The trailer for a career in spying used to come from movies and TV shows. In May 2018, it will come from gaming. The new game is called Assault Spy.
"The self-proclaimed elite corporate spy Asaru and his deadweight partner Kanoko are hired for a new job in a dreary world dominated by corporations. Their mission? Infiltrate the mega corporation, Negabot. Dash, evade, and smash your way to the truth in this fast paced action game. No secret is safe from THIS bombastic spy duo!"
Monday, February 12, 2018
Well, Some Young Spies Still Learn From TV
Bart purchases a mini spy camera and manages to take a picture of Homer dancing next to stripper named Princess Kashmir at a co-worker's strip club party.
He gives copies of the picture to his friends, and eventually the picture starts to circulate around until eventually Marge sees it. She kicks Homer out of the house, but the next day explains that she is not upset about him dancing next to a woman, but rather that Bart saw it.
She demands that he take Bart and go apologize to Princess Kashmir. Homer agrees and says that he is ready to start respecting women.
He gives copies of the picture to his friends, and eventually the picture starts to circulate around until eventually Marge sees it. She kicks Homer out of the house, but the next day explains that she is not upset about him dancing next to a woman, but rather that Bart saw it.
She demands that he take Bart and go apologize to Princess Kashmir. Homer agrees and says that he is ready to start respecting women.
Saturday, February 10, 2018
Book Review - Loose Ends - David B. Watts, PI (really)
Ever read a really good book that you wish would become a feature-length Hollywood movie? Or, a television series, because you wanted to see the main characters in more of their adventures?
Loose Ends, by David B. Watts, is that book. I read it today in one sitting. It left me full of time well spent, yet hungry for more.
Loosely based on an actual case, solved by a real-life private investigator, it’s a multiple murder mystery set in New Jersey.
Geographically, it’s all true. You can almost smell the exhaust coming from the trucks on Route 22, in Union County; see the plushness of a wealthy defense lawyer’s conference room; hear the gasps in the courtroom as the surprise ending unfolds. This read creates a mental movie as the eyes pull the words off the pages.
Total verisimilitude, especially when it comes to private investigations, attorneys, police, prosecutors, and the courtroom.
If you are at loose ends for a great read, yes, tie up with Loose Ends.
Loose Ends, by David B. Watts, is that book. I read it today in one sitting. It left me full of time well spent, yet hungry for more.
Loosely based on an actual case, solved by a real-life private investigator, it’s a multiple murder mystery set in New Jersey.
Geographically, it’s all true. You can almost smell the exhaust coming from the trucks on Route 22, in Union County; see the plushness of a wealthy defense lawyer’s conference room; hear the gasps in the courtroom as the surprise ending unfolds. This read creates a mental movie as the eyes pull the words off the pages.
Total verisimilitude, especially when it comes to private investigations, attorneys, police, prosecutors, and the courtroom.
If you are at loose ends for a great read, yes, tie up with Loose Ends.
Friday, February 9, 2018
The Doctor is In - Twelve Ways Dr. Guri can get into your air-gapped computer.
Faraday rooms or “cages” designed to prevent electromagnetic signals from escaping can nevertheless be compromised and leak highly sensitive data, according to new studies...
In two newly released reports (the other ten are there as well), the team demonstrated how attackers can bypass Faraday enclosures and air gaps to leak data from the most highly secured computers. The Odini method, named after the escape artist Harry Houdini, exploits the magnetic field generated by a computer’s central processing unit (CPU) to circumvent even the most securely equipped room. Click here to watch the demonstration.
“While Faraday rooms may successfully block electromagnetic signals that emanate from computers, low frequency magnetic radiation disseminates through the air, penetrating metal shields within the rooms,” explains Dr. Guri. “That’s why a compass still works inside of a Faraday room. Attackers can use this covert magnetic channel to intercept sensitive data from virtually any desktop PCs, servers, laptops, embedded systems, and other devices.”
In another documented cyberattack dubbed Magneto, researchers utilized malware keystrokes and passwords on an air-gapped computer to transfer data to a nearby smartphone via its magnetic sensor. Attackers can intercept this leaked data even when a smartphone is sealed in a Faraday bag or set on “airplane mode” to prevent incoming and outgoing communications. more
In two newly released reports (the other ten are there as well), the team demonstrated how attackers can bypass Faraday enclosures and air gaps to leak data from the most highly secured computers. The Odini method, named after the escape artist Harry Houdini, exploits the magnetic field generated by a computer’s central processing unit (CPU) to circumvent even the most securely equipped room. Click here to watch the demonstration.
“While Faraday rooms may successfully block electromagnetic signals that emanate from computers, low frequency magnetic radiation disseminates through the air, penetrating metal shields within the rooms,” explains Dr. Guri. “That’s why a compass still works inside of a Faraday room. Attackers can use this covert magnetic channel to intercept sensitive data from virtually any desktop PCs, servers, laptops, embedded systems, and other devices.”
In another documented cyberattack dubbed Magneto, researchers utilized malware keystrokes and passwords on an air-gapped computer to transfer data to a nearby smartphone via its magnetic sensor. Attackers can intercept this leaked data even when a smartphone is sealed in a Faraday bag or set on “airplane mode” to prevent incoming and outgoing communications. more
Wednesday, February 7, 2018
Facial Recognition Glasses Used by Police to Identify Suspects
Chinese police are using dark sunglasses equipped with facial recognition technology to spot criminal suspects.
The glasses, which are being worn by police at a busy train station ahead of the Chinese New Year travel rush, are linked to a central database which contains details of criminal records.
Wearing the technology, police can almost instantly view an individual's personal details, including name, ethnicity, gender and address.
The scene would not look out of place in an episode of science fiction television drama Black Mirror, which often depicts dark scenarios of humans being overcome by technology.
China is deploying new technologies to monitor people in ways that would unnerve many in the West. more
The glasses, which are being worn by police at a busy train station ahead of the Chinese New Year travel rush, are linked to a central database which contains details of criminal records.
Wearing the technology, police can almost instantly view an individual's personal details, including name, ethnicity, gender and address.
The scene would not look out of place in an episode of science fiction television drama Black Mirror, which often depicts dark scenarios of humans being overcome by technology.
China is deploying new technologies to monitor people in ways that would unnerve many in the West. more
Drama Begins in Waymo v. Uber Trade Secrets Trial
The first day of the Waymo v. Uber trial over self-driving car trade secrets had it all: a packed courtroom, comical technical glitches and the creation of a fake Twitter account in the judge's name.
And that's aside from the testimony.
The high-profile Silicon Valley case pits Waymo -- the self-driving car unit of Google's parent company, Alphabet -- against Uber, the world's most highly valued startup. Waymo claims Uber's former star engineer stole 14,000 "highly confidential" files to develop its own technology. Uber calls the claim "baseless."
Monday was the first day of the trial, which is expected to last at least three weeks. Lawyers for the two companies presented their opening statements, aiming to toss barbs into each other's cases. more
And that's aside from the testimony.
The high-profile Silicon Valley case pits Waymo -- the self-driving car unit of Google's parent company, Alphabet -- against Uber, the world's most highly valued startup. Waymo claims Uber's former star engineer stole 14,000 "highly confidential" files to develop its own technology. Uber calls the claim "baseless."
Monday was the first day of the trial, which is expected to last at least three weeks. Lawyers for the two companies presented their opening statements, aiming to toss barbs into each other's cases. more
Your Cell Phone Sings "Every Step You Take..."
by Guevara Noubir, Professor of Computer and Information Science, Northeastern University
"My group’s recent research has shown how mobile phones can also track their users through stores and cities and around the world – even when users turn off their phones’ location-tracking services.
The vulnerability comes from the wide range of sensors phones are equipped with – not just GPS and communications interfaces, but gyroscopes and accelerometers that can tell whether a phone is being held upright or on its side and can measure other movements too. Apps on the phone can use those sensors to perform tasks users aren’t expecting – like following a user’s movements turn by turn along city streets.
Most people expect that turning their phone’s location services off disables this sort of mobile surveillance. But the research I conduct with my colleagues Sashank Narain, Triet Vo-Huu, Ken Block and Amirali Sanatinia at Northeastern University, in a field called “side-channel attacks,” uncovers ways that apps can avoid or escape those restrictions. We have revealed how a phone can listen in on a user’s finger-typing to discover a secret password – and how simply carrying a phone in your pocket can tell data companies where you are and where you’re going..." more
Monday, February 5, 2018
TSCM, or This Smells Characteristicly Moronic
Pakistan’s security agencies have not found anything suspicious in Chetna Jadhav’s shoes that were confiscated by the Pakistani agencies...
Sources said that Pakistan’s agencies minutely examined her shoes, searching for spying devices.
However, nothing could be found and Pakistan is now likely to attribute this “incident” to an over-enthusiastic security official...
Sources said that the Pakistan Foreign Office was having a hard time dealing with the “concocted” tale of Jadhav’s wife carrying a spying device in her shoe, as it was not being able to answer the questions of local journalists who were asking about the nature of the “spying device” allegedly recovered and why details of the same were not being shared with them. more
Give them a break. Perhaps they misinterpreted the acronym written inside the shoe. TSCM and TGIF look somewhat similar, but TGIF stands for Toes Go In First.
Sources said that Pakistan’s agencies minutely examined her shoes, searching for spying devices.
However, nothing could be found and Pakistan is now likely to attribute this “incident” to an over-enthusiastic security official...
Sources said that the Pakistan Foreign Office was having a hard time dealing with the “concocted” tale of Jadhav’s wife carrying a spying device in her shoe, as it was not being able to answer the questions of local journalists who were asking about the nature of the “spying device” allegedly recovered and why details of the same were not being shared with them. more
Give them a break. Perhaps they misinterpreted the acronym written inside the shoe. TSCM and TGIF look somewhat similar, but TGIF stands for Toes Go In First.
Switzerland - Spy Magnet - Not Welcome Sign
Switzerland has always been a favorite by writers of spy novels as a place where foreign agents from across the world meet and exchange secret information.
But it’s true – and the country is being used more and more by international spies to meet.
It’s a trend the intelligence service wants to stop.
The NZZ newspaper quotes an anonymous source says there’s a rising demand for information and agents are increasingly choosing Switzerland to meet – especially Geneva.
The international city makes it easy for people throughout the world meet without attracting attention due to all the international organizations and a low level of street surveillance.
But Swiss authorities are not happy about living up to the stereotype. The intelligence agency says it’s not in the country’s interest to be a place where information damaging to allies could be swapped and they hope friendly countries would also do the same for Switzerland. more
But it’s true – and the country is being used more and more by international spies to meet.
It’s a trend the intelligence service wants to stop.
The NZZ newspaper quotes an anonymous source says there’s a rising demand for information and agents are increasingly choosing Switzerland to meet – especially Geneva.
The international city makes it easy for people throughout the world meet without attracting attention due to all the international organizations and a low level of street surveillance.
But Swiss authorities are not happy about living up to the stereotype. The intelligence agency says it’s not in the country’s interest to be a place where information damaging to allies could be swapped and they hope friendly countries would also do the same for Switzerland. more
Derailed CEO Accused of Spying on Board Members
South Africa - Railway Safety Regulator board members had their movements monitored and their cars fitted with tracking devices - and their boss allegedly orchestrated the whole thing.
Times Select can reveal that embattled Railway Safety Regulator CEO Nkululeko Poya allegedly spied on board members. She is currently on precautionary suspension after being charged for a string of alleged irregularities, including irregular staff appointments...
The new allegations facing Poya stem from a whistle blower who revealed how he had been engaging in clandestine activities on Poya’s behalf... He that said he worked on Poya’s instructions to spy on board members and find dirt against them. more
Times Select can reveal that embattled Railway Safety Regulator CEO Nkululeko Poya allegedly spied on board members. She is currently on precautionary suspension after being charged for a string of alleged irregularities, including irregular staff appointments...
The new allegations facing Poya stem from a whistle blower who revealed how he had been engaging in clandestine activities on Poya’s behalf... He that said he worked on Poya’s instructions to spy on board members and find dirt against them. more
As Seen on TV - Spycams for Moms
Here's the pitch...
Introducing Smart Spy™
"The USB Wall Charger that is also a Secret Spy Camera! Smart Spy™ has a Micro SD card with 32 GB of memory that can record up to 8 hours of footage! It allows you to capture 1080P HD video footage discretely. Chargers are commonly plugged into walls, so it will never look like it is out of place! It even works as a universal USB wall charger. Now you can see what is going on when you’re not there!
Whether you need to keep an eye out on your kids, pets, hired help, intruders or any suspicious activity! It's so compact, you can even take it with you on the go! Smart Spy™ also has a motion activation feature so you don’t waste recording time when nobody is in the room. It’s so easy to use – just plug it in! When you want to review your recordings, simply plug it into your computer to play back." more
The TV commercial on the site says it all.
One Blue Blaze Irregular quipped, "If these get any cheaper, they will be giving them away in cereal boxes."
Tuesday, January 30, 2018
The Allentown Wiretap Tapes
If you have never listened to a wiretap, you might find this interesting...
Wiretaps from the Allentown City Hall corruption case.
TSCM: African Union Headquarters China Built Found To Be Bugged
China has again been accused of state-sponsored espionage after several information backdoors were discovered in the African Union (AU) headquarters it built in the Addis Ababa, the capital of Ethiopia.
The AU is a bloc of the 55 countries in Africa, where China has been trying to spread it’s influence in quest of the natural resources the continent holds. As part of it’s African outreach, China had financed and built the AU headquarters at a cost of $200 million in 2012. The building was inaugurated with much fanfare as a symbol and was meant to be a symbol of Chinese-African partnership.
However, an investigation by the French newspaper Le Monde has revealed that data from the servers in the AU headquarters was being transferred to Shanghai every night since the last five years, starting 2012. A followup sweep of the building led to the discovery of microphones embedded in desks and walls of the building revealing major cracks in the building’s security.
The AU has since replaced the Chinese machines with it’s own servers and is moving to encrypt it’s data and communications. more
Secret Surveillance Of Fox News Women Changing Clothes Alleged
Former Fox News star Andrea Tantaros is alleging that the network's former chair and CEO, Roger Ailes, secretly watched female hosts changing clothes on company surveillance equipment and that the conservative channel spied on employees' electronic devices.
Tantaros made the claims in a proposed amended complaint she filed in US District Court on Monday as part of a nine-month lawsuit against her former employer.
Tantaros, who is now representing herself in the legal matter, said Ailes had a CCTV system that allowed him to see inside Fox News offices: "Fox offices are where most Fox female talent, including Ms. Tantaros, disrobed daily from their regular clothing into their on-air attire, sometimes multiple times a day... Upon information and belief Ailes was surreptitiously recording, both through audio and with hidden cameras, Tantaros (and others)." more
Corporate Alert...
If you do not have a Recording in the Workplace Policy and conduct periodic inspections of Expectation of Privacy areas, you are at risk. Get these two elements into your security program. Start here.
Tantaros made the claims in a proposed amended complaint she filed in US District Court on Monday as part of a nine-month lawsuit against her former employer.
Tantaros, who is now representing herself in the legal matter, said Ailes had a CCTV system that allowed him to see inside Fox News offices: "Fox offices are where most Fox female talent, including Ms. Tantaros, disrobed daily from their regular clothing into their on-air attire, sometimes multiple times a day... Upon information and belief Ailes was surreptitiously recording, both through audio and with hidden cameras, Tantaros (and others)." more
Corporate Alert...
If you do not have a Recording in the Workplace Policy and conduct periodic inspections of Expectation of Privacy areas, you are at risk. Get these two elements into your security program. Start here.
Monday, January 29, 2018
Dutch Treat, or Watching the Spies Spy
According to a report in the Dutch newspaper de Volkskrant, the General Intelligence and Security Service of the Netherlands (AIVD)—the Netherlands' domestic intelligence service—had hacked into the network of a building at a Russian university in Moscow some time in the summer of 2014. The building housed a group running a hacking campaign now known as "Cozy Bear," one of the "threat groups" that would later target the Democratic National Committee.
AIVD's intrusion into the network gave them access to computers used by the group behind Cozy Bear and to the closed-circuit television cameras that watched over them, allowing them to literally witness everything that took place in the building near Red Square, according to the report. Access to the video cameras in a hallway outside the space where the Russian hacking team worked allowed the AIVD to get images of every person who entered the room and match them against known Russian intelligence agents and officials.
Based on the images, analysts at AIVD later determined that the group working in the room was operated by Russia’s Foreign Intelligence Service (SVR). An information and technology sharing arrangement with the National Security Agency and other US intelligence agencies resulted in the determination that Cozy Bear’s efforts were at least in part being driven by the Russian Federation’s leadership—including Russian President Vladimir Putin. more
So, how do you feel about the security of your security cameras now?
AIVD's intrusion into the network gave them access to computers used by the group behind Cozy Bear and to the closed-circuit television cameras that watched over them, allowing them to literally witness everything that took place in the building near Red Square, according to the report. Access to the video cameras in a hallway outside the space where the Russian hacking team worked allowed the AIVD to get images of every person who entered the room and match them against known Russian intelligence agents and officials.
Based on the images, analysts at AIVD later determined that the group working in the room was operated by Russia’s Foreign Intelligence Service (SVR). An information and technology sharing arrangement with the National Security Agency and other US intelligence agencies resulted in the determination that Cozy Bear’s efforts were at least in part being driven by the Russian Federation’s leadership—including Russian President Vladimir Putin. more
So, how do you feel about the security of your security cameras now?
Subscribe to:
Posts (Atom)