"Next bill on the floor, MI-342, The School Days Hickory Switch Act."
MI - In a 105-3 vote, lawmakers passed the bill that adds parental exemptions to Michigan’s eavesdropping prohibition. Eavesdropping is defined as overhearing, recording, amplifying or transmitting conversations intended to be private.
Under current Michigan law, snooping on a child’s phone could lead to a felony sentencing of up to two years of imprisonment.
Supporters say parents should be allowed to monitor their children’s conversations until they turn 18 to best protect them. The bill would not allow parents to monitor such conversations with the child’s attorney, a custody investigator or, if there’s a reasonable fear of danger, the other parent.
The bill now heads to the Senate. more
Monday, April 16, 2018
Business Espionage: RadRAT Hid Behind Windows... for 3 years!
Bucharest-headquartered cybersecurity company Bitdefender has flushed out "RadRAT", a powerful all-in-one toolkit for complex espionage ops that was apparently unnoticed since 2015.
This advanced remote access tool -- which offers full control over seized computers was operating since at least 2015, the company said in a statement.
The tool has been used in targeted attacks aimed at exfiltrating information, or monitoring victims in enterprises or large businesses running Windows. more
This advanced remote access tool -- which offers full control over seized computers was operating since at least 2015, the company said in a statement.
The tool has been used in targeted attacks aimed at exfiltrating information, or monitoring victims in enterprises or large businesses running Windows. more
Listening In: Cybersecurity in an Insecure Age (book)
A compelling case for the need to secure our data, explaining how we must maintain cybersecurity in an insecure age.
Tufts University professor Susan Landau has a long and distinguished background in computer security and policy that includes several books on wiretapping and surveillance...
In Listening In: Cybersecurity in an Insecure Age, Landau considers the changing world in which law enforcement must operate with exceptional clarity. She begins with a brief history of cybersecurity. The first known cyberattack was in 1986, when Clifford Stoll began trying to understand a 75-cent discrepancy in computer time; he told the story in detail in his book The Cuckoo's Egg.
The next, and the first proper internet attack -- although it wasn't really intended as such -- was the 1988 Internet Worm. Despite these early warnings, Landau writes, quoting from a US government report, "security lost to convenience in the 1980s. And then it kept on losing". It wasn't until 2008 that cyber-threats began to be taken seriously. more
The Latest Office Surveillance Devices ...with 2-digit price tags
Three good reasons
for periodic professional
bug sweeps of your offices.
This spy recorder boasts one of the highest bit rates on the market today; crystal clear CD quality recording.
VOICE ACTIVATED - Set the device where you want it, and then forget it. It'll turn on the next time it hears sound thanks to it's voice-activation feature. When the sound stops, the covert audio recorder goes into a sleep mode to save battery life and disk space - A Complete Audio Listening / Recording Device.
PROFESSIONAL GRADE FEATURES - Date and Time Stamp | 94 Hours Recording Capacity | Long Lasting Listening "Bugging" Device / "Spy Bug" | 15 Hour Battery | Capable of recording while plugged in for charging provides unlimited covert recording of rooms offices etc.
Spy Mini USB Cable Digital Voice Recorder looks just like a USB Cable.
Also works as a regular USB Charge Cable for Android or Apple.
The spy voice recorder offers a long play recording mode.
Memory: Support Up to 32GB (Micro SD Card not Included)
Recording time:
4GB Recording up to 48 hours
8GB Recording up to 96 hours
16GB Recording up to 192 hours
32GB Recording up to 384 hours
Micro hidden camera records video in exceptional 1920X1080P HD at 30 frames per second!
✔ [SUPER MINI METAL COMPACT SMALL CAMERA] - The portable hidden nanny cam is (only) 25*25*20mm/1.0*1.0*0.8in, Finger size! It's great for recording sneaky pictures and videos without attracting attention.
✔ [EASY TO USE - Just insert the T-Flash card] (free 8GB Sandisk Included) and start recording. Use at the office, home surveillance, store, trolley, baby monitor, your pocket or on your collar with the clip provided.
✔ [MOTION DETECTION SPY CAMERA] - When motion detector mode is activated, it will record any moving objects within 3 meters of its sight. Enhanced night vision with 4pcs IR led lights for crisp display in low light conditions.
more
for periodic professional
bug sweeps of your offices.
This spy recorder boasts one of the highest bit rates on the market today; crystal clear CD quality recording.
VOICE ACTIVATED - Set the device where you want it, and then forget it. It'll turn on the next time it hears sound thanks to it's voice-activation feature. When the sound stops, the covert audio recorder goes into a sleep mode to save battery life and disk space - A Complete Audio Listening / Recording Device.
PROFESSIONAL GRADE FEATURES - Date and Time Stamp | 94 Hours Recording Capacity | Long Lasting Listening "Bugging" Device / "Spy Bug" | 15 Hour Battery | Capable of recording while plugged in for charging provides unlimited covert recording of rooms offices etc.
Spy Mini USB Cable Digital Voice Recorder looks just like a USB Cable.
Also works as a regular USB Charge Cable for Android or Apple.
The spy voice recorder offers a long play recording mode.
Memory: Support Up to 32GB (Micro SD Card not Included)
Recording time:
4GB Recording up to 48 hours
8GB Recording up to 96 hours
16GB Recording up to 192 hours
32GB Recording up to 384 hours
Micro hidden camera records video in exceptional 1920X1080P HD at 30 frames per second!
✔ [SUPER MINI METAL COMPACT SMALL CAMERA] - The portable hidden nanny cam is (only) 25*25*20mm/1.0*1.0*0.8in, Finger size! It's great for recording sneaky pictures and videos without attracting attention.
✔ [EASY TO USE - Just insert the T-Flash card] (free 8GB Sandisk Included) and start recording. Use at the office, home surveillance, store, trolley, baby monitor, your pocket or on your collar with the clip provided.
✔ [MOTION DETECTION SPY CAMERA] - When motion detector mode is activated, it will record any moving objects within 3 meters of its sight. Enhanced night vision with 4pcs IR led lights for crisp display in low light conditions.
more
Labels:
#eavesdropping,
#espionage,
#spycam,
#TSCM,
advice,
business
A Tale of Corporate Espionage in Silicon Valley
...The computer that was funneling information, therefore, didn’t register on the roster of machines controlled and owned by the I.T. department. This left the security team with one definitively old-school option: they literally followed the wire that ran from the server to the rogue computer.
One by one, they plucked up the tiles in the server room, followed the Cat-5 cable as it swam alongside hundreds of other cables, inside the walls, past yellow and white power wires, and through the labyrinthine office, until they found themselves at the end of the cord, which terminated inside a small closet. There, seated behind a laptop, was a young Chinese woman.
The security specialists searched her personal computer and immediately discovered more than 30 pieces of malware that were funneling information out of the servers and back to dozens of computers in China....
Spies and corporate espionage are a fixture of Silicon Valley. Employees at companies from Twitter to SpaceX have privately told me they suspect spooks work within their walls, stealing corporate secrets, plans for new technologies, or entire servers full of code to replicate back home...
The C.E.O. of one of the big tech companies in Silicon Valley once confided in me that not only was there “no question” that Russian and Chinese agents worked at the company, but that it was impossible to know who they were or prove that they were indeed foreign agents. more
One by one, they plucked up the tiles in the server room, followed the Cat-5 cable as it swam alongside hundreds of other cables, inside the walls, past yellow and white power wires, and through the labyrinthine office, until they found themselves at the end of the cord, which terminated inside a small closet. There, seated behind a laptop, was a young Chinese woman.
The security specialists searched her personal computer and immediately discovered more than 30 pieces of malware that were funneling information out of the servers and back to dozens of computers in China....
Spies and corporate espionage are a fixture of Silicon Valley. Employees at companies from Twitter to SpaceX have privately told me they suspect spooks work within their walls, stealing corporate secrets, plans for new technologies, or entire servers full of code to replicate back home...
The C.E.O. of one of the big tech companies in Silicon Valley once confided in me that not only was there “no question” that Russian and Chinese agents worked at the company, but that it was impossible to know who they were or prove that they were indeed foreign agents. more
Tuesday, April 10, 2018
Thumbs Down, or How to Delete Your Facebook Account Permanently
Presented as a service to our privacy conscious readers and clients...
If you are looking for how to delete your Facebook account permanently or deleting anything from your Facebook account here is a 2018 guide.
Facebook has remained the primary and most commonly used social networking platform for users across the world. At the same time, the social network giant has been in the news lately amid Cambridge Analytica scandal and for archiving personal data of users including call and text logs of its Android app users.
But, the fact is that unauthorized use of user content like posts, messages, pictures, and videos by Facebook is nothing new. However, it is a relatively new revelation that even the content that we believe is removed is actually not permanently deleted. So, what can be done in this situation? more
If you are looking for how to delete your Facebook account permanently or deleting anything from your Facebook account here is a 2018 guide.
Facebook has remained the primary and most commonly used social networking platform for users across the world. At the same time, the social network giant has been in the news lately amid Cambridge Analytica scandal and for archiving personal data of users including call and text logs of its Android app users.
But, the fact is that unauthorized use of user content like posts, messages, pictures, and videos by Facebook is nothing new. However, it is a relatively new revelation that even the content that we believe is removed is actually not permanently deleted. So, what can be done in this situation? more
Monday, April 9, 2018
Dutch Treat Espionage Seriously - You Should Too
The Netherlands - The foreign affairs ministry has advised travelers to China to take ’empty’ laptops and mobile phones with them to avoid their data being compromised by the government.
The advice was contained in a letter circulated to 165 businesses and knowledge institutions accompanying prime minister Mark Rutte on a trade mission this week.
The letter says: ‘The Chinese government will want to know everything about you and your business or organisation. You should presume that all computers and phones that enter China are constantly being monitored to obtain this information.’
Sources told the Volkskrant that the cabinet is taking similar precautions for trips to Russia, Iran and Turkey. The last is particularly sensitive because the country is a NATO ally. more
The advice was contained in a letter circulated to 165 businesses and knowledge institutions accompanying prime minister Mark Rutte on a trade mission this week.
The letter says: ‘The Chinese government will want to know everything about you and your business or organisation. You should presume that all computers and phones that enter China are constantly being monitored to obtain this information.’
Sources told the Volkskrant that the cabinet is taking similar precautions for trips to Russia, Iran and Turkey. The last is particularly sensitive because the country is a NATO ally. more
Spies Target US Colleges, Universities
via VOA...
Colleges and universities are not the first places most people would think to find government spies. But reporter Dan Golden said that is not the case.
“There’s an awful lot more international students, international professors at American universities. Some of them are here to gather information for their countries."
Golden recently spoke with VOA about his book “Spy Schools.” In the book, he gives examples of spying at U.S. colleges and universities. He says the free exchange of ideas and mix of cultures at universities increase the chances for spying to take place.
Charlie McGonigal leads the counterintelligence division at the Federal Bureau of Investigation in New York. He said spying at universities is a big problem.
“There’s a lot of research and development at major universities in the United States that a foreign government would look to exploit by sending students to study at these universities.” more
Colleges and universities are not the first places most people would think to find government spies. But reporter Dan Golden said that is not the case.
“There’s an awful lot more international students, international professors at American universities. Some of them are here to gather information for their countries."
Golden recently spoke with VOA about his book “Spy Schools.” In the book, he gives examples of spying at U.S. colleges and universities. He says the free exchange of ideas and mix of cultures at universities increase the chances for spying to take place.
Charlie McGonigal leads the counterintelligence division at the Federal Bureau of Investigation in New York. He said spying at universities is a big problem.
“There’s a lot of research and development at major universities in the United States that a foreign government would look to exploit by sending students to study at these universities.” more
HACK NYC 2018 - May 8-10
|
|
Women Prompted Early Surveillance Photography
Click to enlarge. |
We only know the occupant of the van as Mr. Barrett, a professional photographer who had been employed by Scotland Yard to snap paparazzi-style shots of the women in the yard.
His long-lens photography equipment — the purchase of which was authorized by the then Home Secretary — was rudimentary, but effective.
And who were these women Barrett was photographing?
Members of the Women’s Social and Political Union (WSPU), also, and perhaps better, known as the suffragettes. Suffrage campaigns were ongoing in both Europe and the United States in the early part of the 20th century, with Finland being the first country to grant women the right to vote and stand for office in 1906. more
Saturday, March 31, 2018
Saudi Arabia's New Cell Phone Spying Line in the Sand
Saudi law has criminalized the act of spying on your spouse’s mobile phone illegally and has listed this act under cybercrimes.
Husbands or wives who are caught spying on their spouse’s mobile phone in order to prove dishonest behavior can be imprisoned for up to a year, receive a SR 500,000 ($133,000) fine or receive both forms of punishment.
According to legal sources, the penalty is imposed on people who access their spouse’s mobile phone without their permission. Accessing your spouse’s mobile phone becomes illegal when you crack their mobile phone’s password, according to the law. more
Husbands or wives who are caught spying on their spouse’s mobile phone in order to prove dishonest behavior can be imprisoned for up to a year, receive a SR 500,000 ($133,000) fine or receive both forms of punishment.
According to legal sources, the penalty is imposed on people who access their spouse’s mobile phone without their permission. Accessing your spouse’s mobile phone becomes illegal when you crack their mobile phone’s password, according to the law. more
Spycam Detection Training Tip: Be Aware of Holes in Odd Places
Click to enlarge. |
MA - A custodian at Northampton High School is facing charges after police say he "modified" a girls' bathroom at the school, creating holes in the ceiling so he could take pictures of students.
Michael Kremensky, 22, of Florence, is facing four charges of photographing an unsuspecting nude person, said Police Chief Jody Kasper, in a statement.
Police were called to the school Thursday for a report of suspicious activity involving holes in the ceiling of a girls' bathroom on the first floor.
No other bathrooms or rooms were affected, Kasper said. The activity was "localized to the one bathroom," she said. more
Learn more about spycam detection.
Friday, March 30, 2018
Is Facebook Eavesdropping? A "Scientific" Test & A Possible Explanation
(no spoilers, just teasers)
+++++
Testing the long-held belief that Facebook listens to your conversations to advertise stuff...
For years, people have speculated that Facebook and Facebook Messenger use your phone’s microphone to listen to your conversations and send you targeted adverts based on your IRL chats...
To put the rumor to rest, we at the New Statesman engaged in a very scientific test. Each employee had a scripted conversation in front of their phone with Facebook or Messenger open (after changing their settings to ensure that Facebook and Facebook Messenger had access to their microphones)...
Here's what went down... more
+++++
Facebook Really Is Spying on You...
A conspiracy theory has spread among Facebook and Instagram users: The company is tapping our microphones to target ads...
“Facebook does not use your phone’s microphone to inform ads or to change what you see in News Feed,” says Facebook.
Yeah, sure, and the government swears it isn’t keeping any pet aliens at Area 51. So I contacted former Facebook employees and various advertising technology experts, who all cited technical and legal reasons audio snooping isn’t possible... more
+++++
Testing the long-held belief that Facebook listens to your conversations to advertise stuff...
For years, people have speculated that Facebook and Facebook Messenger use your phone’s microphone to listen to your conversations and send you targeted adverts based on your IRL chats...
To put the rumor to rest, we at the New Statesman engaged in a very scientific test. Each employee had a scripted conversation in front of their phone with Facebook or Messenger open (after changing their settings to ensure that Facebook and Facebook Messenger had access to their microphones)...
Here's what went down... more
+++++
Facebook Really Is Spying on You...
A conspiracy theory has spread among Facebook and Instagram users: The company is tapping our microphones to target ads...
“Facebook does not use your phone’s microphone to inform ads or to change what you see in News Feed,” says Facebook.
Yeah, sure, and the government swears it isn’t keeping any pet aliens at Area 51. So I contacted former Facebook employees and various advertising technology experts, who all cited technical and legal reasons audio snooping isn’t possible... more
Drones - China's Self-Licking Ice Cream Cone Industry
Brief Profile
DÃ -Ji?ng Innovations Science and Technology Co., Ltd, marketed and popularly known as DJI, was established in 2006 by Frank Wang. It has its specialization in aerial photography and videography equipment (unmanned aerial vehicles), gimbals, cameras, and propulsion systems among others. They are one of the market leaders in their segment and continue to gain popularity, especially since the 2010s. In 2015, the Economist named them as being at the forefront of civilian-drone industry. more
Brief Profile
SZMID was established in 2006 by intelligence, security and telecom professionals with extensive backgrounds in the security sector providing a wide range of high quality security devices & solutions to customers around the world. Our business is mainly focus on detection and jamming areas. more
A lot of folks are gunning for drones...
Brief Profile
SZMID was established in 2006 by intelligence, security and telecom professionals with extensive backgrounds in the security sector providing a wide range of high quality security devices & solutions to customers around the world. Our business is mainly focus on detection and jamming areas. more
A lot of folks are gunning for drones...
Peeps - The New Fake Surveillance Cameras
via Boing Boing...
As if the Elf on a Shelf wasn't creepy enough, now they've put Peeps in the faux-surveillance game.
A new book and plush Peep sold together as Peep on a Perch is encouraging parents to start a new "Easter family tradition":
One Amazon reviewer (who gave the product five stars) writes, "The book encourages children to help, share and be kind as the Peep reports directly to the Easter Bunny." No, just no. more
As if the Elf on a Shelf wasn't creepy enough, now they've put Peeps in the faux-surveillance game.
A new book and plush Peep sold together as Peep on a Perch is encouraging parents to start a new "Easter family tradition":
The soft plush Easter Peep included in the set can be perched anywhere throughout the home. Children will be proud to have the Easter Peep watch them being good all day as they get ready for bed without making a fuss, help out around the house, and use good manners. And the more kindness the Easter Peep sees, the happier the Easter Peep gets! PEEPS® fans of all ages will love to make this a new Easter family tradition.
One Amazon reviewer (who gave the product five stars) writes, "The book encourages children to help, share and be kind as the Peep reports directly to the Easter Bunny." No, just no. more
Labels:
#weird,
animal,
dumb,
mores,
Ra-parents,
social engineering,
surveillance,
toy
Subscribe to:
Posts (Atom)