as an apprentice to a pioneer in the British industry.
He brought the knowledge to America where he designed the first textile mills, went into business for himself and grew wealthy.
By the end of Slater's life he owned thirteen spinning mills and had established tenant farms and towns around his textile mills such as Slatersville, Rhode Island.
Guess where Sam was born...
Derbyshire, England June 9, 1768. (more)
Bergen University Admits Spying on Students
Norway - Every student has their own access card to make use of everything from the schools library to the toilets. When the students swipe their card, person, time and place gets registered and saved for 90 days...
With this system, the University can track all of the students´ movements...
Law student Peter Haraldsen believes that this type of spying is illegal. He demands the University to stop logging their students´ movements...
The Norwegian Data Protection Authority says that Bergen University might have crossed an illegal path, because the cards registers movements without asking the student to verify it with a pin code. (more)
With this system, the University can track all of the students´ movements...
Law student Peter Haraldsen believes that this type of spying is illegal. He demands the University to stop logging their students´ movements...
The Norwegian Data Protection Authority says that Bergen University might have crossed an illegal path, because the cards registers movements without asking the student to verify it with a pin code. (more)
Fox News Report on High-tech ‘Peeping Toms’
If there is one place in the world you expect to have privacy, it’s the bathroom. But a FOX 6 Investigation finds more and more women are finding their sense of security shattered by hidden cameras in the most private places.
Local prosecutors say the problem is getting worse as technology makes the cameras smaller and more affordable for the average consumer. In other words, you don’t have to be a secret agent or private investigators to own a hidden camera anymore. You can buy a high resolution video camera and self-contained recorder disguised as a ball point pen for less than it costs to fill your car up with gas.
In fact, hidden cameras are easy to find for sale on websites like Amazon, eBay, Craiglist and a host of websites that cater to private investigators and law enforcement, and specialize in sales of covert video gear. (more)
Local prosecutors say the problem is getting worse as technology makes the cameras smaller and more affordable for the average consumer. In other words, you don’t have to be a secret agent or private investigators to own a hidden camera anymore. You can buy a high resolution video camera and self-contained recorder disguised as a ball point pen for less than it costs to fill your car up with gas.
In fact, hidden cameras are easy to find for sale on websites like Amazon, eBay, Craiglist and a host of websites that cater to private investigators and law enforcement, and specialize in sales of covert video gear. (more)
Spying Landlord Hit with $1M Verdict
MD - A Montgomery County Circuit Court jury has found a Chevy Chase man liable for more than $1 million in damages for using a hidden camera to spy on a former tenant and her then-boyfriend. (more)
Sunday, February 2, 2014
When and Where Do Security Breach Laws Apply?
via Robert Ellis Smith...
"Each state law on security-breach notification is significantly different. What are those differences? Go here and find out. ...Of course subscribers to PRIVACY JOURNAL knew this nine months ago."
"Each state law on security-breach notification is significantly different. What are those differences? Go here and find out. ...Of course subscribers to PRIVACY JOURNAL knew this nine months ago."
Saturday, February 1, 2014
Sad: Ex-Spy Sells Special-Edition Watch on eBay
An unemployed former British spy is so hard-up he is selling his special-edition MI5 watch on eBay.
The ex-spook put his Breitling diver’s watch on the auction site in a bid to raise money because he lost his job with MI5 three years ago.
He is selling the specially commissioned time piece even though there are only a few hundred in circulation and they have never been displayed in public.
“This watch is a limited edition which could only be purchased by serving officers of MI5 British Security Service during their centenary.
“The watch was commissioned to celebrate their 100th anniversary.“So far I have had good offers and considerable interest on eBay and I must admit, I will be very sorry to be losing the watch as I have little to remind me of my time with the service.”
When he first bought the watch he paid more than £1,000 for it and the bids had reached more than £3,500 so far. (more)
The ex-spook put his Breitling diver’s watch on the auction site in a bid to raise money because he lost his job with MI5 three years ago.
He is selling the specially commissioned time piece even though there are only a few hundred in circulation and they have never been displayed in public.
“This watch is a limited edition which could only be purchased by serving officers of MI5 British Security Service during their centenary.
“The watch was commissioned to celebrate their 100th anniversary.“So far I have had good offers and considerable interest on eBay and I must admit, I will be very sorry to be losing the watch as I have little to remind me of my time with the service.”
When he first bought the watch he paid more than £1,000 for it and the bids had reached more than £3,500 so far. (more)
Labels:
employee,
government,
historical,
MI5,
miscellaneous,
Santa
Scientists Create Artifical Blowhard
The device, called an acoustic circulator, runs counter to the principle that sound waves, and other types of waves, are a two-way street.
The findings, published in Friday's issue of the journal Science, could lead to the sound equivalent of a one-way mirror. With such a device, people can hear someone talking, but they themselves cannot be heard.
There are some obviously stealthy ways to use the method, such as in spying devices.
"I can listen to you, but you cannot detect me back, you cannot hear my presence," Alù told LiveScience.
...the principle could also potentially be used to create one-way light waves. (Ghosts?!?!) (more)
The findings, published in Friday's issue of the journal Science, could lead to the sound equivalent of a one-way mirror. With such a device, people can hear someone talking, but they themselves cannot be heard.
There are some obviously stealthy ways to use the method, such as in spying devices.
"I can listen to you, but you cannot detect me back, you cannot hear my presence," Alù told LiveScience.
...the principle could also potentially be used to create one-way light waves. (Ghosts?!?!) (more)
Subscribe to:
Posts (Atom)