Thousands of confidential phone conversations between inmates and their lawyers have been recorded
by a leading prison phone company that also serves New York City jails — a major data breach exposed by a hacker, according to a report.
The anonymous hacker believes the company, Securus Technologies, is violating prisoners’ constitutional rights by recording privileged conversations, The Intercept reported Wednesday.
Of 70 million phone-call records obtained by The Intercept, 14,000 were for legally protected calls made to prisoners’ attorneys, The Intercept said. more
Thursday, November 12, 2015
Wednesday, November 11, 2015
Uninstall InstaAgent From Your Phone Now
By
Andy Boxall
If you’re one of the thousands of people with an app named Who Viewed Your Profile – InstaAgent installed on your smartphone, stop using it and delete it right now.
Why? Because it’s stealing your password, transferring it to a server, and then posting images on your Instagram account suggesting others should also download the app.
The app is a third-party Instagram client that promised to tell you who visited your Instagram account, something it could only do once you’d handed over your username and password. This function was never carried out, and the app’s sole intention was to steal Instagram logins. more
If you’re one of the thousands of people with an app named Who Viewed Your Profile – InstaAgent installed on your smartphone, stop using it and delete it right now.
Why? Because it’s stealing your password, transferring it to a server, and then posting images on your Instagram account suggesting others should also download the app.
The app is a third-party Instagram client that promised to tell you who visited your Instagram account, something it could only do once you’d handed over your username and password. This function was never carried out, and the app’s sole intention was to steal Instagram logins. more
Wednesday, November 4, 2015
Dial 12339 To Report a Spy in China (Let the SWATing Begin)
China has set up a new national hot line for reporting “spies” as authorities grow increasingly sensitive over national security issues.
The new service was set up by officials in the north-eastern province of Jilin, the local New Cultural Newspaper said Sunday, with reports saying those who suspect “espionage activity” can call 12339.
“The hot line targets foreign organizations and individuals who conduct espionage activities or who instigate and sponsor others in conducting them,” the fiercely nationalist Global Times newspaper said.
A list of "guidelines" to help people identify spies appeared on Chinese social media soon after the hot line was announced, however it was unclear where it originated.
Potential spies included “those with vague job tiles and a lot of money” and “those who bring up controversial topics at parties and then only observe the discussion”, said the guidelines, which had been shared widely on Chinese messaging app Wechat. more
The new service was set up by officials in the north-eastern province of Jilin, the local New Cultural Newspaper said Sunday, with reports saying those who suspect “espionage activity” can call 12339.
“The hot line targets foreign organizations and individuals who conduct espionage activities or who instigate and sponsor others in conducting them,” the fiercely nationalist Global Times newspaper said.
A list of "guidelines" to help people identify spies appeared on Chinese social media soon after the hot line was announced, however it was unclear where it originated.
Potential spies included “those with vague job tiles and a lot of money” and “those who bring up controversial topics at parties and then only observe the discussion”, said the guidelines, which had been shared widely on Chinese messaging app Wechat. more
"If You're Not Paranoid, You're Crazy"
An excellent, thought provoking article on how others are predicting our next moves...
(excerpt from Walter Kirn's article in The Atlantic.) "I was already growing certain that we, the sensible majority, owe plenty of so-called crackpots a few apologies. We dismissed them, shrugging off as delusions or urban legends various warnings and anecdotes that now stand revealed, in all too many instances, as either solid inside tips or spooky marvels of intuition.
The Mormon elder who told me when I was a teenager back in 1975 that people soon would have to carry “chips” around or “be banished from the marketplace.”
The ex–Army ranger in the 1980s who said an “eye in the sky” could read my license plate.
The girlfriend in 1993 who forbade me to rent a dirty video on the grounds that “they keep lists of everything.”
The Hollywood actor in 2011 who declined to join me on his sundeck because he’d put on weight and a security expert had advised him that the paparazzi were flying drones.
The tattooed grad student who, about a year before Edward Snowden gave the world the lowdown on code-named snooping programs such as PRISM and XKeyscore, told me about a childhood friend of his who worked in military intelligence and refused to go to wild parties unless the guests agreed to leave their phones locked outside in a car trunk or a cooler, preferably with the battery removed, and who also confessed to snooping on a girlfriend through the camera in her laptop.
The night I vowed never again to mock such people, in January 2014, I was standing knee-deep in a field of crusty snow at the edge of a National Guard base near Saratoga Springs, Utah, a fresh-from-the-factory all-American settlement, densely flagpoled and lavishly front-porched, just south of Salt Lake City. Above its rooftops the moon was a pale sliver, and filling the sky were the sort of ragged clouds in which one might discern the face of Jesus. I had on a dark jacket, a dark wool cap, and a black nylon mask to keep my cheeks from freezing.
The key would be surviving those first days after the ATMs stopped working and the grocery stores were looted bare.
I’d gone there for purposes of counterespionage..." more
(excerpt from Walter Kirn's article in The Atlantic.) "I was already growing certain that we, the sensible majority, owe plenty of so-called crackpots a few apologies. We dismissed them, shrugging off as delusions or urban legends various warnings and anecdotes that now stand revealed, in all too many instances, as either solid inside tips or spooky marvels of intuition.
The Mormon elder who told me when I was a teenager back in 1975 that people soon would have to carry “chips” around or “be banished from the marketplace.”
The ex–Army ranger in the 1980s who said an “eye in the sky” could read my license plate.
The girlfriend in 1993 who forbade me to rent a dirty video on the grounds that “they keep lists of everything.”
The Hollywood actor in 2011 who declined to join me on his sundeck because he’d put on weight and a security expert had advised him that the paparazzi were flying drones.
The tattooed grad student who, about a year before Edward Snowden gave the world the lowdown on code-named snooping programs such as PRISM and XKeyscore, told me about a childhood friend of his who worked in military intelligence and refused to go to wild parties unless the guests agreed to leave their phones locked outside in a car trunk or a cooler, preferably with the battery removed, and who also confessed to snooping on a girlfriend through the camera in her laptop.
The night I vowed never again to mock such people, in January 2014, I was standing knee-deep in a field of crusty snow at the edge of a National Guard base near Saratoga Springs, Utah, a fresh-from-the-factory all-American settlement, densely flagpoled and lavishly front-porched, just south of Salt Lake City. Above its rooftops the moon was a pale sliver, and filling the sky were the sort of ragged clouds in which one might discern the face of Jesus. I had on a dark jacket, a dark wool cap, and a black nylon mask to keep my cheeks from freezing.
The key would be surviving those first days after the ATMs stopped working and the grocery stores were looted bare.
I’d gone there for purposes of counterespionage..." more
Smart Sheriff Chased Out of Town
Remember our Smart Sheriff post from May?
South Korea created this spyware for cell phones.
I'll wait while you check it out.
UPDATE: South Korea pulls plug on child monitoring app
The most widely used child surveillance app in South Korea is being quietly pulled from the market after security specialists raised serious concerns about the program’s safety...
Smart Sheriff’s disappearance is awkward news for South Korea’s effort to keep closer tabs on the online lives of its youngest citizens.
A law passed in April requires all new smartphones sold to those 18 and under to be equipped with software that parents can use to snoop on their kids’ social media activity. Smart Sheriff, the most popular of more than a dozen state-approved apps, was meant to keep children safe from pornography, bullying, and other threats, but experts say its abysmal security left the door wide open to hackers and put the personal information of some 380,000 users at risk. more
South Korea created this spyware for cell phones.
I'll wait while you check it out.
UPDATE: South Korea pulls plug on child monitoring app
The most widely used child surveillance app in South Korea is being quietly pulled from the market after security specialists raised serious concerns about the program’s safety...
Smart Sheriff’s disappearance is awkward news for South Korea’s effort to keep closer tabs on the online lives of its youngest citizens.
A law passed in April requires all new smartphones sold to those 18 and under to be equipped with software that parents can use to snoop on their kids’ social media activity. Smart Sheriff, the most popular of more than a dozen state-approved apps, was meant to keep children safe from pornography, bullying, and other threats, but experts say its abysmal security left the door wide open to hackers and put the personal information of some 380,000 users at risk. more
Friday, October 30, 2015
Security Director Alert - 80% Chance Your Card Key System Can Be Bypassed
A device the size of a quarter that can be installed in 60 seconds on a proximity card reader could potentially be used to break physical access controls in 80 percent of deployments.
The device, dubbed BLEKey, is used to read cleartext data sent from card readers to door controllers to either clone cards or feed that data to a mobile application that can be used to unlock doors at any number of installations.
The hack unveiled at Black Hat is worrisome for facilities reliant on proximity cards and readers for access to buildings in critical industries or enterprises. Researchers Eric Evenchick, an embedded systems architect at electric car manufacturer Faraday Future, and Mark Baseggio, a managing principal consultant at Optiv (formerly Accuvant), used the ubiquitous HID cards and readers in a number of successful demos during their talk, but said that it’s likely the same weaknesses that facilitate their attacks are present in devices from other manufacturers. more video
Really Scary: 29:35 minutes into the video they explain how to make a card-key interceptor, stick it into a back pack, go to the target workplace, get in an elevator with employees (or just close to one of them), secretly read everyone's cards, and make a clone card.
Happy Halloween ~Kevin
The device, dubbed BLEKey, is used to read cleartext data sent from card readers to door controllers to either clone cards or feed that data to a mobile application that can be used to unlock doors at any number of installations.
The hack unveiled at Black Hat is worrisome for facilities reliant on proximity cards and readers for access to buildings in critical industries or enterprises. Researchers Eric Evenchick, an embedded systems architect at electric car manufacturer Faraday Future, and Mark Baseggio, a managing principal consultant at Optiv (formerly Accuvant), used the ubiquitous HID cards and readers in a number of successful demos during their talk, but said that it’s likely the same weaknesses that facilitate their attacks are present in devices from other manufacturers. more video
Really Scary: 29:35 minutes into the video they explain how to make a card-key interceptor, stick it into a back pack, go to the target workplace, get in an elevator with employees (or just close to one of them), secretly read everyone's cards, and make a clone card.
Happy Halloween ~Kevin
The Disorderly Orderly, or Spycam Peek-A-Boo in the ICU
India - Police have arrested a 30-year-old male orderly of Rajiv Gandhi Cancer Institute and Research Centre
on charges of filming women after allegedly putting up spy camera in changing room for nurses.
A nurse spotted the spy camera in the changing room inside the intensive care unit (ICU) on the third floor and alerted a security guard, said sources.
Police have reportedly recovered two obscene video clips from his spy camera, which was installed for around 12 hours, said sources. Police will now try to retrieve deleted data, added the sources. more
on charges of filming women after allegedly putting up spy camera in changing room for nurses.
A nurse spotted the spy camera in the changing room inside the intensive care unit (ICU) on the third floor and alerted a security guard, said sources.
Police have reportedly recovered two obscene video clips from his spy camera, which was installed for around 12 hours, said sources. Police will now try to retrieve deleted data, added the sources. more
Police vs Spy Blimp in PA - Shotguns Preveil
PA - State police used shotguns Thursday to deflate a wayward military surveillance blimp that broke loose in Maryland and floated for hours before coming down into trees in the Pennsylvania countryside.
Curious residents trickled into a staging area as the military began gathering up some 6,000 feet of tether, the blimp’s huge hull and a smaller tail piece, a process expected to take at least through Friday.
The white behemoth still had helium in its nose when it went down in a steep ravine on Wednesday afternoon, and the easiest way to drain the gas was to shoot it, U.S. Army Captain Matthew Villa said. State police troopers peppered the blimp with about 100 shots. more How it all started.
Curious residents trickled into a staging area as the military began gathering up some 6,000 feet of tether, the blimp’s huge hull and a smaller tail piece, a process expected to take at least through Friday.
The white behemoth still had helium in its nose when it went down in a steep ravine on Wednesday afternoon, and the easiest way to drain the gas was to shoot it, U.S. Army Captain Matthew Villa said. State police troopers peppered the blimp with about 100 shots. more How it all started.
The Ultimate Spy vs Spy
via
Mark Frauenfelder, Boing Boing
It was a wordless one-page comic about two oddly pointy faced spies, one dressed in black and the other dressed in white. Other than their different colored outfits, they behaved identically. They hated each other and created elaborate Rube Goldberg type machines to try to kill each other. Sometimes their machines worked, often, they’d backfire. They were tricky but usually too clever for their own good.
This anthology colorizes 150 “Spy vs Spy” comics drawn by Antonio ProhÃas from 1961 until his death in 1987. The book also includes a collection of “Spy vs Spy” comics by the talented cartoonist Peter Kuper, who took over the strip when ProhÃas died. The anthology features a section of wonderful “Spy vs Spy” tribute drawings by noted cartoonists such as Peter Bagge, Bob Staake, Darwyn Cooke, Gilbert and Jaime Hernandez, and Bill Sienkiewicz. There’s also a biography of the Cuban-born ProhÃasm and a new 4-page color strip by MAD luminary Sergio Aragones about his friendship with ProhÃas. With all the new material here, this book is a must for anyone who loves “Spy vs Spy.”
Spy Vs Spy: An Explosive Celebration
by Antonio ProhÃas and Peter Kuper
Liberty Street, 2015, 224 pages, 8.8 x 0.8 x 11.2 inches
$16.46 at Amazon
It was a wordless one-page comic about two oddly pointy faced spies, one dressed in black and the other dressed in white. Other than their different colored outfits, they behaved identically. They hated each other and created elaborate Rube Goldberg type machines to try to kill each other. Sometimes their machines worked, often, they’d backfire. They were tricky but usually too clever for their own good.
This anthology colorizes 150 “Spy vs Spy” comics drawn by Antonio ProhÃas from 1961 until his death in 1987. The book also includes a collection of “Spy vs Spy” comics by the talented cartoonist Peter Kuper, who took over the strip when ProhÃas died. The anthology features a section of wonderful “Spy vs Spy” tribute drawings by noted cartoonists such as Peter Bagge, Bob Staake, Darwyn Cooke, Gilbert and Jaime Hernandez, and Bill Sienkiewicz. There’s also a biography of the Cuban-born ProhÃasm and a new 4-page color strip by MAD luminary Sergio Aragones about his friendship with ProhÃas. With all the new material here, this book is a must for anyone who loves “Spy vs Spy.”
Spy Vs Spy: An Explosive Celebration
by Antonio ProhÃas and Peter Kuper
Liberty Street, 2015, 224 pages, 8.8 x 0.8 x 11.2 inches
$16.46 at Amazon
Thursday, October 29, 2015
Spycam Ejection
Australia - A Brisbane landlord has been slammed for installing CCTV cameras inside his rental property and spying on his tenants, who he evicted once they complained.
Renters Ben and Lila - who withheld their surnames - told Channel Nine's A Current Affair they noticed they were being recorded on the first day they moved into their new apartment.
The security camera was set up in the lounge room, switched on and recording.
According to the program, the furious flatmates immediate flicked the switch on the camera, before they were contacted by the landlord who said they had to turn it back on. more video
Renters Ben and Lila - who withheld their surnames - told Channel Nine's A Current Affair they noticed they were being recorded on the first day they moved into their new apartment.
The security camera was set up in the lounge room, switched on and recording.
According to the program, the furious flatmates immediate flicked the switch on the camera, before they were contacted by the landlord who said they had to turn it back on. more video
Crackdown on Users of DroidJack Spyware
Law enforcement officials in almost half a dozen European countries have searched the homes of people suspected of having used software to spy on mobile phone users...
In Germany, prosecutors searched the homes of 13 people on Tuesday, they said, adding raids had also taken place in Britain, France, Belgium and Switzerland. They did not have further information on the raids in other countries.
The suspects in Germany, aged between 19 and 51, are believed to have bought and used smartphone software DroidJack, which allows surveillance of phones that use Google's Android...
The software allows users to monitor a smartphone's data traffic, eavesdrop on phone conversations or hijack a phone's camera without its owner noticing. It can also be used to spy on smartphone users as they access online banking systems. more
In Germany, prosecutors searched the homes of 13 people on Tuesday, they said, adding raids had also taken place in Britain, France, Belgium and Switzerland. They did not have further information on the raids in other countries.
The suspects in Germany, aged between 19 and 51, are believed to have bought and used smartphone software DroidJack, which allows surveillance of phones that use Google's Android...
The software allows users to monitor a smartphone's data traffic, eavesdrop on phone conversations or hijack a phone's camera without its owner noticing. It can also be used to spy on smartphone users as they access online banking systems. more
Bud Flight - Spies on the Go
The two-state battle for a federal spy agency’s new regional headquarters is heating up,
with Missouri Gov. Jay Nixon on Wednesday announcing plans to publicly push to keep the agency in St. Louis as hundreds of supporters gathered across the Mississippi River to tout a potential Illinois location.
At stake in the bistate regional fight are more than 3,000 high-tech jobs at the National Geospatial-Intelligence Agency paying an average of $75,000.
The defense and intelligence agency is considering four sites to replace its current location near the Anheuser-Busch brewery south of downtown St. Louis. more
with Missouri Gov. Jay Nixon on Wednesday announcing plans to publicly push to keep the agency in St. Louis as hundreds of supporters gathered across the Mississippi River to tout a potential Illinois location.
At stake in the bistate regional fight are more than 3,000 high-tech jobs at the National Geospatial-Intelligence Agency paying an average of $75,000.
The defense and intelligence agency is considering four sites to replace its current location near the Anheuser-Busch brewery south of downtown St. Louis. more
Business Espionage: Buy Your Batting Average with Blackmail
Former big leaguer Lenny Dykstra admitted to spending "half a million bucks" on private investigators to dig up dirt on umpires during his playing career.
Dykstra says he then used the information not necessarily to bribe umpires, but to intimidate them into giving him favorable calls. "Fear does a lot to a man," he says. Here's the video:
"Their blood is just as red as ours. Some of them like women, some of them like men, some of them gamble," said Dykstra. He then imagined a scenario in which he asked the umpire if he "covered the spread last night" after a called strike, then the strike zone shrunk to his advantage.
"It wasn't a coincidence that I led the league in walks the next few years," he added. Dykstra led the league with 129 walks in 1993 while with the Phillies. His previous career high was 89 walks, though he missed plenty of time with injuries. Dykstra's walk rate did spike from 1993-94:
Dykstra says he then used the information not necessarily to bribe umpires, but to intimidate them into giving him favorable calls. "Fear does a lot to a man," he says. Here's the video:
"Their blood is just as red as ours. Some of them like women, some of them like men, some of them gamble," said Dykstra. He then imagined a scenario in which he asked the umpire if he "covered the spread last night" after a called strike, then the strike zone shrunk to his advantage.
"It wasn't a coincidence that I led the league in walks the next few years," he added. Dykstra led the league with 129 walks in 1993 while with the Phillies. His previous career high was 89 walks, though he missed plenty of time with injuries. Dykstra's walk rate did spike from 1993-94:
This App Turns Your Smartwatch into an Eavesdropping Device
There are times when being able to easily record audio is a serious advantage in your day to day life. Whether that means you do it for work, school, or anything else, now you can easily do it with Wear Audio Recorder on your Android Wear device. Whether it's a short moment or a full meeting, this app has got you covered.
Wear Audio Recorder has a fantastic look that is both simple and stylish. Unsurprising when you realize that they're using Google's Material Design. On your Smart Watch, this app doesn't have a ton of features. What it does, it does well. Recording is as simple as opening the app, and tapping record. more
Why do I mention it?
So you will know what you're up against.
Wear Audio Recorder has a fantastic look that is both simple and stylish. Unsurprising when you realize that they're using Google's Material Design. On your Smart Watch, this app doesn't have a ton of features. What it does, it does well. Recording is as simple as opening the app, and tapping record. more
Why do I mention it?
So you will know what you're up against.
Wednesday, October 28, 2015
Spies in Space: The Final Frontier in Espionage
Space, the ‘final frontier’, is rapidly becoming an extra-terrestrial battleground for corporate espionage and other types of cyber attack as hackers seek to gain commercial advantage from rival networks operating in the $330-billion space economy...
The amount of data now being beamed between satellites supporting commercial networks on earth is growing rapidly, making them a ripe target for cyber attacks, said Luca del Monte, a senior strategist at the European Space Agency, and one of many experts who attended the annual International Astronautical Congress last week in Israel.
Space presents a double opportunity for hackers – the hardware up in orbit and the information it transmits. more
The amount of data now being beamed between satellites supporting commercial networks on earth is growing rapidly, making them a ripe target for cyber attacks, said Luca del Monte, a senior strategist at the European Space Agency, and one of many experts who attended the annual International Astronautical Congress last week in Israel.
Space presents a double opportunity for hackers – the hardware up in orbit and the information it transmits. more
Subscribe to:
Posts (Atom)