Imagine for a second that your job is to gather intelligence on government officials in Washington, or financiers in London, or entrepreneurs in San Francisco. Imagine further that there existed a database that collected daily travel information on such people with GPS-quality precision– where they went, when they went there and who else went to those same places at the same times.
Now add that all this location data was not held by a battle-hardened company with tons of lawyers and security experts, such as Google. Instead, this data was held by a start-up that was growing with viral exuberance – and with so few privacy protections that it created a “God View” to display the movements of riders in real-time and at least once projected such information on a screen for entertainment at a company party.
And let’s not forget that individual employees could access historical data on the movements of particular people without their permission, as an Uber executive in New York City reportedly did when he pulled the travel records of a Buzzfeed reporter who was working on a story about the company.
Wouldn’t that strike you as a hacking opportunity of remarkable awesomeness?
James A. Lewis, a cyber-security expert with the Center for Strategic and International Studies, said, “Most people have really bad operational security.” (more)
Monday, December 1, 2014
Friday, November 28, 2014
The Bug Heard Round the World
Katana FT-1 is a miniature voice recorder with built-in Wi-Fi transmitter.
It records high quality audio on a MicroSD card. Yet to listen to the records you don’t even have to touch the voice recorder. All the collected data can be downloaded to an FTP server or host computer using ad-hoc Wi-Fi connection or via Internet.
To ensure high quality sound and fast upload Katana FT-1 exploits a dedicated audio processor with sophisticated voice compression algorithms (like Vorbis Ogg) and hi-speed Wi-Fi module. So 1 hour of high quality audio recording can be uploaded in just about 14 seconds. (more)
Why do I mention it?
So you will know what you're up against.
It records high quality audio on a MicroSD card. Yet to listen to the records you don’t even have to touch the voice recorder. All the collected data can be downloaded to an FTP server or host computer using ad-hoc Wi-Fi connection or via Internet.
To ensure high quality sound and fast upload Katana FT-1 exploits a dedicated audio processor with sophisticated voice compression algorithms (like Vorbis Ogg) and hi-speed Wi-Fi module. So 1 hour of high quality audio recording can be uploaded in just about 14 seconds. (more)
Why do I mention it?
So you will know what you're up against.
Aged Law Urped Up to Decrypt Phone Data
The Justice Department is turning to a 225-year-old law to tackle a very modern problem: password-protected cellphones.
Prosecutors last month asked a federal magistrate in Manhattan to order an unnamed phone maker to provide “reasonable technical assistance” to unlock a password-protected phone that could contain evidence in a credit-card-fraud case, according to court filings...
...the government on Oct. 10 obtained a search warrant to examine the contents of the phone. In the credit-card case, the phone was locked, so prosecutors asked U.S. Magistrate Judge Gabriel Gorenstein to order the manufacturer to unlock it. They cited the All Writs Act, originally part of a 1789 law that gives courts broad authority to carry out their duties. (more)
Prosecutors last month asked a federal magistrate in Manhattan to order an unnamed phone maker to provide “reasonable technical assistance” to unlock a password-protected phone that could contain evidence in a credit-card-fraud case, according to court filings...
...the government on Oct. 10 obtained a search warrant to examine the contents of the phone. In the credit-card case, the phone was locked, so prosecutors asked U.S. Magistrate Judge Gabriel Gorenstein to order the manufacturer to unlock it. They cited the All Writs Act, originally part of a 1789 law that gives courts broad authority to carry out their duties. (more)
Log Jam - Forces You to Shut Up and Experience Where You Are
Artist and coder Allison Burtch has created a new device to save us from our cellphones and ourselves.
It comes in the form of a 10-inch birch log that jams cellular radio signals, and it’s called the Log Jammer. Packed with about $200 of hardware including a power source, a circuit board of her own design, voltage control components, an amplifier, and an antenna, it can produce radio noise at the 1950 megahertz frequency commonly used by cellphones. It’s powerful enough to block all cellphone voice communications in a 20-foot bubble, and its log-like exterior is designed to unobtrusively create that radio-jamming zone in the great outdoors...
Burtch sees her creation as the inverse of the increasingly common sight of cellular towers disguised as trees. Instead of hiding technology in nature to let people remain connected everywhere, the Log Jammer blends into a natural setting to cut off that constant remote communication—to force people to experience the place they’re in. Burtch paraphrases French philosopher Gilles Deleuz: “The problem is no longer getting people to express themselves,” she says. “It’s creating a needed gap of solitude in which they might find something to say.” (more)
It comes in the form of a 10-inch birch log that jams cellular radio signals, and it’s called the Log Jammer. Packed with about $200 of hardware including a power source, a circuit board of her own design, voltage control components, an amplifier, and an antenna, it can produce radio noise at the 1950 megahertz frequency commonly used by cellphones. It’s powerful enough to block all cellphone voice communications in a 20-foot bubble, and its log-like exterior is designed to unobtrusively create that radio-jamming zone in the great outdoors...
Burtch sees her creation as the inverse of the increasingly common sight of cellular towers disguised as trees. Instead of hiding technology in nature to let people remain connected everywhere, the Log Jammer blends into a natural setting to cut off that constant remote communication—to force people to experience the place they’re in. Burtch paraphrases French philosopher Gilles Deleuz: “The problem is no longer getting people to express themselves,” she says. “It’s creating a needed gap of solitude in which they might find something to say.” (more)
Sunday, November 23, 2014
How They Do It - Spying on Citizens in Central Asia
A recent report from Privacy International
has tried to shine some light on the methods Central Asian governments are using to track their populaces – and to examine how closely they mirror Russian and Chinese examples, as well as which Western companies have supplied the necessary technology along the way. (more)
has tried to shine some light on the methods Central Asian governments are using to track their populaces – and to examine how closely they mirror Russian and Chinese examples, as well as which Western companies have supplied the necessary technology along the way. (more)
Hey Kids! You Too Can Have Cool NSA Spy Toys
Welcome to the home of the NSA Playset.
In the coming months and beyond, we will release a series of dead simple, easy to use tools to enable the next generation of security researchers. We, the security community have learned a lot in the past couple decades, yet the general public is still ill equipped to deal with real threats that face them every day, and ill informed as to what is possible.
Inspired by the NSA ANT catalog, we hope the NSA Playset will make cutting edge security tools more accessible, easier to understand, and harder to forget. Now you can play along with the NSA! (more)
If you are thinking of contributing a new NSA Playset project, please keep in mind the following requirements:
1. A Silly Name
If your project is similar to an existing NSA ANT project, you can come up with a clever play on that name. For example, if your project is similar to FOXACID, maybe you could call it COYOTEMETH. Of course, if your project doesn't quite line up with anything in the ANT Catalog, you can come up with your own name. If you are feeling less creative, try out the handy name generator found here: http://www.nsanamegenerator.com/ (more)
In the coming months and beyond, we will release a series of dead simple, easy to use tools to enable the next generation of security researchers. We, the security community have learned a lot in the past couple decades, yet the general public is still ill equipped to deal with real threats that face them every day, and ill informed as to what is possible.
Inspired by the NSA ANT catalog, we hope the NSA Playset will make cutting edge security tools more accessible, easier to understand, and harder to forget. Now you can play along with the NSA! (more)
If you are thinking of contributing a new NSA Playset project, please keep in mind the following requirements:
1. A Silly Name
If your project is similar to an existing NSA ANT project, you can come up with a clever play on that name. For example, if your project is similar to FOXACID, maybe you could call it COYOTEMETH. Of course, if your project doesn't quite line up with anything in the ANT Catalog, you can come up with your own name. If you are feeling less creative, try out the handy name generator found here: http://www.nsanamegenerator.com/ (more)
Labels:
amateur,
eavesdropping,
fun,
FutureWatch,
Hack,
NSA,
wiretapping
This Week in Wiretap News
ID - The former information technology director of a hospital in Blackfoot was sentenced to three years of probation after he was convicted of wiretapping. A Bingham County judge imposed the sentence for 46-year-old Jack York on Friday. York was accused along with three others of recording telephone calls by a former hospital doctor and his staff between June 2009 and August 2010. (more) (more)
Taiwan - An aide to Ko Wen-je was arrested yesterday by Taipei prosecutors looking into alleged wiretapping of the independent Taipei mayoral hopeful's office... (more)
DC - American investigators intercepted a conversation this year in which a Pakistani official suggested that his government was receiving American secrets from a prominent former State Department diplomat, officials said, setting off an espionage investigation that has stunned diplomatic circles here, The New York Times in a report Friday said. That conversation led to months of secret surveillance on the former diplomat, Robin L. Raphel, and an F.B.I. raid last month at her home, where agents discovered classified information, the officials said. (more)
Turkey - More details have surfaced about the Gülenists' wiretapping of the then prime minister Recep Tayyip Erdoğan, after an indictment regarding the investigation was submitted to court. The Gülenists planned every step in detail, according to the indictment. The Ankara chief public prosecutor's office has prepared an indictment on 13 suspects, who are accused of wiretapping then Prime Minister Recep Tayyip Erdoğan, charging the suspects with "political spying" after an investigation into the alleged offenders was completed. (more)
CA - Counsel Timothy Perry discusses how wiretaps are vulnerable to attack, especially in white collar cases. He explains some details of the wiretap statute and discusses how defense attorneys can best address wiretap evidence in a white collar case. (video)
NC - A judge Friday unsealed a trove of court documents that could shed light on a secret cellphone tracking program used by police nationwide. The judge in Charlotte, N.C., acted after a petition from the Charlotte Observer to make the documents public. Included are 529 requests from local Charlotte-Mecklenburg police asking judges to approve the use of a technology known as StingRay, which allows cellphone surveillance. (more)
NYC - Add New York City’s Taxi and Limousine Commission to the list of powerful groups investigating Uber for allegedly spying on its users. The commission, which regulates Uber, is “looking into allegations” that the mobile car-hailing app violated users’ privacy by tracking them without their permission. (more)
Taiwan - An aide to Ko Wen-je was arrested yesterday by Taipei prosecutors looking into alleged wiretapping of the independent Taipei mayoral hopeful's office... (more)
DC - American investigators intercepted a conversation this year in which a Pakistani official suggested that his government was receiving American secrets from a prominent former State Department diplomat, officials said, setting off an espionage investigation that has stunned diplomatic circles here, The New York Times in a report Friday said. That conversation led to months of secret surveillance on the former diplomat, Robin L. Raphel, and an F.B.I. raid last month at her home, where agents discovered classified information, the officials said. (more)
Turkey - More details have surfaced about the Gülenists' wiretapping of the then prime minister Recep Tayyip Erdoğan, after an indictment regarding the investigation was submitted to court. The Gülenists planned every step in detail, according to the indictment. The Ankara chief public prosecutor's office has prepared an indictment on 13 suspects, who are accused of wiretapping then Prime Minister Recep Tayyip Erdoğan, charging the suspects with "political spying" after an investigation into the alleged offenders was completed. (more)
CA - Counsel Timothy Perry discusses how wiretaps are vulnerable to attack, especially in white collar cases. He explains some details of the wiretap statute and discusses how defense attorneys can best address wiretap evidence in a white collar case. (video)
NC - A judge Friday unsealed a trove of court documents that could shed light on a secret cellphone tracking program used by police nationwide. The judge in Charlotte, N.C., acted after a petition from the Charlotte Observer to make the documents public. Included are 529 requests from local Charlotte-Mecklenburg police asking judges to approve the use of a technology known as StingRay, which allows cellphone surveillance. (more)
NYC - Add New York City’s Taxi and Limousine Commission to the list of powerful groups investigating Uber for allegedly spying on its users. The commission, which regulates Uber, is “looking into allegations” that the mobile car-hailing app violated users’ privacy by tracking them without their permission. (more)
Adequately Protected Trade Secrets Can Keep You Out of Court... and a winner in court.
by Mark L. Krotoski, Esq.
Trade secrets can be among the most valuable assets a company has. According to one study, "Two thirds of enterprises’ information portfolio value comes from the secrets they create."
One trade secret can lead to many products. As a unique form of intellectual property, trade secrets can be vital not only to a company and its employees, but also to other jobs, investments, an industry, the economy and, depending on the trade secrets, even national security.
Two Key Questions for Trade Secret Owners
Given the importance of trade secrets, trade secret owners should ask two key questions:
(1) How many trade secrets do you have?
(2) Are your trade secrets adequately protected?
Many companies have trade secrets which can generate substantial value for the company. Regrettably, experience has shown that large and small companies have not taken the steps necessary to protect them. When the unexpected misappropriation occurs, it is clearly too late...
A culture of protection can establish the tone within the company to safeguard the trade secrets. A layered approach to security has proven effective in past cases to mitigate any misappropriation and to establish the reasonableness of the security measures. An objective assessment of the measures safeguarding the trade secrets can assist in determining the reasonableness u der trade secret law. Most importantly, companies should develop a trade secret protection plan in advance of any misappropriation.
So, as a trade secret owner, how do you answer the two questions? How confident are you that your trade secrets are reasonably protected and will survive court scrutiny if that ever becomes necessary? (more)
If you need help answering these questions, call me. An information security evaluation by an independent outside specialist can help with answers and will count toward fulfilling the adequacy requirement.
Trade secrets can be among the most valuable assets a company has. According to one study, "Two thirds of enterprises’ information portfolio value comes from the secrets they create."
One trade secret can lead to many products. As a unique form of intellectual property, trade secrets can be vital not only to a company and its employees, but also to other jobs, investments, an industry, the economy and, depending on the trade secrets, even national security.
Two Key Questions for Trade Secret Owners
Given the importance of trade secrets, trade secret owners should ask two key questions:
(1) How many trade secrets do you have?
(2) Are your trade secrets adequately protected?
Many companies have trade secrets which can generate substantial value for the company. Regrettably, experience has shown that large and small companies have not taken the steps necessary to protect them. When the unexpected misappropriation occurs, it is clearly too late...
A culture of protection can establish the tone within the company to safeguard the trade secrets. A layered approach to security has proven effective in past cases to mitigate any misappropriation and to establish the reasonableness of the security measures. An objective assessment of the measures safeguarding the trade secrets can assist in determining the reasonableness u der trade secret law. Most importantly, companies should develop a trade secret protection plan in advance of any misappropriation.
So, as a trade secret owner, how do you answer the two questions? How confident are you that your trade secrets are reasonably protected and will survive court scrutiny if that ever becomes necessary? (more)
If you need help answering these questions, call me. An information security evaluation by an independent outside specialist can help with answers and will count toward fulfilling the adequacy requirement.
Thursday, November 20, 2014
FREE - Enemy-of-the-State Spyware Detection Tool
via eff.org...
"Detekt is an easy-to-use, open source tool that allows users to check their Windows PCs for signs of infection by surveillance malware that we know is being used by government to spy on activists and journalists.
Some of the software used by states against innocent citizens is widely available on the Internet, while more sophisticated alternatives are made and sold by private companies and sold to governments everywhere from the United States and Europe to Ethiopia and Vietnam.
Detekt makes it easy for at-risk users to check their PCs for possible infection by this spyware, which often goes undetected by existing commercial anti-virus products." (more)
"Detekt is an easy-to-use, open source tool that allows users to check their Windows PCs for signs of infection by surveillance malware that we know is being used by government to spy on activists and journalists.
Some of the software used by states against innocent citizens is widely available on the Internet, while more sophisticated alternatives are made and sold by private companies and sold to governments everywhere from the United States and Europe to Ethiopia and Vietnam.
Detekt makes it easy for at-risk users to check their PCs for possible infection by this spyware, which often goes undetected by existing commercial anti-virus products." (more)
Labels:
App,
computer,
counterespionage,
FREE,
government,
privacy,
software
Covert Video Leaves Business Running Around Like a Chicken with its...
TN - Koch Foods on Wednesday denied its Chattanooga processing plant is inhumanely treating chickens by scalding the birds alive and shackling them upside-down before slicing open their throats, wings and chests while still conscious.
The allegations by animal protection group Mercy for Animals...
The Los Angeles-based group released covert video that it said was taken inside the Koch Chattanooga plant and another operation in Mississippi, complaining that workers are also cruelly throwing chickens and hiding cockroaches from federal inspectors.
The video, narrated by The Simpsons co-creator Sam Simon, demanded that Illinois-based Koch adopt new animal welfare standards to prevent future abuse. (more)
P.S. Last year, Tennessee legislators enacted what critics dubbed an “ag-gag” bill they charged was intended to prevent investigations similar to the Mercy for Animals undercover operations as well as one that targeted Tennessee Walking Horse industry abuse.
Republican Gov. Bill Haslam vetoed the bill after getting deluged with complaints, including a plea from country music star Carrie Underwood.
The allegations by animal protection group Mercy for Animals...
The Los Angeles-based group released covert video that it said was taken inside the Koch Chattanooga plant and another operation in Mississippi, complaining that workers are also cruelly throwing chickens and hiding cockroaches from federal inspectors.
The video, narrated by The Simpsons co-creator Sam Simon, demanded that Illinois-based Koch adopt new animal welfare standards to prevent future abuse. (more)
P.S. Last year, Tennessee legislators enacted what critics dubbed an “ag-gag” bill they charged was intended to prevent investigations similar to the Mercy for Animals undercover operations as well as one that targeted Tennessee Walking Horse industry abuse.
Republican Gov. Bill Haslam vetoed the bill after getting deluged with complaints, including a plea from country music star Carrie Underwood.
Memory Stick Voice Recorder - Patiently Listens 24/7, for 25 Days
This Voice-Activated USB drive looks and functions like an ordinary flash drive. Secretly, this storage device conceals hidden a microphone. Hang on a lanyard or slip into a pocket for discreet recording. Use this unit at the office, school, to covertly record voice as a secret shopper or investigator, or to simply record notes and interviews at school or work.
Voice-activation mode. The voice-activation feature allows you to avoid long hours of silent recording and save battery life. This unit can be on standby for up to 25 days waiting to pickup any voices you may hear.
Portable and easy to use. The flash drive needs no cables or batteries, making it perfect for the covert operative on the go. Recording is as simple as a touch of the button. Choose from normal recording or voice activation. ≈$100.00 (more) (user manual)
Why do I mention this?
So you will know what you're up against.
Voice-activation mode. The voice-activation feature allows you to avoid long hours of silent recording and save battery life. This unit can be on standby for up to 25 days waiting to pickup any voices you may hear.
Portable and easy to use. The flash drive needs no cables or batteries, making it perfect for the covert operative on the go. Recording is as simple as a touch of the button. Choose from normal recording or voice activation. ≈$100.00 (more) (user manual)
Why do I mention this?
So you will know what you're up against.
Speed, Instant Ticket... or, You Can Drive, But You Can't Hide
FutureWatch: Russia - 1200 complexes of photo and video registration will be installed in 381 sections of federal highways and regional roads located in the Moscow region. In particular, new equipment will be installed in almost every district and all major cities of the Moscow region, as well as in the smaller and greater Moscow Ring Road areas...
It is planned that the installation of photo and video registration systems will be conducted at the expense of an investor company, which, in turn, will receive a share of all fines issued for violation of traffic rules detected by cameras...
According to the authors of the idea, cameras will be able to register the majority of traffic violations, including speeding and driving on the oncoming lane. (more)
• Traffic cameras on steroids.
• Becomes operational just before self-driving vehicles, thus making this less necessary.
• Does the government has some other uses in mind? (Duh.)
• Will this surveillance network be adopted by other countries, too? (Duh.)
It is planned that the installation of photo and video registration systems will be conducted at the expense of an investor company, which, in turn, will receive a share of all fines issued for violation of traffic rules detected by cameras...
According to the authors of the idea, cameras will be able to register the majority of traffic violations, including speeding and driving on the oncoming lane. (more)
• Traffic cameras on steroids.
• Becomes operational just before self-driving vehicles, thus making this less necessary.
• Does the government has some other uses in mind? (Duh.)
• Will this surveillance network be adopted by other countries, too? (Duh.)
Wednesday, November 19, 2014
Everything You Wanted to Know About Cell Phone Tracking via Call Detail Records
What is Cellular Data Analysis?
How is Cellular Data Analysis Used?
What about Triangulation?
Is There an Accurate Way to Track a Cell Phone Location?
Is cell tower tracking evidence junk science?
Is there a good use for cellular location evidence?
(answers here)
How is Cellular Data Analysis Used?
What about Triangulation?
Is There an Accurate Way to Track a Cell Phone Location?
Is cell tower tracking evidence junk science?
Is there a good use for cellular location evidence?
(answers here)
Fake Cell Tower Survey on Indiegogo
If there's somethin' strange in your neighborhood
Who ya gonna call (cellbusters)
If it's somethin' weird an it don't look good
Who ya gonna call (cellbusters)
(more) (sing-a-long)
Who ya gonna call (cellbusters)
If it's somethin' weird an it don't look good
Who ya gonna call (cellbusters)
(more) (sing-a-long)
Tuesday, November 18, 2014
Your Email is Hacked - Now What?
The State Department has suspended its unclassified email system in response to a suspected hacking attack.
The unprecedented shutdown on Friday was reportedly applied to give technicians an opportunity to repair possible damage, as well as to apply security improvements. (more)
But, what if it's your email? You don't have "technicians" to turn to. Techlicious to the rescue...
Step #1: Change your password.
Step #2: Reclaim your account.
Step #3: Enable two-factor authentication.
Step #4: Check your email settings.
Step #5: Scan your computer for malware.
Step #6: Find out what else has been compromised.
Step #7: Humbly beg for forgiveness from your friends.
Step #8: Prevent it from happening again.
Full details for each step are outlined here.
The unprecedented shutdown on Friday was reportedly applied to give technicians an opportunity to repair possible damage, as well as to apply security improvements. (more)
But, what if it's your email? You don't have "technicians" to turn to. Techlicious to the rescue...
Step #1: Change your password.
Step #2: Reclaim your account.
Step #3: Enable two-factor authentication.
Step #4: Check your email settings.
Step #5: Scan your computer for malware.
Step #6: Find out what else has been compromised.
Step #7: Humbly beg for forgiveness from your friends.
Step #8: Prevent it from happening again.
Full details for each step are outlined here.
Subscribe to:
Posts (Atom)