A former police intelligence chief is required to serve up to 860 years in prison in a wiretapping case, in which he has been found guilty of wiretapping 48 people, including several government officials, journalists, judiciary personnel and businessmen. more
China's ex-security chief Zhou Yongkang has been jailed for life - the most senior politician to face corruption charges under Communist rule. more
Pigeon arrested and jailed after police believe it’s a Pakistani spy. The would-be feathered James Bond was taken to a police station by a 14-year-old, after he discovered a mysterious note attached to the animal – which was written in Urdu and listed a Pakistani phone number. more
The former chief of the feared spy agency responsible for kidnapping, torturing and killing thousands during Chile's military dictatorship has accumulated 500 years in prison sentences. more
Paris court sentences Gilbert Chikli to prison in absentia for bamboozling 33 banks and companies in France out of millions by passing himself off as a CEO or intelligence agent. more (FutureWatch - Coming to a theater near you.)
Accused spy Thomas Rukavina killed himself Friday evening in his Plum home, but the federal probe involving industrial trade secrets, Chinese espionage and possible co-conspirators here and abroad continues. more
A Russian citizen who worked in Manhattan as a banker asked a federal judge June 11 to toss out charges that he participated in a Cold War-style Russian spy ring. Lawyers for Evgeny Buryakov, who remains in jail after his arrest in January, said the case should be disallowed despite an avalanche of video and audio recordings of his alleged spying activities collected by prosecutors. more
Care to reconsider your dream of becoming a spy?
Sunday, June 14, 2015
Spycatching Give-Ups
East Timor has officially dropped its case against Australia before the
UN's International Court of Justice, after Canberra returned sensitive
documents relating to a controversial oil and gas treaty. more
Germany has dropped an investigation into alleged tapping of Chancellor Angela Merkel's phone by the US National Security Agency (NSA). more
Three Polish government ministers and the speaker of parliament resigned June 10 over a high profile eavesdropping scandal just four months ahead of a general election which polls show could usher the conservative opposition into power. more
Germany has dropped an investigation into alleged tapping of Chancellor Angela Merkel's phone by the US National Security Agency (NSA). more
Three Polish government ministers and the speaker of parliament resigned June 10 over a high profile eavesdropping scandal just four months ahead of a general election which polls show could usher the conservative opposition into power. more
This Week's Questions from the Media
Q. How did you come to be in PI?
A. A long time ago, I interviewed Jackie Mason for my college radio station and phrased a similar question to him. He stopped me and said, "don't ask how, ask why, that's what's interesting." I never forgot it.
With that in mind... The short story is I had a high school interest in radio-electronics. During college, I took a summer job in law enforcement which involved surveillance electronics. Really interesting! I switched majors from mass media to criminal justice. I obtained employment as a private investigator with Pinkertons Inc. (where I got to use surveillance equipment and concoct custom surveillance solutions). I advanced to become the director of their commercial investigations department in NJ, and then director of their electronic countermeasures department worldwide. In 1978, I opened my own firm specializing in electronic countermeasures (aka Technical Surveillance Countermeasures or TSCM). "How," was just a pinball path of following my interests and being ready to take advantage of opportunities that came my way. "Why," because I am inquisitive, fascinated by technology, and most of all, I like helping people solve their problems.
Q. What kind of services do you/company offer?
A. • TSCM; detecting electronic surveillance devices for business and government.
• Counterespionage consulting; providing advice to help detect and deter business espionage.
• Training; specialized training for keeping the workplace free from video voyeurism.
• Smartphone spyware detection and prevention; a book, an Android app, an iPhone app and a smartphone anti-spyware security kit.
Q. What is your day-to-day routine like?
A. There is nothing routine about my day except that every day is a work day. I'm not sure whether this is a factor of being in one's own business, or this particular business demands it. We are available to our clients 24/7, including holidays and weekends. Vacations are taken during slow periods, usually 7-10 days, once or twice a year. The days are divided into two types, office days and field days, when my team and I are conducting inspections for our clients. On office days the work includes: report writing, invoicing, marketing, servicing instrumentation, working on research projects for clients, bookkeeping, creation of books, training, apps, etc.
Q. How has technology affected your day to day, if at all, in recent months/years?
A. My business is heavily technology oriented. Technology change always affects what we do, how we do it, and what new countermeasures we need to develop to keep ahead-of-the-curve. People mistakenly believe that technology changes the things on which we focus. Wrong. It adds to them. All prior espionage techniques still work, and are still used. Spies just have more tricks in the black bag these days.
Q. What is the biggest misconception about being a PI?
A. (Laughter) Pretty much everything you see on TV and the movies. Having worked in all aspects of private investigations before settling into my specialization, I can generalize and say... "Private investigations has a very long flash to bang ratio." That is to say, any investigation involves long periods of quiet work before the last 5% of excitement. That being said, the extremely well-worth-the-wait excitement reward is an intense bit at the end. The greater reward is the satisfaction of having helped someone. That part lasts, and accumulates.
Q. Is there a particular issue facing your industry as a group that you’re concerned with right now?
A. Yes. Video voyeurism in the workplace is the hottest issue around right now. The problem started gaining logarithmic traction about 10-15 years ago. In the past year, the epidemic hit critical mass. I began receiving "what can we do" calls from my clients, similar to the flood of calls about cell phone spyware which prompted the book, app and security kit. At first, places like small businesses, private schools and country clubs called us in to conduct inspections. Once our larger clients began to call, it became obvious that sending us to check restrooms and changing rooms at all their locations (around the world in some cases) was impractical. The solution was to develop an on-line training course for their local security and facilities people.
Q. Why do you think video voyeurism reached critical mass in the last year?
A. Two factors...
1. Over the years, spy cameras have evolved from cheap low-resolution devices, to inexpensive, well-made, high-resolution devices.
2. Voyeurs have also evolved. The early video voyeurs targeted areas over which they had full control, e.g. their bedrooms, bathrooms. Emboldened by these successes, they began to include semi-controllable area targets, e.g. significant others' bedroom and bathrooms, and we also started to see media reports about landlords spying on their tenants.
Keep in mind, any media report about video voyeurism represents a failed (discovered) attack; the majority of video voyeurs are successful.
The next target expansion happened when these people began to coagulate on-line, swapping video files, war stories, and how-to tutorials on YouTube.
Now, emboldened by previous successes, camaraderie, better technology, and honed tradecraft, their hunting grounds expanded to business locations with public expectation-of-privacy areas – restrooms, changing rooms, locker rooms / showers, tanning salons, etc. Huge mistake.
In the past year or so, enough video voyeurs have been caught in corporate venues (Walmart, Starbucks, for example) to make this a legal "foreseeability" issue, with sexual harassment in the workplace implications. The dollar losses — employee morale, business goodwill, reputation and lawsuits — tipped the scales. Invading the corporate landscape was the final straw. With big money at stake, businesses beginning to fight back.
A. A long time ago, I interviewed Jackie Mason for my college radio station and phrased a similar question to him. He stopped me and said, "don't ask how, ask why, that's what's interesting." I never forgot it.
With that in mind... The short story is I had a high school interest in radio-electronics. During college, I took a summer job in law enforcement which involved surveillance electronics. Really interesting! I switched majors from mass media to criminal justice. I obtained employment as a private investigator with Pinkertons Inc. (where I got to use surveillance equipment and concoct custom surveillance solutions). I advanced to become the director of their commercial investigations department in NJ, and then director of their electronic countermeasures department worldwide. In 1978, I opened my own firm specializing in electronic countermeasures (aka Technical Surveillance Countermeasures or TSCM). "How," was just a pinball path of following my interests and being ready to take advantage of opportunities that came my way. "Why," because I am inquisitive, fascinated by technology, and most of all, I like helping people solve their problems.
Q. What kind of services do you/company offer?
A. • TSCM; detecting electronic surveillance devices for business and government.
• Counterespionage consulting; providing advice to help detect and deter business espionage.
• Training; specialized training for keeping the workplace free from video voyeurism.
• Smartphone spyware detection and prevention; a book, an Android app, an iPhone app and a smartphone anti-spyware security kit.
Q. What is your day-to-day routine like?
A. There is nothing routine about my day except that every day is a work day. I'm not sure whether this is a factor of being in one's own business, or this particular business demands it. We are available to our clients 24/7, including holidays and weekends. Vacations are taken during slow periods, usually 7-10 days, once or twice a year. The days are divided into two types, office days and field days, when my team and I are conducting inspections for our clients. On office days the work includes: report writing, invoicing, marketing, servicing instrumentation, working on research projects for clients, bookkeeping, creation of books, training, apps, etc.
Q. How has technology affected your day to day, if at all, in recent months/years?
A. My business is heavily technology oriented. Technology change always affects what we do, how we do it, and what new countermeasures we need to develop to keep ahead-of-the-curve. People mistakenly believe that technology changes the things on which we focus. Wrong. It adds to them. All prior espionage techniques still work, and are still used. Spies just have more tricks in the black bag these days.
Q. What is the biggest misconception about being a PI?
A. (Laughter) Pretty much everything you see on TV and the movies. Having worked in all aspects of private investigations before settling into my specialization, I can generalize and say... "Private investigations has a very long flash to bang ratio." That is to say, any investigation involves long periods of quiet work before the last 5% of excitement. That being said, the extremely well-worth-the-wait excitement reward is an intense bit at the end. The greater reward is the satisfaction of having helped someone. That part lasts, and accumulates.
Q. Is there a particular issue facing your industry as a group that you’re concerned with right now?
A. Yes. Video voyeurism in the workplace is the hottest issue around right now. The problem started gaining logarithmic traction about 10-15 years ago. In the past year, the epidemic hit critical mass. I began receiving "what can we do" calls from my clients, similar to the flood of calls about cell phone spyware which prompted the book, app and security kit. At first, places like small businesses, private schools and country clubs called us in to conduct inspections. Once our larger clients began to call, it became obvious that sending us to check restrooms and changing rooms at all their locations (around the world in some cases) was impractical. The solution was to develop an on-line training course for their local security and facilities people.
Q. Why do you think video voyeurism reached critical mass in the last year?
A. Two factors...
1. Over the years, spy cameras have evolved from cheap low-resolution devices, to inexpensive, well-made, high-resolution devices.
2. Voyeurs have also evolved. The early video voyeurs targeted areas over which they had full control, e.g. their bedrooms, bathrooms. Emboldened by these successes, they began to include semi-controllable area targets, e.g. significant others' bedroom and bathrooms, and we also started to see media reports about landlords spying on their tenants.
Keep in mind, any media report about video voyeurism represents a failed (discovered) attack; the majority of video voyeurs are successful.
The next target expansion happened when these people began to coagulate on-line, swapping video files, war stories, and how-to tutorials on YouTube.
Now, emboldened by previous successes, camaraderie, better technology, and honed tradecraft, their hunting grounds expanded to business locations with public expectation-of-privacy areas – restrooms, changing rooms, locker rooms / showers, tanning salons, etc. Huge mistake.
In the past year or so, enough video voyeurs have been caught in corporate venues (Walmart, Starbucks, for example) to make this a legal "foreseeability" issue, with sexual harassment in the workplace implications. The dollar losses — employee morale, business goodwill, reputation and lawsuits — tipped the scales. Invading the corporate landscape was the final straw. With big money at stake, businesses beginning to fight back.
Saturday, June 13, 2015
Book: HOW TO CATCH A RUSSIAN SPY: The True Story of an American Civilian Turned Double Agent
How an American slacker caught a Russian spy at a New Jersey Hooters
Naveed Jamali, a smart, young New York techie, somehow spent three years going toe to toe with a Russian intelligence officer who thought he was developing an asset, even though all the while Jamali was quietly collaborating with U.S. federal agents.
The fast-paced, occasionally stressful, often hilarious and invariably self-involved story of how it all went down is the subject of “How to Catch a Russian Spy.” more
Naveed Jamali, a smart, young New York techie, somehow spent three years going toe to toe with a Russian intelligence officer who thought he was developing an asset, even though all the while Jamali was quietly collaborating with U.S. federal agents.
The fast-paced, occasionally stressful, often hilarious and invariably self-involved story of how it all went down is the subject of “How to Catch a Russian Spy.” more
And we call this plank in the platform, Stasi.
via Steve Benen...
When I first heard yesterday that Republican presidential hopeful Ben Carson wants to spy on U.S. government workers, I thought this was some kind of joke.
It sounded like a satirical way of poking fun at the right-wing neurosurgeon’s strange political views.
But as msnbc’s Jane C. Timm reported, Carson actually shared his thoughts on a “covert division” yesterday.
When I first heard yesterday that Republican presidential hopeful Ben Carson wants to spy on U.S. government workers, I thought this was some kind of joke.
It sounded like a satirical way of poking fun at the right-wing neurosurgeon’s strange political views.
But as msnbc’s Jane C. Timm reported, Carson actually shared his thoughts on a “covert division” yesterday.
The idea, apparently, would be to help motivate government employees to work as effectively as possible, fearing that their co-workers are spying on them. moreRepublican presidential contender Ben Carson said Wednesday that if elected next year he might implement a “covert division” of government workers who spy on their coworkers to improve government efficiency.The pediatric neurosurgeon-turned-candidate told a crowd of Iowa Republicans he is “thinking very seriously” about adding “a covert division of people who look like the people in this room, who monitor what government people do.”
Three Major Chinese Airlines to Provide In-Flight WiFi Services
Three major Chinese airlines, including China Eastern Airlines, China Southern Airlines and Air China, have been approved to provide in-flight Wi-Fi services.
China Eastern Airlines has become the first Chinese carrier to provide Wi-Fi services on both domestic and international flights... The services are expected to be offered in a month as the airline clears up several formalities ahead of the launch.
Oh, by the way...
"Through wifi access, we will offer a variety of internet services which are free for passengers. The service charges will be shared and paid by the airline and its business partners," said Zhang Chi with China Eastern Airlines.
Spybusters Tip #815 - From our "There is no free lunch" file... You might want to keep your phone in airplane mode.
China Eastern Airlines has become the first Chinese carrier to provide Wi-Fi services on both domestic and international flights... The services are expected to be offered in a month as the airline clears up several formalities ahead of the launch.
Oh, by the way...
"Through wifi access, we will offer a variety of internet services which are free for passengers. The service charges will be shared and paid by the airline and its business partners," said Zhang Chi with China Eastern Airlines.
Spybusters Tip #815 - From our "There is no free lunch" file... You might want to keep your phone in airplane mode.
Why Are Chipmunks Wearing Mini Spy Microphones?
Miniature Russian spyware is infiltrating an underground Canadian community.
The perpetrators? Scientists studying how eastern chipmunks communicate. For the first time, the team has outfitted the little striped animals with collars bearing inch-long (2.8 centimeters) microphones, the world's smallest digital recording device, according to Guinness World Records.
Using these espionage tools, the team recorded, analyzed, and decoded constant chipmunk chatter, instead of relying on static microphones that had previously limited scientists in understanding the secret lives of wildlife.
So far, the hardy microphones, deployed on chipmunks in southern Quebec's Green Mountains Nature Reserve, have provided unprecedented data on how and when chipmunks call, which is helping reveal the burrowing rodents' individual personalities. more w/video
The perpetrators? Scientists studying how eastern chipmunks communicate. For the first time, the team has outfitted the little striped animals with collars bearing inch-long (2.8 centimeters) microphones, the world's smallest digital recording device, according to Guinness World Records.
Using these espionage tools, the team recorded, analyzed, and decoded constant chipmunk chatter, instead of relying on static microphones that had previously limited scientists in understanding the secret lives of wildlife.
So far, the hardy microphones, deployed on chipmunks in southern Quebec's Green Mountains Nature Reserve, have provided unprecedented data on how and when chipmunks call, which is helping reveal the burrowing rodents' individual personalities. more w/video
Wednesday, June 10, 2015
Spy Virus Linked to Israel Targeted Hotels Used for Iran Nuclear Talks
When a leading cybersecurity firm discovered it had been hacked last year by a virus widely believed to be used by Israeli spies, it wanted to know who else was on the hit list. It checked millions of computers world-wide and three luxury European hotels popped up. The other hotels the firm tested, thousands in all, were clean.
Researchers at the firm, Kaspersky Lab, weren't sure what to make of the results. Then they realized what the three hotels had in common. Each was targeted before hosting high-stakes negotiations between Iran and world powers over curtailing Tehran's nuclear program. more
Spybuster Tip # 732: Know what else is going on in your hotel before you make the decision to use their Internet service.
Researchers at the firm, Kaspersky Lab, weren't sure what to make of the results. Then they realized what the three hotels had in common. Each was targeted before hosting high-stakes negotiations between Iran and world powers over curtailing Tehran's nuclear program. more
Spybuster Tip # 732: Know what else is going on in your hotel before you make the decision to use their Internet service.
Tuesday, June 9, 2015
Drones and Counter-Drones
As regular readers know, the Security Scrapbook follows drone development. Our Canadian Blue Blaze Irregular checks in:
Kevin, This is making a big splash in the news today out our way... Despite the relatively short flight time (it can be worked on) this would have been greatly appreciated by many of the people we’ve met. Usually they would have had great fun if it were available in their past life. Another ‘interesting’ toy. All kinds of possibilities. ~WM
And now, the drone antidote...
Kevin, This is making a big splash in the news today out our way... Despite the relatively short flight time (it can be worked on) this would have been greatly appreciated by many of the people we’ve met. Usually they would have had great fun if it were available in their past life. Another ‘interesting’ toy. All kinds of possibilities. ~WM
And now, the drone antidote...
Counterespionage Tip # 529 - Encryption as a Legal Defense
We strongly encourage companies possessing or transmitting personally identifiable information (PII), protected health information (PHI), financial or other sensitive data, including trade secrets, to use encryption. Why? Because, if employed properly, it is both effective and legally defensible.
Why should you use it?
You should use encryption because it gives you legal protection. Few laws specifically require encryption. HIPAA generally doesn’t. State statutes don’t. Nor does the Gramm Leach Bliley Act’s Safeguard’s Rule. Yet if you are not encrypting PII, PHI, or financial data, you are putting yourself at risk. Those laws expect you to take reasonable precautions. And using encryption, and using it properly, is a reasonable precaution when it comes to dealing with sensitive data. HIPAA, for example, provides that encryption should be used where “the entity has determined that the specification is a reasonable and appropriate safeguard in its risk management of the confidentiality, integrity and availability” of the information or else implement an “equivalent alternative measure if reasonable and appropriate,” and document why encryption wasn’t the best choice. more
Why should you use it?
You should use encryption because it gives you legal protection. Few laws specifically require encryption. HIPAA generally doesn’t. State statutes don’t. Nor does the Gramm Leach Bliley Act’s Safeguard’s Rule. Yet if you are not encrypting PII, PHI, or financial data, you are putting yourself at risk. Those laws expect you to take reasonable precautions. And using encryption, and using it properly, is a reasonable precaution when it comes to dealing with sensitive data. HIPAA, for example, provides that encryption should be used where “the entity has determined that the specification is a reasonable and appropriate safeguard in its risk management of the confidentiality, integrity and availability” of the information or else implement an “equivalent alternative measure if reasonable and appropriate,” and document why encryption wasn’t the best choice. more
The Post-it Note Attack Finally Makes it into an HBO Script
A post-it note with a password written on it, posted on the computer, or somewhere nearby. It's one of the most common information security slip-ups that I see. This icon of stupidity has finally made it into an HBO script (courtesy of Silicon Valley). Even hackers treat this with disdain...
Friday, June 5, 2015
NSA Spy Cam Blocker
That little front facing camera on your laptop or tablet...
can be a window for the world to see you - whether you know it or not! Stop hackers and the NSA with this simple camera blocker. Safe and practical. more
can be a window for the world to see you - whether you know it or not! Stop hackers and the NSA with this simple camera blocker. Safe and practical. more
Spy - The Movie
In the mood for a spy movie this weekend?
"Melissa McCarthy made her bones as a scene-stealing supporting player, but her starring vehicles have only occasionally made the most of her comic gifts. Until now, that is: critics say Spy is an inspired, uproarious spoof of espionage thrillers loaded with self-effacing performances and sharp jabs at workplace sexism." more
"Melissa McCarthy made her bones as a scene-stealing supporting player, but her starring vehicles have only occasionally made the most of her comic gifts. Until now, that is: critics say Spy is an inspired, uproarious spoof of espionage thrillers loaded with self-effacing performances and sharp jabs at workplace sexism." more
Let's YTRAP, mate!
A new kind of party craze has many Australians scrambling for invitations.
Crypto parties, where people gather to learn online encryption, are attracting everyone from politicians, to business people, to activists.
Two years after US spy agency contractor Edward Snowden leaked documents from the National Security Agency exposing mass global internet surveillance, there is rapidly growing interest in protecting online activity.
There have been crypto parties in Brazil, Germany and the UK, and more than a dozen have already been held in Australia.
Apps like Wickr, Confide and WhatsApp have taken encryption out of the geek lab and to the masses. more
Crypto parties, where people gather to learn online encryption, are attracting everyone from politicians, to business people, to activists.
Two years after US spy agency contractor Edward Snowden leaked documents from the National Security Agency exposing mass global internet surveillance, there is rapidly growing interest in protecting online activity.
There have been crypto parties in Brazil, Germany and the UK, and more than a dozen have already been held in Australia.
Apps like Wickr, Confide and WhatsApp have taken encryption out of the geek lab and to the masses. more
Labels:
amateur,
encryption,
fun,
FutureWatch,
mores,
privacy,
steganography
Better grab their car key, too.
...security giant G4S will confiscate smartphones from shareholders and journalists at its AGM in London after activists used them to film their violent removal by security staff at last year’s event.
The blanket ban, which includes staff and board members, comes a year after activists, who bought shares to attend the meeting, staged filmed interventions. The footage later appeared in the UK media.
A spokesman for G4S told the Guardian newspaper: “Last year we had a large number of protesters who were effectively staging demonstrations in the meeting and they were filming it.
“The intention is not to suppress the legitimate free speech of people but it is just simply to maintain some degree of security for our people in the meeting. That is the rationale.” more
The blanket ban, which includes staff and board members, comes a year after activists, who bought shares to attend the meeting, staged filmed interventions. The footage later appeared in the UK media.
A spokesman for G4S told the Guardian newspaper: “Last year we had a large number of protesters who were effectively staging demonstrations in the meeting and they were filming it.
“The intention is not to suppress the legitimate free speech of people but it is just simply to maintain some degree of security for our people in the meeting. That is the rationale.” more
Subscribe to:
Posts (Atom)