Thursday, December 17, 2015

A History of Privacy - From 1844 to the NSA

An extraordinary fuss about eavesdropping 
started in the spring of 1844, when Giuseppe Mazzini, an Italian exile in London, became convinced that the British government was opening his mail.

Mazzini, a revolutionary who’d been thrown in jail in Genoa, imprisoned in Savona, sentenced to death in absentia, and arrested in Paris, was plotting the unification of the kingdoms of Italy and the founding of an Italian republic.

He suspected that, in London, he’d been the victim of what he called “post-office espionage”... more

Wednesday, December 16, 2015

From Ear Trumpets to Listening Urns: 2,500 Years of Chinese Bugging

Wee Kek Koon says, in light of Hong Kong University Council leaks, that China has a long history of clandestine recording.

Given the number of audio recordings involving members of the University of Hong Kong council leaked recently, one fears Hong Kong will become a place where everybody either watches what they say or chooses not to say anything for fear of being tried and fried by public opinion. The obvious question – who’s been doing the recording? – on everyone’s minds notwithstanding, it can’t be that hard to screen for listening devices.

Illustration: Bay Leung

Clandestine listening devices in ancient China were simple cylindrical tubes pressed against the wall, which gave rise to the saying geqiang you’er (“the walls have ears”).

“Listening urns”, which were detailed in a military treatise some 2,500 years ago, were used on battlefields to provide advance warning of enemy approach. A wide-bodied urn would be buried with its small opening above ground, over which a thin piece of leather was stretched. By pressing one’s ear to the leather, one could detect the direction from which an enemy was approaching. For precision, huge urns were used, with someone sitting inside, at times. The visually impaired were preferred, for their supposedly acute sense of hearing. more

Bugging Incident - Episcopal Church COO Placed on Administrative Leave

via David W. Virtue DD
The Presiding Bishop of The Episcopal Church, Michael Curry, has suspended his right hand man, COO Bishop Stacey Sauls, and placed him on administrative leave along with two other senior church officers over what is being described as "misconduct in carrying out their duties as members of senior management of the Domestic and Foreign Missionary Society."

No one will give information about the exact nature of the incident...

A tape-recording device had been concealed and was running, Barlowe told a shocked room. Council members were exhorted to look under their tables to see if anything was taped. The hidden tape recorder was found on the floor near the lead table where top church leaders had been seated throughout Executive Council... No surveillance cameras that might have recorded someone hiding the recorder were found.

Who would possibly want to bug a church that is dying and has already passed all the hot button issues at various General Conventions? What is there left to bug, pray tell? Apparently a lot.

The incident resembles something out of an episode of Fawlty Towers, when Fawlty (John Cleese) bugged a guest's room to check how much toilet paper was being used. more

VPN Equip All Your Devices... especially if you use public Wi-Fi

To put it simply, a Virtual Private Network (VPN) is a service or program that allows a device to connect to a secure offsite server over a network using an encrypted, “tunnel-like” connection.

It allows the user’s IP address to be masked, providing a layer of all-important privacy and anonymity. Besides, the encryption of the connection is generally of such a high-grade that any data transmitted can be considered perfectly safe. Originally used for businesses, companies offering VPN services to consumers started to form, realizing the immense security benefits that users can reap from the service.

They are used by everyone from families at home who want to make sure no one can track their online habits to a journalist who doesn’t want people or governments to know where they are. Travelers love them in particular due to the safety they grant one on unknown networks. The underlying thread is protection, and running a quality VPN on your computer is a surefire way to make yourself safer and protect your personal information. more

The First Clip on a Spycam is Usually the Perp

LA - Baton Rouge Police detectives are attempting to identify a man who is believed to have placed a small video camera in the men’s urinal at the office building of 4000 S. Sherwood Forest.

According to police, the camera was found by a male using the restroom.

The camera was retrieved and an analysis was completed in which the image of this individual was observed.

Anyone with information on the identity of this individual is urged to contact the Special Victims Division at 225-389-3853 or Crime Stoppers at 225-344-7867. video

The Smallest Cameras Keep Getting Smaller

Misumi Electronics Corp. specializes in spy applications, surveillance systems, industrial inspection, and medical applications.

Monday, December 7, 2015

Field Reports from the Blue Blaze Irregulars - iPhone & Micro TV News

Your iPhone Keeps a List of Everywhere You’ve Ever Been. Here’s How to Delete It 





Your iPhone lists all of the exact locations of the major cities you’ve been recently.beneath every location you’ve visited, it lists the number of recorded visits in a certain time period. If you click on a location, it will list out all of the times and dates of your visit.  more

Want to turn it off? Here’s how:
  1. Go to the Settings menu, select Privacy
  2. Select Location Services
  3. Scroll down (really far) to the bottom (keep going) and select System Services
  4. Scroll and select Frequent Locations
  5. Get sufficiently creeped out by how much your iPhone knows about you
  6. Select ‘Clear History’ and swipe the Frequent Locations tab left
 (Submitted without comment.) ~BBI 62521


The Smallest Camera in the World
Medigus has developed a range of micro CMOS (complementary metal-oxide semiconductor) and CCD (charge-coupled device) video cameras, including micro ScoutCam™ 1.2, which to the best of the company's knowledge, is the smallest in the world. more

While these are intended to some degree for medical use they can be used for any “special” need. When you get down to the nano-sized cameras, the potential is mind-boggling. There are cameras now in insect-like drones too that would probably land on your shirt to save power. Hmmm…that buzzing in your ear is a camera!  ~BBI 77377

Saturday, December 5, 2015

Security Director Alert: A Brilliant Answer to Shredding Security Worries, and Cost

Epson Develops the World's First Office Papermaking System
Turns Waste Paper into New Paper 
  
PaperLab promises to revolutionize office recycling by securely destroying documents and turning them into office paper using a dry process.

Seiko Epson Corporation has developed what it believes to be the world's first compact office papermaking system capable of producing new paper from securely shredded waste paper, without the use of water.

Epson plans to put the new "PaperLab" into commercial production in Japan in 2016, with sales in other regions to be decided at a later date.

Businesses and government offices that install a PaperLab in a backyard area will be able to produce paper of various sizes, thicknesses, and types, from office paper and business card paper to paper that is colored and scented.

Until now enterprise has had to hire contractors to handle the disposal of confidential documents or has shredded them themselves. With a PaperLab, however, enterprise will be able to safely dispose of documents onsite instead of handing them over to a contractor. PaperLab breaks documents down into paper fibers, so the information on them is completely destroyed. more



This could be the biggest information security news of the year for many corporations and government agencies. ~Kevin

Being Ordinary Saves Apple from Wiretapping Charge

CA - A federal judge Monday found no evidence that Apple's failure to deliver text messages sent via iMessage to non-iPhone users amounts to wiretapping.

U.S. District Judge Lucy Koh... wrote. "Defendant does not 'intercept' the message within the meaning of the Wiretap Act by erroneously classifying the message as an iMessage."

Koh agreed with Apple that its server falls under the Wiretap Act's "ordinary course of business" exception, saying the evidence, redacted and undisputed by both sides, showed that the iMessage server never operated outside its ordinary functions. A device acting within the ordinary course of business, Koh wrote, cannot form the basis of a Wiretap Act claim. She granted Apple's motion for summary judgment.  more

Montreal Makes Spying a Hackneyed Phrase

Montreal Is Now Spying On The City’s Taxi Drivers

...the Montreal taxi bureau will be sending out “mystery passengers” that will spy on cab drivers.

Hoping to get a real picture of how drivers treat passengers, 150 mystery riders will get in cabs around the city and evaluate drivers, according to Global News...

On the other hand, now that we’re all talking about the taxi-driver-spies, drivers may be on their toes and act all nice and pleasant in fear of being reprimanded, which isn’t a solution to an ongoing problem. Guess we’ll have to wait and see. more

U-2 Spy Plane Teardown

via
Aircraft maintenance is no laughing matter. Keeping planes, especially multi-million-dollar spy planes, in the air requires loads of work. Like many military aircraft, the U-2 spy plane gets a complete and total disassembly, a thorough inspection of all its parts, and in the case of the Dragon Lady, a complete repainting.

Sploid has an awesome time-lapse video of the process, which is handled every 4,700 flight hours by Lockheed Martin technicians. The video shows everything from the roll in to the post-maintenance takeoff, with the breakdown of parts, stripping of paint and the general inspection shown in a decent degree of detail. What we find most fascinating, though, is the way the entire plane seems to come apart like a giant Lego assembly. The wings and tail just sort of pop off, leaving the surprisingly tiny fuselage to be inspected.



Following the inspection and reassembly, the U-2 is returned to the Air Force where it can conduct its usual spying and reconnaissance operations. more

Monday, November 30, 2015

The Best Spy Museum You will Never See... except for the parts on-line

The CIA Museum's collection includes artifacts associated with the CIA's predecessor, the Office of Strategic Services; foreign intelligence organizations; and the CIA itself.

The collection includes clothing, equipment, weapons, insignia and other memorabilia that serve as tangible testimony to the Agency's history. Many of the objects the Museum holds were designed, manufactured and used specifically for intelligence operations.

CIA used the “Belly Buster” drill during the late 1950s and early 1960s to drill holes into masonry for implanting audio devices. After assembly, the base of the drill was held firmly against the stomach while the handle was cranked manually. This kit came with several drill bits and accessories.
52.5 cm x 22.5 cm x 5 cm
(L x W x H)

All artifacts displayed in the museum's exhibits have been declassified by the appropriate Agency officials. Please note that because the Museum is located on the CIA compound, it is not open to the public for tours. Take the on-line tour.

Italian Authorities to Spend 150 Million Euros on Monitoring PlayStation Chat

Italian Minister of Justice Andrea Orlando has revealed that the Italian government intends to spend 150 million euros (£105mn | $157mn) 

on new equipment and techniques to monitor encrypted communications, including the PlayStation 4 game chat protocols which recently fell under suspicion as a means of communication by which ISIS may have coordinated the recent attacks on Paris.

It is not clear whether the ‘new instruments’ of surveillance about which Orlando spoke to Il Messaggero [Italian language] will be new to investigative authorities, or new per se – but the decision to make the investment involves not just equipment and technicians, but additional ‘cultural mediators’ in prisons, “to prevent these forms of radicalization, that have developed in other countries in [the same] context.” more

Merry Christmas folks!

Sunday, November 29, 2015

Town Supervisor Faces a Second Round of Eavesdropping Charges

NY - Embattled Windham Supervisor Stacy M. Post is facing additional charges in a six-count indictment handed up by a Greene County grand jury.

Post’s second indictment cites alleged illegal activities between Feb. 22 and March 3, 2014, at the Windham Town Hall by the supervisor and former police chief. The first indictment was released in February, after her arrest by state police on Jan. 12...

The most recent indictment charges Post with installing video and audio surveillance software and hardware on her office computer “for the purpose of eavesdropping on individuals without their knowledge or consent” and with using eavesdropping equipment in her possession to eavesdrop on town employee Cynthia Nelson, former town employee Bette Rhoades, Town Clerk Bonnie Poehmel and Councilman Wayne Van Valin between Feb. 25 and March 3, 2014. more

Saturday, November 28, 2015

Spy for Art's Sake

Spy vs. Spy: Tech-Savvy Swiss Duo Bitnik Refines the Art of Espionage

‘I’ve hijacked your surveillance camera. How about a game of chess?”
The words filled a closed-circuit television screen that only seconds before had shown commuters in London’s Charing Cross station.

Whichever security guard read the message soon saw it replaced by a chessboard and the words: “You are white. I am black. Call me or text me to make your move. This is my phone number: 075 8246 0851.”

In the heart of the world’s most surveilled city, two artists were registering their polite protest with the help of a laptop and an interfering transmitter. Carmen Weisskopf and Domagoj Smoljo, a Swiss team known as !Mediengruppe Bitnik, have been co-opting the spy’s arsenal to practice their own, artistic style of counter-espionage...

 

Artists and spies are loners, operating on the margins. They observe, gather intelligence, surgically intervene, and detect and disseminate artifice. They try to stay ahead of everyone else. more