Tuesday, February 27, 2018

The Case of the License Plate ICE Pick

The Immigration and Customs Enforcement (ICE) agency has officially gained agency-wide access to a nationwide license plate recognition database, according to a contract finalized earlier this month. The system gives the agency access to billions of license plate records and new powers of real-time location tracking, raising significant concerns from civil libertarians...

ICE agents would be able to query that database in two ways. A historical search would turn up every place a given license plate has been spotted in the last five years, a detailed record of the target’s movements. That data could be used to find a given subject’s residence or even identify associates if a given car is regularly spotted in a specific parking lot. more

As foreshadowed...

Personal Phone Calls at Work Can Put Employers in Jeopardy

This from a California court: Employers unwise to permit use of company telephones for personal calls—at least if the employer plans to record those calls.
  • Two-party consent means two-party consent: All parties to a call must be told the call is going to be recorded and must consent.
  • Employers with recording systems should consider barring use of company telephones for personal calls and making sure that people receiving calls on a recorded line automatically are informed, up front, that the call will be recorded.
  • Barring all personal calls is not necessary, but it may offer some protection against the legal consequences of a breakdown in the employer’s system of ensuring notice to all parties before the recording begins.
In a for-publication opinion, the California Court of Appeal has warned employers that it is not enough to tell employees they have no right of privacy if they use the employer’s telephones for personal calls: the employer might still be liable to third persons whose telephone calls are recorded. Rojas v. HSBC Card Servs. Inc., ___ Cal. App. 4th ___, No. D071442, 2018 WL 802094 (Cal. Ct. App. Fourth Dist. Jan. 16, 2018). more

Note: Many other states follow the more restrictive version of Federal law–two party consent–as well. ~Kevin

Saturday, February 24, 2018

Extortionography and the Missouri Gov. Eric Greitens Felony Indictment

Missouri Gov. Eric Greitens, who was once considered a rising star in the Republican Party, has been under siege since January, when accusations emerged that he threatened to use a nude photo to blackmail his former hairstylist, with whom he was having an extramarital affair.

Greitens had allegedly threatened the woman by saying he would distribute a nude photo he had secretly taken of her if she exposed their relationship.

The accusations stemmed from a covert recording by the woman’s ex-husband published by KMOV in St. Louis, in which the woman is heard describing how Greitens invited her to his home in 2015 and, with her consent, taped her hands to exercise rings and blindfolded her. He then allegedly took a photo of her naked. more

What is extortionography?

Mystery 911 Calls from Apple Repair Center


Apple is working with local police to remedy a surge in unintentional emergency calls to 911 that are originating from the company’s distribution and repair center in Elk Grove, California.

The influx of calls has been ongoing for months, averaging 20 accidental calls a day and totaling over 1,600 since October.

911 dispatchers hear silence and intermittent employee chatter when the calls come in. more

Thursday, February 22, 2018

FutureWatch: Tomorrow's Spys Today

"Help young people. Help small guys. Because small guys will be big. Young people will have the seeds you bury in their minds, and when they grow up, they will change the world." 
~Jack Ma

Teens at the Library for grades 6-10: Spy Academy 
Categories: Community
Date: Thursday, February 22, 2018
Start Time: 6:30 PM (GMT-05:00) Eastern Time (US & Canada)
End Time: 7:30 PM
Location Northeast Regional Library, 14401 Green Elm Ln, Raleigh, NC 27614
Google Calendar Yahoo! Calendar Windows Live Calendar iCal/Outlook

Put your sleuth skills to the test. Come for a night of code breaking, laser-beams, memory, and more!

For more information...

Dronebusters

Two drones headed north above Capitol Boulevard toward the Idaho statehouse. Lt. Gov. Brad Little stood to Gov. Butch Otter’s right at the top of the Capitol steps and watched...

The demonstration by Black Sage Technologies showed off the Boise company’s system to immobilize drones that might be carry a bomb, drop contraband or weapons into prison recreation yards, or spy on sensitive operations.

Black Sage uses cameras, radar and other tools to detect drones. It can see them at least three and a half miles away. The company sometimes demonstrates its anti-drone system at military bases. Wednesday’s exhibition was one of the few times the public has gotten to see it. more

The Employee Competitor: Spy in the Yogurt

Click here.
The American yogurt market has remained pretty steady over the past few years, yet the yogurt areas in all my go-to grocery stores keep expanding, meaning it’s an increasingly competitive industry, and this fosters the sort of tense environment that sometimes can lead to suspicions of corporate espionage.

On Wednesday, Bloomberg reported that Dannon Co. sued its former senior vice president, Federico Muyshondt, alleging he divulged trade secrets to colleagues at his new job, which is with Chobani LLC. Both of these companies, obviously, are renowned for their yogurt.

According to the complaint—filed in a federal court in White Plains, New York—Muyshondt stands accused of pilfering details of Dannon’s business strategy, plans for forthcoming products, and lists of customers before he left the company in January to take a job with Chobani, which was not named as a defendant in the lawsuit. more

Report Reveals 50% of Organizations Don't Provide Employee Information Security Training

New cybersecurity reports just released by Cisco and Verizon Wireless say that businesses are faced with more sophisticated security threats from wireline and wireless devices running on their networks.

Perhaps the more disturbing revelation of Verizon’s study is that it’s not hacktivists, criminals or those engaging in corporate espionage that pose the greatest threat, but a company’s own employees. However, only 50% of all organizations provide IT training when a new employee joins a company. more

Observation: Interestingly, even fewer businesses proactively check for all the other methods of corporate espionage, e.g. regular information security surveys and technical surveillance countermeasures inspections

Coincidentally, the few that are pro-active seem to be among the most successful and profitable companies in America. Just coincidence?

Wednesday, February 21, 2018

You Are Never a Stranger in Our City - Facial Recognition Street Cams

Nvidia has partnered with AI developer AnyVision to create facial recognition technology for "smart cities" around the world. The two companies will work to install automatic facial recognition into CCTV (closed-circuit television) surveillance cameras.

AnyVision claims the technology enables cameras that can continuously scan for faces 24/7, automatically identifying and tracking individuals within a large crowd with 99% accuracy.

Algorithms working with human monitors can then compare the faces identified against a database of known terrorists or criminals.

The company also says it's committed to protecting the personal data that CCTV cameras collect.

So... is this technology terrifying, and possibly everything Orwell warned us about? Absolutely.

But it could also save thousands of lives. The technology could be useful not only for catching at-large criminals, but also for quickly identifying suspects, and tracking down individuals who have gone missing. more

You may recall, this has been tried before and its comeback was predicted here in 2008.

Monday, February 19, 2018

Slick and Wise Espionage Ethics Discussion

NM - Two former U.S. intelligence officials will discuss the cloak-and-dagger world of espionage and the difficult ethical dilemmas it poses for U.S. spies at a lecture in Albuquerque on Feb. 25.

Stephen Slick, director of the University of Texas at Austin’s Intelligence Studies Project, and Douglas Wise, retired senior CIA operations officer, will wrestle with the question of whether a profession that requires lying, cheating, stealing, manipulating, exploiting and deceiving should have ethical boundaries. In a Journal interview, Slick said every potential intelligence officer must answer that question for themselves, and that their ultimate responsibility is adhering to U.S. and international law.

The panel discussion – part of the Albuquerque International Association’s ongoing lecture series – is Sunday, Feb. 25, from 3 p.m. to 5 p.m. at the UNM Continuing Education Auditorium.

Slick said the subject of espionage and ethics is popular among his students, who are often contemplating careers in intelligence. more

Just when you thought there were no more places to hide a spycam...

FL - A 54-year-old Southside man is behind bars after a young woman found a tiny camera hidden inside a loofah as she was taking a shower in their home, according to the Jacksonville Sheriff’s Office.

Kelly Lloyd Birkley remains jailed on $25,000 bail after being charged Monday with video voyeurism of someone 19 or older. Responding officers found Birkley sitting in a car in the driveway, reporting that he told them “I’m a dirty old man” when they approached, according to his arrest report...

Court records show Birkley’s wife filed a temporary injunction for protection against him the same day he was arrested. more

Hacktivists - Hackers Who Hack For Privacy

Another day, another data breach – This time it is Retina-X Studios, a well know spyware developing firm.

There are different types of hackers, some hack for profit while some hack for good and then there are hacktivists who do it for the cause...

...the company suffered a security breach in April 2017 revealing that Retina’s software are also used to spy on customers to keep an eye on their partners without their consent which is unlawful...

Retina-X has once again suffered a data breach in which a hacker going by the online handle of Precise Buffalo on Mastodon server has targeted Retina-X and completely erased 1 terabyte of data from its cloud server including photos customers stole from unsuspecting users including kids who installed Retina-X’s Phonesheriff application on their smartphone...

“None of this should be online at all. “Aside from the technical flaws, I really find this category of software disturbing. In the US, it’s mainly targeted to parents,” the hacker said, explaining his motivations for going after Retina-X. “Edward Snowden has said that privacy is what gives you the ability to share with the world who you are on your own terms, and to protect for yourself the parts of you that you’re still experimenting with. I don’t want to live in a world where younger generations grow up without that right,” said the hacker.

This is not the first time when a spyware developer has been hacked. Previously mSpy was compromised when a hacker stole personal data of 400,000 users and leaked it online. more

Friday, February 16, 2018

EU Kills Nanny, and other covert cams used to spot theft and wrong-doing.

Translation
EU - Employers looking to monitor the conduct of their employees should consider their actions carefully, particularly in light of the requirements of the new data protection laws coming into force in May.

In a recent legal case, a Spanish supermarket set up hidden CCTV cameras to monitor its employees after it uncovered theft at one of its stores. The footage collected showed five employees stealing items. The employees were confronted and admitted to theft, after which they were dismissed.

They pursued unfair dismissal claims, arguing that the use of the covert video evidence was an infringement of their privacy rights. The European Court of Human Rights agreed that the use of covert cameras constituted a violation of the employees' right to privacy and breached Spanish data protection law.

How does this apply in the UK? more

Minion nanny cams. Soon to be discounted.

Sunshine Disinfects Fortune Over iPhone Spyware, or Tobacco Rode... away.

Fifty dollars worth of spy gear just cost this Yale grad a fortune.

Brooklyn Heights dad Crocker Coulson forfeited any claim to his estranged wife’s tobacco fortune after he bugged her iPhone with $50 software that allowed him to record confidential meetings with her lawyer and shrink to gain an advantage in their divorce.

Brooklyn Supreme Court Justice Jeffrey Sunshine doled out the “drastic” punishment because of the “unprecedented, contumacious conduct” of the Yale-educated investment consultant. Sunshine added that the punishment was a signal to other divorcing spouses not to violate attorney-client and doctor-patient confidentiality by playing private eye. more

Concerned about your smartphone?

Spyscape Opens in New York City Today

Calling all spies: Announcing the opening of SPYSCAPE, a truly unique permanent destination that combines three distinct elements:
• a contemporary museum,
• an immersive experience,
• and a journey of personal discovery. 


SPYSCAPE opens at 10am ET on Friday, February 16.  (928 8th Avenue, New York, NY)
 
Students (with valid student ID) can reserve free admission online for the opening weekend (February 16-19).

The Experience:
Upon entry, visitors will receive a unique Identity Band, which uses RFID technology to personalize their experience. They then enter the Briefing, a high-tech theater which rises up through the building as it introduces the world of secret intelligence via an immersive film developed with the studio that creates VFX for films such as Avengers, Ex-Machina and Blade Runner 2049.

Their Spy Profiles are then analyzed in Debrief, where they discover which of the 10 archetypal Spy Roles they are best suited to. This authentic profiling system was developed with a former Head of Training at British Intelligence and top industrial psychologists. The Spy Roles are: Agent Handler, Cryptologist, Hacker, Intelligence Analyst, Intelligence Operative, Special Ops Officer, Spycatcher, Spymaster, Surveillance Officer, Technical Ops Officer. more