Australia - The future of Federal Parliament's top bureaucrat is under a cloud following the release of a scathing report by the Senate's powerful Privileges Committee.
It found Carol Mills provided "contradictory" and "misleading" information to a parliamentary committee about the use of security cameras inside Parliament House.
At issue was whether internal cameras were used to investigate a Parliament House employee who allegedly leaked information to Labor senator John Faulkner... previously said she only became aware in May that security footage had been used... other documents indicated Ms Mills was aware of the issue in February and had approved the use of security camera footage...
Her position as the chief bureaucrat in charge of Parliament House has come under question in recent months, following her decision earlier this year to downgrade security to save money.
That decision was subsequently reversed. (more)
Australia - The release of a secret report into a police bugging scandal has been blocked by Premier Mike Baird's department, leading to warnings the dispute may end up before the Supreme Court.
The Strike Force Emblems report examines allegations of illegal bugging by the NSW police's Special Crime and Internal Affairs (SCIA) and the NSW Crime Commission between 1999 and 2001, but has never been made public. (more)
Friday, December 5, 2014
Malware Planted In Chinese E-Cigarettes
Electronic cigarette manufacturers may have highlighted its numerous benefits to let you lead a healthy, stress-free life.
What they certainly did not highlight was that the device can be used for malware distribution as well...
To avoid such risks, it is advised to disable data pins on the USB and keep only cable charge to prevent any information exchange between the devices it connects.
Alternatively, use a USB Condom, a gadget that connects to USB and makes data pins ineffective. (more)
What they certainly did not highlight was that the device can be used for malware distribution as well...
To avoid such risks, it is advised to disable data pins on the USB and keep only cable charge to prevent any information exchange between the devices it connects.
Alternatively, use a USB Condom, a gadget that connects to USB and makes data pins ineffective. (more)
The History of the Telephone - Infographic
The history of the telephone...
(Wiretapping started in the 1800's. First on telegraph lines, then on the telephone lines.)
The History of the Telephone by ITS Limited, a provider of telecommunication solutions.
(Wiretapping started in the 1800's. First on telegraph lines, then on the telephone lines.)
The History of the Telephone by ITS Limited, a provider of telecommunication solutions.
Thursday, December 4, 2014
Cricket Can't Overbill for Wiretaps in Good Conscious
Cricket Communications has agreed to fork over nearly $2.2 million to resolve claims that it over-billed federal law enforcement agencies for the costs of conducting wiretaps and pen registers, federal authorities announced this week...
“A joint investigation by the Office of Inspector General and the U.S. Attorney’s Office revealed that Cricket overcharged federal law enforcement agencies for executing wiretaps and pen registers from 2007 until Cricket lowered its fees in 2010," the U.S. Attorney’s Office said in the press release. “The settlement agreement resolves the United States’ civil claims against Cricket based on the over-billing." (more)
“A joint investigation by the Office of Inspector General and the U.S. Attorney’s Office revealed that Cricket overcharged federal law enforcement agencies for executing wiretaps and pen registers from 2007 until Cricket lowered its fees in 2010," the U.S. Attorney’s Office said in the press release. “The settlement agreement resolves the United States’ civil claims against Cricket based on the over-billing." (more)
Jersey Girls Never Say Die and I'm Not a Spy
A 98-year-old New Jersey woman's showdown with the federal government over her 1950 conviction in the run-up to the atomic spying trial of Julius and Ethel Rosenberg returns to a Manhattan courtroom.
Miriam Moskowitz asked a judge earlier this year to reconsider her conviction in light of new evidence that emerged in the last decade... The government said she conspired with two men to lie to a grand jury investigating allegations of atomic espionage.
U.S. District Judge Alvin Hellerstein is set to hear oral arguments. He has urged a speedy resolution of the case. (more) (more) (her book) (video)
Miriam Moskowitz asked a judge earlier this year to reconsider her conviction in light of new evidence that emerged in the last decade... The government said she conspired with two men to lie to a grand jury investigating allegations of atomic espionage.
U.S. District Judge Alvin Hellerstein is set to hear oral arguments. He has urged a speedy resolution of the case. (more) (more) (her book) (video)
Espionage Conference: Beat Security into CEOs with a Stick
CEOs and business leaders often ignore cyber intrusions or even cover them up, allege IT experts who attended an espionage conference near Ottawa this week.
But those actions leave publicly listed companies and their corporate boards exposed to massive legal liabilities when cyber attacks leak customer info or damage the company’s competitive value...
...compel company executives and corporate boards to fix security holes, says Errol Mendes, a law professor at the University of Ottawa, who also spoke at the espionage conference.
“Tell them about the potential legal liability,” he said. “Use the legal stick.” (more)
But those actions leave publicly listed companies and their corporate boards exposed to massive legal liabilities when cyber attacks leak customer info or damage the company’s competitive value...
...compel company executives and corporate boards to fix security holes, says Errol Mendes, a law professor at the University of Ottawa, who also spoke at the espionage conference.
“Tell them about the potential legal liability,” he said. “Use the legal stick.” (more)
Business Espionage: GlobeRanger Awarded $15 million in Trade Secrets Espionage Case
Background
A lawsuit filed in state court Friday reads like a Hollywood script: It includes sex, deception and espionage in an alleged conspiracy to rob a Richardson company of its livelihood. (more)
The Verdict
According to a Nov. 28 court filing, on Nov. 20 a jury in federal court in Dallas awarded Richard, Texas-based GlobeRanger $15 million in a case that involved the misappropriation of trade secrets related to radio frequency identification technology.
The case is GlobeRanger Corp. v. Software AG, 3:11-cv-00403, U.S. District Court, Northern District of Texas (Dallas). (more)
A lawsuit filed in state court Friday reads like a Hollywood script: It includes sex, deception and espionage in an alleged conspiracy to rob a Richardson company of its livelihood. (more)
The Verdict
According to a Nov. 28 court filing, on Nov. 20 a jury in federal court in Dallas awarded Richard, Texas-based GlobeRanger $15 million in a case that involved the misappropriation of trade secrets related to radio frequency identification technology.
The case is GlobeRanger Corp. v. Software AG, 3:11-cv-00403, U.S. District Court, Northern District of Texas (Dallas). (more)
Wednesday, December 3, 2014
Russian Politicians May Be Required to Use Dumb Phones
A leftist Russian lawmaker has prepared a bill recommending all MPs to stop using iPhones and iPads to protect themselves from eavesdropping by foreign special services.
Dmitry Gorovtsov, of the center-left Fair Russia party, told the Interfax news agency that his suggestion applied primarily to politicians who had access to classified information...
“In principle, the MPs know that using the most primitive mobile phones, those that cost no more than $20, is a guarantee not only against the theft of your own financial data or spying on your e-mail, but also against bugging,” Gorovtsov said. (more)
The least expensive way to assure you will not be tracked, eavesdropped, or have your information stolen by spyware is to use a dumb cell phone. Sources: johnsphones.com, Kyocera Marbl K127, Motorola W260g, Motorola C139, more
Dmitry Gorovtsov, of the center-left Fair Russia party, told the Interfax news agency that his suggestion applied primarily to politicians who had access to classified information...
“In principle, the MPs know that using the most primitive mobile phones, those that cost no more than $20, is a guarantee not only against the theft of your own financial data or spying on your e-mail, but also against bugging,” Gorovtsov said. (more)
The least expensive way to assure you will not be tracked, eavesdropped, or have your information stolen by spyware is to use a dumb cell phone. Sources: johnsphones.com, Kyocera Marbl K127, Motorola W260g, Motorola C139, more
Wiretap Costs Drops
How much does a wiretap actually cost?
Last year, the average wiretap cost $41,119, according to the U.S. Courts Wiretaps Report for 2013, down from $57,540 the previous year. The steady decrease in wiretapping price means it's highly likely that wiretapping is cheaper now than it has ever been before. The average length of these wiretaps was 40 days, and the most prominent wiretapping happened in northern Illinois, where narcotics officers intercepted 136,378 text messages. (more)
Last year, the average wiretap cost $41,119, according to the U.S. Courts Wiretaps Report for 2013, down from $57,540 the previous year. The steady decrease in wiretapping price means it's highly likely that wiretapping is cheaper now than it has ever been before. The average length of these wiretaps was 40 days, and the most prominent wiretapping happened in northern Illinois, where narcotics officers intercepted 136,378 text messages. (more)
Chanel #007 - It Stinks
French researchers claim to have found indisputable evidence that Coco Chanel worked as a spy for the Nazis during the Second World War.
A written record made public for the first time in a documentary broadcast on French television last night is said to prove that the late fashion designer was a member of Abwehr - Adolf Hitler's secret military intelligence agency. (more)
A written record made public for the first time in a documentary broadcast on French television last night is said to prove that the late fashion designer was a member of Abwehr - Adolf Hitler's secret military intelligence agency. (more)
The Amazon is Full of Bugs, or...
...14 more reasons you should have us check your office for electronic eavesdropping devices.
I received the following in my email. It dispels the myth that bugging devices are expensive and difficult to obtain. Most of these are under $100.
One is $8.06 and holds 150 hours of audio.
Last summer it was reported that Ford Motor Company found similar voice recorders under about eight of their conference room tables.
A Technical Surveillance Countermeasures (TSCM) inspection (conducted by qualified security technicians) is the quickest and most economical way to protect yourself against being a victim.
Want to know more? Call me.
I received the following in my email. It dispels the myth that bugging devices are expensive and difficult to obtain. Most of these are under $100.
One is $8.06 and holds 150 hours of audio.
Last summer it was reported that Ford Motor Company found similar voice recorders under about eight of their conference room tables.
A Technical Surveillance Countermeasures (TSCM) inspection (conducted by qualified security technicians) is the quickest and most economical way to protect yourself against being a victim.
Want to know more? Call me.
Click to enlarge. |
Monday, December 1, 2014
Australia - Two Anti-Voyeurism Measures
New Anti-Voyeurism Law
Attorney-General Simon Corbell said the wide-ranging crimes legislation would provide greater protection from invasions of privacy in response to advances in technology.
"The offences introduced by the bill, to protect the privacy of individuals, will ensure that the law can appropriately deal with people who indecently engage in behaviour sometimes referred to as up-skirting and down-blousing without the consent of the person being observed, filmed or photographed," he said. (more)
No Drone Voyeurism in Fire Zones
State aviation operations manager David Pearce said drones could be lethal to aircraft, regardless of size, much like a bird strike that "took down an airliner" if it hit the wrong spot. "Helicopters are particularly susceptible. If the drone is sucked into the intake of the jet engines, or goes into the tail rotor, then it's probably curtains for the helicopter.
Mr Pearce said firefighting aircraft would be immediately grounded if a UAV was spotted either near, or within, a fire zone. (more)
Attorney-General Simon Corbell said the wide-ranging crimes legislation would provide greater protection from invasions of privacy in response to advances in technology.
"The offences introduced by the bill, to protect the privacy of individuals, will ensure that the law can appropriately deal with people who indecently engage in behaviour sometimes referred to as up-skirting and down-blousing without the consent of the person being observed, filmed or photographed," he said. (more)
No Drone Voyeurism in Fire Zones
State aviation operations manager David Pearce said drones could be lethal to aircraft, regardless of size, much like a bird strike that "took down an airliner" if it hit the wrong spot. "Helicopters are particularly susceptible. If the drone is sucked into the intake of the jet engines, or goes into the tail rotor, then it's probably curtains for the helicopter.
Mr Pearce said firefighting aircraft would be immediately grounded if a UAV was spotted either near, or within, a fire zone. (more)
Yes, you're a doctor. No, it's not all right.
UK - A South London doctor who took secret video footage of patients and colleagues on the toilet has been jailed for eight years.
Hearing specialist Lam Hoe Yeoh was sentenced at Croydon Crown Court after it was discovered that he had secretly hoarded 1,100 indecent images and videos of his patients at his home.
The 62-year-old man admitted to seven counts of voyeurism, six counts of taking an indecent photograph of a child and one count of possessing extreme pornography. (more)
Hearing specialist Lam Hoe Yeoh was sentenced at Croydon Crown Court after it was discovered that he had secretly hoarded 1,100 indecent images and videos of his patients at his home.
The 62-year-old man admitted to seven counts of voyeurism, six counts of taking an indecent photograph of a child and one count of possessing extreme pornography. (more)
FutureWatch: The Uber Hack Will Taxi In Soon
Imagine for a second that your job is to gather intelligence on government officials in Washington, or financiers in London, or entrepreneurs in San Francisco. Imagine further that there existed a database that collected daily travel information on such people with GPS-quality precision– where they went, when they went there and who else went to those same places at the same times.
Now add that all this location data was not held by a battle-hardened company with tons of lawyers and security experts, such as Google. Instead, this data was held by a start-up that was growing with viral exuberance – and with so few privacy protections that it created a “God View” to display the movements of riders in real-time and at least once projected such information on a screen for entertainment at a company party.
And let’s not forget that individual employees could access historical data on the movements of particular people without their permission, as an Uber executive in New York City reportedly did when he pulled the travel records of a Buzzfeed reporter who was working on a story about the company.
Wouldn’t that strike you as a hacking opportunity of remarkable awesomeness?
James A. Lewis, a cyber-security expert with the Center for Strategic and International Studies, said, “Most people have really bad operational security.” (more)
Now add that all this location data was not held by a battle-hardened company with tons of lawyers and security experts, such as Google. Instead, this data was held by a start-up that was growing with viral exuberance – and with so few privacy protections that it created a “God View” to display the movements of riders in real-time and at least once projected such information on a screen for entertainment at a company party.
And let’s not forget that individual employees could access historical data on the movements of particular people without their permission, as an Uber executive in New York City reportedly did when he pulled the travel records of a Buzzfeed reporter who was working on a story about the company.
Wouldn’t that strike you as a hacking opportunity of remarkable awesomeness?
James A. Lewis, a cyber-security expert with the Center for Strategic and International Studies, said, “Most people have really bad operational security.” (more)
Friday, November 28, 2014
The Bug Heard Round the World
Katana FT-1 is a miniature voice recorder with built-in Wi-Fi transmitter.
It records high quality audio on a MicroSD card. Yet to listen to the records you don’t even have to touch the voice recorder. All the collected data can be downloaded to an FTP server or host computer using ad-hoc Wi-Fi connection or via Internet.
To ensure high quality sound and fast upload Katana FT-1 exploits a dedicated audio processor with sophisticated voice compression algorithms (like Vorbis Ogg) and hi-speed Wi-Fi module. So 1 hour of high quality audio recording can be uploaded in just about 14 seconds. (more)
Why do I mention it?
So you will know what you're up against.
It records high quality audio on a MicroSD card. Yet to listen to the records you don’t even have to touch the voice recorder. All the collected data can be downloaded to an FTP server or host computer using ad-hoc Wi-Fi connection or via Internet.
To ensure high quality sound and fast upload Katana FT-1 exploits a dedicated audio processor with sophisticated voice compression algorithms (like Vorbis Ogg) and hi-speed Wi-Fi module. So 1 hour of high quality audio recording can be uploaded in just about 14 seconds. (more)
Why do I mention it?
So you will know what you're up against.
Subscribe to:
Posts (Atom)