How an American slacker caught a Russian spy at a New Jersey Hooters
, a smart, young New York techie, somehow spent three years going toe to toe with a Russian intelligence officer who thought he was developing an asset, even though all the while Jamali was quietly collaborating with U.S. federal agents.
The fast-paced, occasionally stressful, often hilarious and invariably self-involved story of how it all went down is the subject of “How to Catch a Russian Spy.” more
Saturday, June 13, 2015
And we call this plank in the platform, Stasi.
via Steve Benen...
When I first heard yesterday that Republican presidential hopeful Ben Carson wants to spy on U.S. government workers, I thought this was some kind of joke.
It sounded like a satirical way of poking fun at the right-wing neurosurgeon’s strange political views.
But as msnbc’s Jane C. Timm reported, Carson actually shared his thoughts on a “covert division” yesterday.
When I first heard yesterday that Republican presidential hopeful Ben Carson wants to spy on U.S. government workers, I thought this was some kind of joke.
It sounded like a satirical way of poking fun at the right-wing neurosurgeon’s strange political views.
But as msnbc’s Jane C. Timm reported, Carson actually shared his thoughts on a “covert division” yesterday.
The idea, apparently, would be to help motivate government employees to work as effectively as possible, fearing that their co-workers are spying on them. moreRepublican presidential contender Ben Carson said Wednesday that if elected next year he might implement a “covert division” of government workers who spy on their coworkers to improve government efficiency.The pediatric neurosurgeon-turned-candidate told a crowd of Iowa Republicans he is “thinking very seriously” about adding “a covert division of people who look like the people in this room, who monitor what government people do.”
Three Major Chinese Airlines to Provide In-Flight WiFi Services
Three major Chinese airlines, including China Eastern Airlines, China Southern Airlines and Air China, have been approved to provide in-flight Wi-Fi services.
China Eastern Airlines has become the first Chinese carrier to provide Wi-Fi services on both domestic and international flights... The services are expected to be offered in a month as the airline clears up several formalities ahead of the launch.
Oh, by the way...
"Through wifi access, we will offer a variety of internet services which are free for passengers. The service charges will be shared and paid by the airline and its business partners," said Zhang Chi with China Eastern Airlines.
Spybusters Tip #815 - From our "There is no free lunch" file... You might want to keep your phone in airplane mode.
China Eastern Airlines has become the first Chinese carrier to provide Wi-Fi services on both domestic and international flights... The services are expected to be offered in a month as the airline clears up several formalities ahead of the launch.
Oh, by the way...
"Through wifi access, we will offer a variety of internet services which are free for passengers. The service charges will be shared and paid by the airline and its business partners," said Zhang Chi with China Eastern Airlines.
Spybusters Tip #815 - From our "There is no free lunch" file... You might want to keep your phone in airplane mode.
Why Are Chipmunks Wearing Mini Spy Microphones?
Miniature Russian spyware is infiltrating an underground Canadian community.
The perpetrators? Scientists studying how eastern chipmunks communicate. For the first time, the team has outfitted the little striped animals with collars bearing inch-long (2.8 centimeters) microphones, the world's smallest digital recording device, according to Guinness World Records.
Using these espionage tools, the team recorded, analyzed, and decoded constant chipmunk chatter, instead of relying on static microphones that had previously limited scientists in understanding the secret lives of wildlife.
So far, the hardy microphones, deployed on chipmunks in southern Quebec's Green Mountains Nature Reserve, have provided unprecedented data on how and when chipmunks call, which is helping reveal the burrowing rodents' individual personalities. more w/video
The perpetrators? Scientists studying how eastern chipmunks communicate. For the first time, the team has outfitted the little striped animals with collars bearing inch-long (2.8 centimeters) microphones, the world's smallest digital recording device, according to Guinness World Records.
Using these espionage tools, the team recorded, analyzed, and decoded constant chipmunk chatter, instead of relying on static microphones that had previously limited scientists in understanding the secret lives of wildlife.
So far, the hardy microphones, deployed on chipmunks in southern Quebec's Green Mountains Nature Reserve, have provided unprecedented data on how and when chipmunks call, which is helping reveal the burrowing rodents' individual personalities. more w/video
Wednesday, June 10, 2015
Spy Virus Linked to Israel Targeted Hotels Used for Iran Nuclear Talks
When a leading cybersecurity firm discovered it had been hacked last year by a virus widely believed to be used by Israeli spies, it wanted to know who else was on the hit list. It checked millions of computers world-wide and three luxury European hotels popped up. The other hotels the firm tested, thousands in all, were clean.
Researchers at the firm, Kaspersky Lab, weren't sure what to make of the results. Then they realized what the three hotels had in common. Each was targeted before hosting high-stakes negotiations between Iran and world powers over curtailing Tehran's nuclear program. more
Spybuster Tip # 732: Know what else is going on in your hotel before you make the decision to use their Internet service.
Researchers at the firm, Kaspersky Lab, weren't sure what to make of the results. Then they realized what the three hotels had in common. Each was targeted before hosting high-stakes negotiations between Iran and world powers over curtailing Tehran's nuclear program. more
Spybuster Tip # 732: Know what else is going on in your hotel before you make the decision to use their Internet service.
Tuesday, June 9, 2015
Drones and Counter-Drones
As regular readers know, the Security Scrapbook follows drone development. Our Canadian Blue Blaze Irregular checks in:
Kevin, This is making a big splash in the news today out our way... Despite the relatively short flight time (it can be worked on) this would have been greatly appreciated by many of the people we’ve met. Usually they would have had great fun if it were available in their past life. Another ‘interesting’ toy. All kinds of possibilities. ~WM
And now, the drone antidote...
Kevin, This is making a big splash in the news today out our way... Despite the relatively short flight time (it can be worked on) this would have been greatly appreciated by many of the people we’ve met. Usually they would have had great fun if it were available in their past life. Another ‘interesting’ toy. All kinds of possibilities. ~WM
And now, the drone antidote...
Counterespionage Tip # 529 - Encryption as a Legal Defense
We strongly encourage companies possessing or transmitting personally identifiable information (PII), protected health information (PHI), financial or other sensitive data, including trade secrets, to use encryption. Why? Because, if employed properly, it is both effective and legally defensible.
Why should you use it?
You should use encryption because it gives you legal protection. Few laws specifically require encryption. HIPAA generally doesn’t. State statutes don’t. Nor does the Gramm Leach Bliley Act’s Safeguard’s Rule. Yet if you are not encrypting PII, PHI, or financial data, you are putting yourself at risk. Those laws expect you to take reasonable precautions. And using encryption, and using it properly, is a reasonable precaution when it comes to dealing with sensitive data. HIPAA, for example, provides that encryption should be used where “the entity has determined that the specification is a reasonable and appropriate safeguard in its risk management of the confidentiality, integrity and availability” of the information or else implement an “equivalent alternative measure if reasonable and appropriate,” and document why encryption wasn’t the best choice. more
Why should you use it?
You should use encryption because it gives you legal protection. Few laws specifically require encryption. HIPAA generally doesn’t. State statutes don’t. Nor does the Gramm Leach Bliley Act’s Safeguard’s Rule. Yet if you are not encrypting PII, PHI, or financial data, you are putting yourself at risk. Those laws expect you to take reasonable precautions. And using encryption, and using it properly, is a reasonable precaution when it comes to dealing with sensitive data. HIPAA, for example, provides that encryption should be used where “the entity has determined that the specification is a reasonable and appropriate safeguard in its risk management of the confidentiality, integrity and availability” of the information or else implement an “equivalent alternative measure if reasonable and appropriate,” and document why encryption wasn’t the best choice. more
The Post-it Note Attack Finally Makes it into an HBO Script
A post-it note with a password written on it, posted on the computer, or somewhere nearby. It's one of the most common information security slip-ups that I see. This icon of stupidity has finally made it into an HBO script (courtesy of Silicon Valley). Even hackers treat this with disdain...
Friday, June 5, 2015
NSA Spy Cam Blocker
That little front facing camera on your laptop or tablet...
can be a window for the world to see you - whether you know it or not! Stop hackers and the NSA with this simple camera blocker. Safe and practical. more
can be a window for the world to see you - whether you know it or not! Stop hackers and the NSA with this simple camera blocker. Safe and practical. more
Spy - The Movie
In the mood for a spy movie this weekend?
"Melissa McCarthy made her bones as a scene-stealing supporting player, but her starring vehicles have only occasionally made the most of her comic gifts. Until now, that is: critics say Spy is an inspired, uproarious spoof of espionage thrillers loaded with self-effacing performances and sharp jabs at workplace sexism." more
"Melissa McCarthy made her bones as a scene-stealing supporting player, but her starring vehicles have only occasionally made the most of her comic gifts. Until now, that is: critics say Spy is an inspired, uproarious spoof of espionage thrillers loaded with self-effacing performances and sharp jabs at workplace sexism." more
Let's YTRAP, mate!
A new kind of party craze has many Australians scrambling for invitations.
Crypto parties, where people gather to learn online encryption, are attracting everyone from politicians, to business people, to activists.
Two years after US spy agency contractor Edward Snowden leaked documents from the National Security Agency exposing mass global internet surveillance, there is rapidly growing interest in protecting online activity.
There have been crypto parties in Brazil, Germany and the UK, and more than a dozen have already been held in Australia.
Apps like Wickr, Confide and WhatsApp have taken encryption out of the geek lab and to the masses. more
Crypto parties, where people gather to learn online encryption, are attracting everyone from politicians, to business people, to activists.
Two years after US spy agency contractor Edward Snowden leaked documents from the National Security Agency exposing mass global internet surveillance, there is rapidly growing interest in protecting online activity.
There have been crypto parties in Brazil, Germany and the UK, and more than a dozen have already been held in Australia.
Apps like Wickr, Confide and WhatsApp have taken encryption out of the geek lab and to the masses. more
Labels:
amateur,
encryption,
fun,
FutureWatch,
mores,
privacy,
steganography
Better grab their car key, too.
...security giant G4S will confiscate smartphones from shareholders and journalists at its AGM in London after activists used them to film their violent removal by security staff at last year’s event.
The blanket ban, which includes staff and board members, comes a year after activists, who bought shares to attend the meeting, staged filmed interventions. The footage later appeared in the UK media.
A spokesman for G4S told the Guardian newspaper: “Last year we had a large number of protesters who were effectively staging demonstrations in the meeting and they were filming it.
“The intention is not to suppress the legitimate free speech of people but it is just simply to maintain some degree of security for our people in the meeting. That is the rationale.” more
The blanket ban, which includes staff and board members, comes a year after activists, who bought shares to attend the meeting, staged filmed interventions. The footage later appeared in the UK media.
A spokesman for G4S told the Guardian newspaper: “Last year we had a large number of protesters who were effectively staging demonstrations in the meeting and they were filming it.
“The intention is not to suppress the legitimate free speech of people but it is just simply to maintain some degree of security for our people in the meeting. That is the rationale.” more
Wednesday, June 3, 2015
Hero4 Minicam Easily Forced into Spycam Servitude by "Criminals"
A security firm has warned it is "too easy" for criminals to take control of GoPro cameras which could then be used to spy on their owners.
Pen Test Partners showed the BBC how it could gain access to a Hero4 camera that appeared to be turned off, to secretly watch or eavesdrop on users, or to view and delete existing videos.
The attack relied on victims setting simple passwords which could be guessed by software within seconds.
GoPro said its security was adequate. more
Pen Test Partners showed the BBC how it could gain access to a Hero4 camera that appeared to be turned off, to secretly watch or eavesdrop on users, or to view and delete existing videos.
The attack relied on victims setting simple passwords which could be guessed by software within seconds.
GoPro said its security was adequate. more
Cody Labs - One Smart Espionage-Savvy Company
Pharmaceutical company Cody Laboratories Inc. occupied its new $3.7
million. 11,000-square-foot warehouse Monday after a ribbon-cutting that
drew Gov. Matt Mead and other dignitaries.
James Klessens, CEO of Forward Cody, an economic development agency, said the company is helping Cody keep Wyomingites in Wyoming.
“If you want to see the warehouse you better come yesterday because after today nobody in the general public is going to gain access to that building,” Klessens said. He indicated that as a pharmaceutical company Cody Labs has to worry about corporate espionage and defending trade secrets, making them an enormously private company. more
James Klessens, CEO of Forward Cody, an economic development agency, said the company is helping Cody keep Wyomingites in Wyoming.
“If you want to see the warehouse you better come yesterday because after today nobody in the general public is going to gain access to that building,” Klessens said. He indicated that as a pharmaceutical company Cody Labs has to worry about corporate espionage and defending trade secrets, making them an enormously private company. more
Free Spycam Detection Advice on the Net (Worth exactly what you paid for it.)
How to Detect Hidden Spy Cam in Dressing Room
There are camera which are smaller in size that could capture HD videos and possibly hides its presence from Human eye. So conduct this simple test to check whether you are really "Private" with no hidden cameras monitoring.
This is total nonsense of course, but sadly, many trusting souls will believe it. If you really need to make sure your "expectation of privacy" areas are free from spy cameras, may I suggest spycamdetection.training.
There are camera which are smaller in size that could capture HD videos and possibly hides its presence from Human eye. So conduct this simple test to check whether you are really "Private" with no hidden cameras monitoring.
- Enter trial room with your mobile phone and ensure mobile signal to make calls.
- Try to make call inside the private room, if there is a "Hidden Camera" you cannot make calls due to interference of fiber optics during signal transfer which blocks mobile callls. (sic)
- Making calls without any interference is the sign of Camera free room.
This is total nonsense of course, but sadly, many trusting souls will believe it. If you really need to make sure your "expectation of privacy" areas are free from spy cameras, may I suggest spycamdetection.training.
Subscribe to:
Posts (Atom)