Friday, July 10, 2015

FutureWatch - The Dark Art of Light Eavesdropping is Coming

Maite Brandt-Pearce, a professor in the Charles L. Brown Department of Electrical and Computer Engineering, and Mohammad Noshad, now a postdoctoral fellow in the Electrical Engineering Department at Harvard University, have devised a way of using light waves from light-emitting diode fixtures to carry signals to wireless devices at 300 megabits per second from each light. It’s like having a whole wi-fi system all to yourself; using light waves, there would be more network access points than with radio waves, so less sharing of the wireless network...

Their breakthrough means that data can be transmitted faster with light waves using no more energy than is already required to run the lights....

“You can use it any place that has lighting,” Brandt-Pearce said. “In a stadium, in a parking lot, or from vehicle to vehicle if using LED headlights and taillights.”

Like current wireless communications, encryption is necessary to keep data secure, but Brandt-Pearce noted that a secure network could be created in a room with no windows.

“It can’t be detected outside the room because the light waves stop when they hit something opaque, such as a wall,” she said. “That can keep communications secure from room to room.” (Generally speaking. However, a hair-like strand of fiber optic poking into the fixture from above the false ceiling should do the trick.)

And two separate networks in different rooms would not interfere with each other the way they do with present wi-fi networks.

She said devices with LED circuits in them can also communicate with each other. more more

Modulation of room lights for eavesdropping purposes is not new. The advent of ubiquitous LED lighting, however, will dramatically increase the effectiveness and ease of this tactic for eavesdropping... and the long-range wireless interception of computer data via optical means (even if it is encrypted).

Tuesday, July 7, 2015

The Contorted Case of John Large Under Antiquated Wiretapping Laws

PA - Concerned about the care his disabled daughter was receiving in a Bethlehem nursing home, John Large set out last June to register his complaint with an administrator.

Tired of the he-said-she-said nature of their previous conversations, Large went to the HCR Manor Care facility on Westgate Drive prepared to make a recording of the meeting.

Unbeknownst to Patricia Zurick, the director of nursing services, Large used a video recording device concealed in a pair of glasses to capture the sometimes heated hourlong discussion, court papers say.

No one would have been any the wiser except that Large mailed a DVD containing the footage to an FBI field office in Scranton, according to court documents.

The FBI saw the video as a potential violation of wiretap laws, Large's attorney said. Agents forwarded the DVD to Bethlehem police, who charged Large with intercepting communications and possession of a device for intercepting communications.

Large, 50, of Lansford, was held in Carbon County Jail until April, when Lehigh County Judge Robert L. Steinberg ordered the charges dismissed.

In his opinion, Steinberg wrote that because Zurick's office door was open — she testified that she left it open because she was scared of Large — she had no expectation of privacy, a crucial element for determining whether a secret recording is illegal. And because investigators never determined what kind of device Large had used to make the video, Steinberg wrote, the charge of possessing a device for intercepting communications could not be sustained.

He added that Pennsylvania's wiretap law is not keeping pace with the widespread adoption of technology such as tablet computers and Google Glass — essentially a smartphone contained in eyeglass frames. more

Weird Wiretap Case - Anesthesiologist Calls Patient a Retard

Last month, a Virginia jury awarded $500,000 to a man who inadvertently recorded an anesthesiologist trashing him as he lay unconscious during a colonoscopy, the Washington Post reported.

The man had activated the recorder on his smartphone to capture his doctor's instructions for his discharge but forgot to turn it off. He was stunned after the procedure to hear the anesthesiologist say she wanted to punch him in the face, suggest that he had syphilis and call him a "retard," according to the newspaper.

The doctor's lawyers argued that the recording was illegal, but the patient's lawyers pointed out that in Virginia, only one party needs to consent to a recording, the Post reported. more

Screening of Staff Made Mandatory to Check Info Leak

India - To plug information leak in the wake of corporate espionage case, the Centre has issued stringent guidelines for its departments, making security screening of personnel outsourced from elsewhere mandatory and avoiding doing confidential work on computers with net connection.
 
The guidelines, which say external memory devices must not be connected to the USB drives on these computers and that misuse of photocopying machines should be prevented, were issued by the Ministry of Home Affairs last week.

The MHA came out with the guidelines against the backdrop of the leak of classified information from some ministries including the Ministry of Petroleum and Natural Gas. more

Monday, July 6, 2015

Italian Surveillance Company Hacked, or "What goes around, comes around."

An Italian surveillance company known for selling malicious software used by police bodies and spy agencies appears to have succumbed to a damaging cyberattack that sent documents and invoices ricocheting across the Internet.

Hacking Team’s Twitter account appears to have been hijacked late Sunday, posting screenshots of what were purported to be internal company emails and details of secret deals with various world governments.

“Since we have nothing to hide, we’re publishing all our emails, files and source code,” an apparent message from the attacker or attackers said Sunday. At the same time a massive file, several hundred gigabytes in size, was leaked online. more

The Rise of Workplace Spying

A growing number of companies are using technology to monitor their employees' emails, phone calls, and movements. Here's everything you need to know:

How are employees being tracked?

In almost every way...

When did companies start snooping?

Bosses have always kept a close eye on employees. Henry Ford famously paced the factory floor with a stopwatch, timing his workers' motions in a bid for greater efficiency. He also hired private investigators to spy on employees' home lives to make sure personal problems didn't interfere with their work performance...  

Does this boost efficiency?
Yes, according to the data...

Who does the actual monitoring?
It's all done automatically: Software programs scan employees' email accounts and computer files and alert supervisors to anything inappropriate...

What else are they looking for?
Some companies search for evidence that employees might be thinking about quitting...

Can employees stop this tracking?

Generally, no. Most employee contracts give management free rein to do what it wants with data gathered from office-issued equipment, but some surveilled workers are fighting back...

Listening in at the water cooler.

If you find the idea of your boss reading your emails creepy, how about having your location, tone of voice, and conversation length monitored throughout the working day? Boston-based analytics firm Sociometric Solutions has supplied some 20 companies with employee ID badges fitted with microphone, location sensor, and accelerometer... more

Brazen Snoop Goes to Digital Extremes for Game Scoop

Lousy security, but “great food.”

That was a parting shot from a snoop who slipped into a London digital gaming company, hung out there for the day, ate a free lunch — then spilled details online about a new game the firm is developing.
The security breach last week at Digital Extremes, the city’s largest gaming company, underlines the perils of the open workplace that sets tech companies apart from many businesses, one observer said.

“This case illustrates the risk for any technology company of having an open environment and how vulnerable they can be to corporate espionage,” independent technology analyst Carmi Levy said. “There is a risk, when a stranger walks into an office, of losing trade secrets . . . They have to prevent that.” more

One Way to Silence Your On-Air Competition - Sue them for wiretapping!

Philippines - A municipal councilor in Aklan has sued a broadcaster for wiretapping after he allegedly taped a private conversation without the official’s consent. 

In a complaint filed before the provincial prosecutor’s office on July 3, Augusto Tolentino, a councilor of the capital town of Kalibo, accused Ma-ann Lachica of violating Republic Act 4200 (Anti-Wiretapping Act), punishable with imprisonment from six months to six years.

In his complaint, Tolentino, a veteran broadcaster who currently hosts a radio program, accused Lachica of recording a conversation of the official with broadcaster Rolly Herrera at the session hall of the municipal building in September 2014. more

Sunday, July 5, 2015

How Hackable is Your Life (infographic)

If you're reading this, there's 69 percent chance you will become a victim of hacking at some point in your lifetime. And if you think protecting yourself is as easy as changing a couple passwords and installing some anti-virus software, you're 100 percent wrong.

Luckily, the paranoia-inducing infographic below will whip you into shape, stat. Find out how hackers gain access to your information, all the scary things they can do with it, and what you can do to protect yourself.

more

Thursday, July 2, 2015

Man Tapes Upstairs Neighbor with Pole-Mounted Spycam - Claims "Investigative purposes"

MD - Imagine living on the third floor of your condominium building and glancing outside to find a camera looking back. That is exactly what a woman told police she saw, and now her downstairs neighbor is facing multiple criminal charges.

According to police, Donald Beard, 60, repeatedly attached a camera to a long metal pole. Beard would then walk onto his second floor balcony... and hoist the pole, camera rolling, to spy on the woman who lived upstairs.

Around 10 p.m. one night... the victim looked outside her living room window and saw a metal pole swinging back-and-forth. A camera was attached, recording her every move. She immediately called police...

While searching Beard's computers, external hard drives, flash cards, cell phones, tablets, cameras, and other electronic devices, detectives say they uncovered 16 individual videos of the victim. One clip showed the middle-aged women topless.

As for a motive, Beard reportedly told police his unique surveillance mission was "for investigative purposes", claiming his neighbor was spending time with married men and he wanted to catch her in the act...

Police say Beard also kept an audio journal of the victim's daily activities.  more video

Employee Security Awareness Training: Keeping Your Data Safe

"Human Error is among the most common causes of data loss and security breaches."

Develop a compelling security awareness training that improves employee behavior. Join this FREE webinar and learn about best practices on securing your data from sophisticated attacks. Security experts from Smarttech and Security Innovation will place a great emphasis on:
  • Hacker Tools and Types of Attacks
  • Why Employees Are the Perfect Target
  • How a Breach Can Hurt Your Organization
  • Mitigation Strategies and Tools 
Date: Thursday, July 9
Time: 10-11 AM EDT

Presenters:
Ronan Murphy
CEO, Smarttech

Ed Adams
CEO, Security Innovation

Registration 

Wednesday, July 1, 2015

Corporate Espionage: not your typical sports-“gate”

Generally when one refers to “competitors” in the context of protecting trade secrets, it is in regard to business competitors, not competing sports teams...

Recently, however, the worlds of sports and trade secret protection collided on the baseball diamond when the St. Louis Cardinals were accused of hacking into the Houston Astros’ internal computer network and stealing proprietary information. According to the New York Times, Cardinals employees gained access to the Astros’ “internal discussions about trades, proprietary statistics and scouting reports,” which the Astros no doubt would prefer to keep private. Specifically:

Law enforcement officials believe the hacking was executed by vengeful front-office employees for the Cardinals hoping to wreak havoc on the work of Jeff Luhnow, the Astros’ general manager, who had been a successful and polarizing executive with the Cardinals until 2011. more

Saturday, June 27, 2015

The Sticker on Your Smartphone Battery is Not a Spy

A video showing an NFC-clad sticker on a battery in a smartphone has gone viral today. This video suggests that this smartphone was using an NFC sticker to "record every photo of yours on your battery."

What we're going to need to do right now is get very serious and very clear about this situation. Your battery - and the NFC antenna that may or may not be attached to it - is not stealing your photos and sending them to our estranged government overlords. It's just not. more

What's Dumber than the Coach Spying on his Team?

(Admitting it?)

In Internet lingo, Mike Krzyzewski is actually a "creeper."

The Blue Devils head coach confessed to ESPN.com that he has set up a secret Twitter account so he can monitor what his players are up to.

This was Krzyzewski's response when asked if he's on social media:

"I follow guys. I don't want to be on Twitter because I don't care. I don't want their opinions. I don't need to show that I have X amount of followers. But I follow a lot of people on Twitter, under an alias. I tell my guys, 'I'm following you.' Then if I see something, you text them, you gotta watch. But there are a lot of cool things that they do. I do like that they do it." more

Bugging Devices Found in 2 CHP Deputies’ Offices in Parliament

Turkey - Security at Parliament found bugging devices in the parliamentary offices of the main opposition Republican People's Party (CHP) deputies Mustafa Balbay and Özgür Özel on Thursday and Friday.

Deputies who took their oaths in Parliament following their election in the June 7 general election began to move into their new rooms in Parliament. CHP İzmir deputy Balbay also moved into his room and an ordinary security search was conducted. During the search, security officers received strong signals from the frame of a photo of Mustafa Kemal Atatürk, the founder of modern Turkey.

Parliament security recorded the findings of the search and decided to request assistance from the police to search the room again with more advanced devices.

After Balbay's room, a bugging device was also found in the former office of the new CHP parliamentary group chairman, Özel. Security officers found the bugging device installed in an electrical socket in the room. Speaking to reporters about the device, Özel said no one had being using the room before him, and added that he will request that Parliament's security officers search all the parliamentary offices being used by CHP deputies. more