Punkt - The MP02 is significantly more complex than the MP01, so we have teamed up with BlackBerry to keep it secure. BlackBerry adds enhanced security to the device at the point of manufacture, which means the MP02 is hardened and highly secure. With BlackBerry’s integrated software components, the MP02 will be built with security from the start so you can trust that your data will be safe. more
The new Nokia 3310 2.4” polarized and curved screen
window makes for better readability in sunlight. Remember when you could leave the house without a charger? Well, with the Nokia 3310, you can. It comes with a long-lasting battery, so you can talk all day, or leave the phone on standby for up to a month. When needed, a Micro-USB port makes charging simple. more
The Light Phone 2 is a 4G LTE phone with a beautiful black &
white matte display. It's a more reliable, durable, and practical phone
than its predecessor. It brings a few essential tools to the Light
Phone, like messaging, an alarm clock, or a ride home, so you can leave
behind your smartphone more often... or for good. We call this
experience 'going light'. more (An indiegogo project at the moment.)
Another dumb phone, the Alba Flip fits right between the
borderline-brain-dead dumbness of the Light Phone and the
smarter-than-you’d-think trickery of the Nokia remakes. Plus, it's a
flip phone, which you've got to love. The Alba Flip is not designed to be a basic phone. Alba are a brand
designed for those who struggle with conventional mobile phones, either
through technophobia or because of visual impairments. more (Warning: 2G only which is becoming harder to rely upon as it is phasing out. In the U.S. that means T-Mobile 2G.)
And, the dumbest one I've ever used... The BM70 is the smallest phone which supports 4G network. With built-in
Micro SIM card slot, it can store 250 contact numbers. Not only a mini
cell phone, also a Bluetooth earphone more (Only $12.99, and yes it really works.) ~Kevin
If you don't go dumb, go smart, and smarter.
Wednesday, January 30, 2019
Shred Bin Security – Yours Stinks – Fix it for Free
Shred Bin Security — How to upgrade it... probably for free!
If you have a sizable contract with a shredding company, keep reading.
The Shred Bin Security Conundrum
Your organization realizes they need help getting rid of their wastepaper. Some of it can be recycled. Easy. There are plenty of recycling companies around. Some of it, however, contains sensitive information that must be destroyed.
So, you contact your local "I-Rip-A-Part" shredding company.
You are offered your choice of two shred bin styles, if you are lucky. The elegant particle board beige box, or the converted garbage can.
Both scream security joke. But hey, they only gave you two choices. So, you take what "I-Rip-A-Part" gives you. After all, it's their business. They know best.
Your employees may not laugh out loud, but they get the message. Management either doesn't know much about shred bin security, or they only care enough to make it look like they are doing their due diligence. The result...
Pretty soon these start popping up.
Who's laughing now?
Just the office snoops, competitive intelligence professionals, activists, news media, hackers, etc.
Let me provide some background before providing a workable solution. The crummy shred bin issue is a problem for most U.S. based organizations.
The problem has two roots:
Attacks include: unscrewing the cabinet, picking the cheap lock, sticking a $8.00 flexible grabber through the slot, bending the plastic lid back, or pulling the inner liner bag through the slot... more
If you have a sizable contract with a shredding company, keep reading.
The Shred Bin Security Conundrum
Your organization realizes they need help getting rid of their wastepaper. Some of it can be recycled. Easy. There are plenty of recycling companies around. Some of it, however, contains sensitive information that must be destroyed.
So, you contact your local "I-Rip-A-Part" shredding company.
You are offered your choice of two shred bin styles, if you are lucky. The elegant particle board beige box, or the converted garbage can.
Both scream security joke. But hey, they only gave you two choices. So, you take what "I-Rip-A-Part" gives you. After all, it's their business. They know best.
Your employees may not laugh out loud, but they get the message. Management either doesn't know much about shred bin security, or they only care enough to make it look like they are doing their due diligence. The result...
Pretty soon these start popping up.
Who's laughing now?
Just the office snoops, competitive intelligence professionals, activists, news media, hackers, etc.
Let me provide some background before providing a workable solution. The crummy shred bin issue is a problem for most U.S. based organizations.
The problem has two roots:
- A lack of understanding about information security on the part of the confidential information custodians.
- Shredding companies preying on this ignorance to maximize their profits. (Number one allows number two.)
Attacks include: unscrewing the cabinet, picking the cheap lock, sticking a $8.00 flexible grabber through the slot, bending the plastic lid back, or pulling the inner liner bag through the slot... more
Inside Information: Email Sales Pitches Some Spies Receive
Only the names have been changed to protect the reticent.
Intercept and capture any phone ANYWHERE in the world... Remotely!
Are your clients looking for a powerful solution to capture all app messages?
Our new monitoring technology for deployment on cellphones is now available.
This advanced method of interception does not require any infrastructure or tactical equipment to gain access to a target’s communication path.
The latest model, Octo+2, can target up to 10 phones at any one time and convert their microphones to a listening post for worldwide audio and video monitoring.
It’s now time to turn on the microphone on your target’s phone so you can listen from any where in the world!
.... Available to authorized agencies only.
Intercept and capture any phone ANYWHERE in the world... Remotely!
Are your clients looking for a powerful solution to capture all app messages?
Our new monitoring technology for deployment on cellphones is now available.
- Penetrate cellular defenses
- Generate effective access to Target devices
- Perform interception of their data communications
- Operate in 'new' locations, without requiring any integration
- Extract data from phones without any user interaction required
This advanced method of interception does not require any infrastructure or tactical equipment to gain access to a target’s communication path.
The latest model, Octo+2, can target up to 10 phones at any one time and convert their microphones to a listening post for worldwide audio and video monitoring.
It’s now time to turn on the microphone on your target’s phone so you can listen from any where in the world!
.... Available to authorized agencies only.
Tuesday, January 29, 2019
The Case of the Bumbling Spy
Just the interesting bits...
The case of the bumbling spy is the latest episode involving undercover agents, working for private intelligence firms or other clients, who adopt false identities to dig up compromising information about or elicit embarrassing statements from their targets...
The phenomenon of private spies drew widespread attention in 2017, when Black Cube, an Israeli private intelligence firm, was found to have used undercover agents to approach women who had accused Harvey Weinstein, the Hollywood producer, of sexual misconduct...
At their lunch meeting, he read questions from cue cards of three colors that seemed to be organized by topic, explaining that at his age he needed them to keep the details straight. He held the cards in one hand, while in the other he held and awkwardly pointed a pen that appeared to contain a video recorder, Mr. Scott-Railton said. (John Scott-Railton, a senior researcher at Citizen Lab
In a phone conversation, he had told Mr. Scott-Railton that he had a son about his age. When they met, he said the child was a daughter. more
The point is obvious. Nine out of ten private investigators did not graduate in the top 10% of their class. However, there are plenty out their who did, and they can pretext you and bug your office quicker than a magician can make a coin disappear.
The case of the bumbling spy is the latest episode involving undercover agents, working for private intelligence firms or other clients, who adopt false identities to dig up compromising information about or elicit embarrassing statements from their targets...
The phenomenon of private spies drew widespread attention in 2017, when Black Cube, an Israeli private intelligence firm, was found to have used undercover agents to approach women who had accused Harvey Weinstein, the Hollywood producer, of sexual misconduct...
At their lunch meeting, he read questions from cue cards of three colors that seemed to be organized by topic, explaining that at his age he needed them to keep the details straight. He held the cards in one hand, while in the other he held and awkwardly pointed a pen that appeared to contain a video recorder, Mr. Scott-Railton said. (John Scott-Railton, a senior researcher at Citizen Lab
In a phone conversation, he had told Mr. Scott-Railton that he had a son about his age. When they met, he said the child was a daughter. more
The point is obvious. Nine out of ten private investigators did not graduate in the top 10% of their class. However, there are plenty out their who did, and they can pretext you and bug your office quicker than a magician can make a coin disappear.
Labels:
#espionage,
#spycam,
business,
cautionary tale,
PI,
scam
FaceTime Bug Lets Callers Hear You Before You Answer
Users have discovered a bug in Apple's FaceTime video-calling application that allows you to hear audio from a person you're calling before they accept the call—a critical bug that could potentially be used as a tool by malicious users to invade the privacy of others.
Apple: "We're aware of this issue, and we have identified a fix that will be released in a software update later this week." An hour or two after this post went live, Apple disabled Group FaceTime to mitigate the bug.
The bug requires you to perform a few actions while the phone is ringing, so if the person on the other end picks up quickly, they might not be affected. Knowledge of how to use the bug is already widespread.
The steps include:
Updates: What we have also found is that if the person presses the Power button from the Lock screen, their video is also sent to the caller — unbeknownst to them. In this situation, the receiver can now hear your own audio, but they do not know they are transmitting their audio and video back to you. From their perspective, all they can see is accept and decline. (Another update: It seems there are other ways of triggering the video feed eavesdrop too.) more
Temporary fix. General smartphone security tips.
Apple: "We're aware of this issue, and we have identified a fix that will be released in a software update later this week." An hour or two after this post went live, Apple disabled Group FaceTime to mitigate the bug.
The bug requires you to perform a few actions while the phone is ringing, so if the person on the other end picks up quickly, they might not be affected. Knowledge of how to use the bug is already widespread.
The steps include:
- Tap on a contact on your iPhone to start a FaceTime call with them.
- Swipe up and tap "Add Person."
- Instead of adding a new person, enter your own number and add yourself as another participant in the Group FaceTime call. more
Updates: What we have also found is that if the person presses the Power button from the Lock screen, their video is also sent to the caller — unbeknownst to them. In this situation, the receiver can now hear your own audio, but they do not know they are transmitting their audio and video back to you. From their perspective, all they can see is accept and decline. (Another update: It seems there are other ways of triggering the video feed eavesdrop too.) more
Temporary fix. General smartphone security tips.
Friday, January 25, 2019
Hackers Access Family Security Cameras - Then Yell and Curse
WA - If you have security cameras connected to the internet inside your home, you’re going to want to play close attention to this story. A local family says someone hacked their account and watched them for weeks inside their home; even yelling and cursing at their children...
The couple says things got really creepy this week, while Abby and the children sat here in the living room. She says could hear multiple male voices. At first, she thought it was Conrado just checking in via the security cameras.
“And then they started cussing...
Abby wanted proof. “I grabbed a chair and I was doing this, but my face was back here and my hand was right here because I didn’t want to look at them. They were like stop recording us! What the ‘F’ are you doing?...
Abby and Conrado called Auburn Police, who confirm they are investigating. more
The couple says things got really creepy this week, while Abby and the children sat here in the living room. She says could hear multiple male voices. At first, she thought it was Conrado just checking in via the security cameras.
“And then they started cussing...
Abby wanted proof. “I grabbed a chair and I was doing this, but my face was back here and my hand was right here because I didn’t want to look at them. They were like stop recording us! What the ‘F’ are you doing?...
Abby and Conrado called Auburn Police, who confirm they are investigating. more
Eyeglasses and Earbuds for Real Spies
Misumi Electronics Corp. is a prestigious name in the fields of Spy applications, Surveillance system, Industrial inspection, and Medical application. They specialize in making modules and finished products, including camera modules, transmitters, UVC, USB capture cards and grabbers, and accept customized camera request as well.
The example below shows off the high-resolution of their cameras, including the ability to read computer screens and instantly transmit the video elsewhere. A spy wearing these eyeglasses and earbuds can see in three directions at once, in high-definition, without anyone knowing!
Their tiny, high-quality, HD video cameras have been mass produced for years. Should you come across one, keep searching. There is likely more to find. more
The example below shows off the high-resolution of their cameras, including the ability to read computer screens and instantly transmit the video elsewhere. A spy wearing these eyeglasses and earbuds can see in three directions at once, in high-definition, without anyone knowing!
Their tiny, high-quality, HD video cameras have been mass produced for years. Should you come across one, keep searching. There is likely more to find. more
Click to enlarge. |
Cybercriminals Home in on Ultra-High Net Worth Individuals
Research shows that better corporate security has resulted in some hackers shifting their sights to the estates and businesses of wealthy families.
Threat intelligence experts and research groups have seen a shift of cybercriminals increasingly targeting ultra-high net worth (UHNW) individuals and their family businesses...
More than half the attacks were viewed as malicious. And, nearly one-third came from an inside threat, such as an employee intentionally leaking confidential information. more
Congratulations to the corporations who have instituted better information security practices. Their elevated security includes periodic checks for electronic surveillance, or Technical Surveillance Countermeasures (TSCM).
These checks are absolutely necessary at family compounds and home offices. There, guests, staff, and tradespeople have great opportunities to plant audio, video and data electronic surveillance devices.
Threat intelligence experts and research groups have seen a shift of cybercriminals increasingly targeting ultra-high net worth (UHNW) individuals and their family businesses...
More than half the attacks were viewed as malicious. And, nearly one-third came from an inside threat, such as an employee intentionally leaking confidential information. more
Congratulations to the corporations who have instituted better information security practices. Their elevated security includes periodic checks for electronic surveillance, or Technical Surveillance Countermeasures (TSCM).
These checks are absolutely necessary at family compounds and home offices. There, guests, staff, and tradespeople have great opportunities to plant audio, video and data electronic surveillance devices.
Wednesday, January 23, 2019
Apple AirPods Live Listen can Eavesdrop
A useful feature of Apple’s wireless AirPods, designed to help hearing impaired, can also be used to engage in eavesdropping...
The feature Live Listen was released with iOS 12, and according to Apple, can be used with AirPods to turn your iPhone iPad, or iPod touch into a microphone - which can then send sound to your AirPods.
“Live Listen can help you hear a conversation in a noisy area or even hear someone speaking across the room,” the website states.
However, as some users have pointed out...
“If you have AirPods, you can press ‘Live Listen’ to ‘On’ and leave your phone in the room with someone and you can hear what they are saying, thank me later,” one person wrote on Twitter.
People are suggesting it will be a game-changer when it comes to eavesdropping...
Another said: “Literally just bought AirPods to spy on people.” more
The feature Live Listen was released with iOS 12, and according to Apple, can be used with AirPods to turn your iPhone iPad, or iPod touch into a microphone - which can then send sound to your AirPods.
“Live Listen can help you hear a conversation in a noisy area or even hear someone speaking across the room,” the website states.
However, as some users have pointed out...
“If you have AirPods, you can press ‘Live Listen’ to ‘On’ and leave your phone in the room with someone and you can hear what they are saying, thank me later,” one person wrote on Twitter.
People are suggesting it will be a game-changer when it comes to eavesdropping...
Another said: “Literally just bought AirPods to spy on people.” more
Australia's New Encryption Law May Rock the World - bad'day mate
A new law in Australia gives law enforcement authorities the power to compel tech-industry giants like Apple to create tools that would circumvent the encryption built into their products.
The law, the Telecommunications and Other Legislation Amendment (Assistance and Access) Act 2018, applies only to tech products used or sold in Australia. But its impact could be global: If Apple were to build a so-called back door for iPhones sold in Australia, the authorities in other countries, including the United States, could force the company to use that same tool to assist their investigations. more
The law, the Telecommunications and Other Legislation Amendment (Assistance and Access) Act 2018, applies only to tech products used or sold in Australia. But its impact could be global: If Apple were to build a so-called back door for iPhones sold in Australia, the authorities in other countries, including the United States, could force the company to use that same tool to assist their investigations. more
Pinkerton Detectives Still Exist
The security agents, who gained fame as Old West law enforcers, are still around—and they’re not happy about being antagonists in ‘Red Dead Redemption II’
Pinkerton’s National Detective Agency, formed in the 1800s to help law enforcement track down criminals, once sparred with the outlaw Jesse James. It later became entangled in the notorious labor disputes of industrial America.
In the hit videogame “Red Dead Redemption II,” players belong to a gang of bandits in the Old West in 1899 who spend a good deal of time offing Pinkerton agents, known simply as Pinkertons.
The plot twist comes in real life: Pinkerton still exists today as Pinkerton Consulting & Investigations Inc., a specialist in corporate security and risk management—and it’s tired of being the bad guy.
Pinkerton, now owned by the Swedish security firm Securitas AB, hoped a letter sent last month to Take-Two Interactive Software Inc. would persuade the game publisher to do right by the Pinkerton name. The letter included a demand for compensation in the form of a lump sum or “an appreciable percentage of each game sold.” more
To anyone who worked with me at Pinkertons, always feel free to say hello.
Pinkerton’s National Detective Agency, formed in the 1800s to help law enforcement track down criminals, once sparred with the outlaw Jesse James. It later became entangled in the notorious labor disputes of industrial America.
In the hit videogame “Red Dead Redemption II,” players belong to a gang of bandits in the Old West in 1899 who spend a good deal of time offing Pinkerton agents, known simply as Pinkertons.
The plot twist comes in real life: Pinkerton still exists today as Pinkerton Consulting & Investigations Inc., a specialist in corporate security and risk management—and it’s tired of being the bad guy.
Pinkerton, now owned by the Swedish security firm Securitas AB, hoped a letter sent last month to Take-Two Interactive Software Inc. would persuade the game publisher to do right by the Pinkerton name. The letter included a demand for compensation in the form of a lump sum or “an appreciable percentage of each game sold.” more
To anyone who worked with me at Pinkertons, always feel free to say hello.
Tuesday, January 22, 2019
Tony Mendez - CIA Hero - Dead at 78
Mr. Mendez’s artistic skills, which included hand-eye coordination that enabled him to look at something and copy it precisely, suited the agency’s need for a counterfeiter and forger.
And so began a career that in time would lead Mr. Mendez, who died on Saturday at 78, to orchestrate one of the most audacious covert operations in C.I.A. history: the rescue of six American diplomats from a tumultuous Iran after Islamic militants had stormed the United States Embassy in Tehran on Nov. 4, 1979. The militants held 52 Americans hostage for 444 days, a humiliating foreign policy debacle that would severely undermine Jimmy Carter’s presidency.
The operation, which took place in January 1980, was kept secret until 1997. It was celebrated in a heart-pounding movie, “Argo,” released in 2012, with Ben Affleck (who also directed) portraying Mr. Mendez. The movie won three Oscars, including for best picture, though some critics took it to task for underplaying the vital role of the Canadians in the operation and for inventing certain scenes, such as a chase on an airport tarmac at the end. more
And so began a career that in time would lead Mr. Mendez, who died on Saturday at 78, to orchestrate one of the most audacious covert operations in C.I.A. history: the rescue of six American diplomats from a tumultuous Iran after Islamic militants had stormed the United States Embassy in Tehran on Nov. 4, 1979. The militants held 52 Americans hostage for 444 days, a humiliating foreign policy debacle that would severely undermine Jimmy Carter’s presidency.
The operation, which took place in January 1980, was kept secret until 1997. It was celebrated in a heart-pounding movie, “Argo,” released in 2012, with Ben Affleck (who also directed) portraying Mr. Mendez. The movie won three Oscars, including for best picture, though some critics took it to task for underplaying the vital role of the Canadians in the operation and for inventing certain scenes, such as a chase on an airport tarmac at the end. more
Monday, January 21, 2019
This Month in Video Voyeurism
The following are some of the cases reported by the news media during the last 30 days. Consider them to be the failures. The tip of the iceberg. The people who got caught. Most people don't get caught.
They are posted here periodically to raise awareness of the magnitude of the problem, and the variety of places where this occurs. Fortunately, anyone with a little awareness training can protect themselves.
NY - A former New York nanny is fighting back after she says she was surreptitiously recorded in a bathroom owned by a powerful and well-connected couple, the New York Post reports. Vanessa Rivas alleges she found a spycam inside the guest bathroom of the apartment where she used to work as a nanny, a place where she often showered.
UK - Airbnb guest finds surveillance camera inside his rented apartment but is told he ‘consented’ to it as it appeared in photos of the property...According to Airbnb's Terms and Conditions, a surveillance device must be disclosed. more
UK - A former footballer has been charged with five counts of voyeurism and arson...cameras were allegedly found in the female staff changing room at HMP YOI Portland where Browne worked as a guard and fitness instructor. Further voyeurism charges have since been brought against Browne relating to incidents in Weymouth, Dorchester and Poole. more
OR - An Oregon State University employee is facing criminal charges...after being accused of videotaping several unsuspecting men inside the stall in a Valley Library restroom. more
OH - A man secretly recorded a woman showering in a Norwood home, according to court records...He allegedly attempted to hide a cell phone that was recording in a wopse of towels in a bathroom. "The recording device captured the victim in a state of nudity as well as the identity of Anthony McDaniel placing the device and attempting to hide it," police records state. It is unclear how the phone was discovered. more
UK - Britain's Parliament has approved a law that will make it illegal to take so-called "upskirting" photos...Gina Martin, 26, campaigned to ban upskirting after she chased down a man who had placed a phone between her legs and taken a picture while she was at a crowded music festival in London's Hyde Park in 2017. more
AR - A man has been found guilty of video voyeurism in Washington County Circuit Court...found guilty on multiple counts of video voyeurism and was sentenced to four years in prison, and two years suspended...Godfirnon hid an iPhone with the "Pocket Spy" app enabled in a restroom where he was installing light fixtures. more
S. Korea - A four-year jail sentence given to the co-founder of a South Korean porn website that hosted thousands of videos of women filmed secretly was criticized by campaigners on Thursday for being too light to be a deterrent. more
AR - The Benton Police Department arrested 28-year-old Matthew McCoy, of Rison, without incident Monday, on 30 counts of video voyeurism and two counts of computer child pornography.
All charges stem from a camera discovered in a restroom at a Benton residence. more
WA - A former volunteer coach and athletic director at the Puget Sound Adventist Academy has been sentenced to 10 months in jail after he pleaded guilty to voyeurism...students who were using an athletic department tablet found a video of two female students changing into the basketball uniforms, police said...The volunteer coach was identified because he also recorded himself and could be seen adjusting the camera angle and turning the video on and off. more
UT - Foster parent charged with 100 counts...state police first became aware of the situation and ordered a search warrant after one of the foster children, a 15-year-old, called his sister and told her he found a digital camera device hidden inside a candle holder in the bathroom he showered in. more
Ireland - One of the first sex offenders to be detected in Northern Ireland by the National Crime Agency has appeared in court charged with breaching the terms of a Sexual Offenses Prevention Order...The voyeurism matters came to light when Dynes was caught on his own recording equipment while installing it in a bedroom, which then filmed a female carrying out private act. more
Canada - Former teacher and voyeuristic vice-principal Brent Hachborn’s teaching licence has been revoked by the Ontario College of Teachers. Hachborn, who was convicted of nine counts of voyeurism after it was learned he had been hiding cameras in the false ceiling of a school bathroom... more
KY - A man is accused of spying on a woman and recording her as she was getting out of the shower...According to his arrest citation, Sales-Molina hid a cell phone in a laundry basket. The phone recorded the woman in the nude after she had taken a shower. more
OH - Cleveland County man accused of filming girls on his boat is expected in court Friday...Detectives said Hillard chiseled a hole at the bottom of the door to sneak in a camera to watch... more
NM - Santos Leon-Pereira was sentenced 94 days in jail for placing recording devices in dressing rooms at stores at Coronado Center...According to court documents, two phones were found in a dressing room at Forever 21, both with the video cameras rolling. more
KY - An Owensboro electrician is accused of voyeurism. Officers were notified on Tuesday of a small camera and memory card installed inside a home where Ryan Lloyd had been working.
They are posted here periodically to raise awareness of the magnitude of the problem, and the variety of places where this occurs. Fortunately, anyone with a little awareness training can protect themselves.
NY - A former New York nanny is fighting back after she says she was surreptitiously recorded in a bathroom owned by a powerful and well-connected couple, the New York Post reports. Vanessa Rivas alleges she found a spycam inside the guest bathroom of the apartment where she used to work as a nanny, a place where she often showered.
UK - Airbnb guest finds surveillance camera inside his rented apartment but is told he ‘consented’ to it as it appeared in photos of the property...According to Airbnb's Terms and Conditions, a surveillance device must be disclosed. more
UK - A former footballer has been charged with five counts of voyeurism and arson...cameras were allegedly found in the female staff changing room at HMP YOI Portland where Browne worked as a guard and fitness instructor. Further voyeurism charges have since been brought against Browne relating to incidents in Weymouth, Dorchester and Poole. more
OR - An Oregon State University employee is facing criminal charges...after being accused of videotaping several unsuspecting men inside the stall in a Valley Library restroom. more
OH - A man secretly recorded a woman showering in a Norwood home, according to court records...He allegedly attempted to hide a cell phone that was recording in a wopse of towels in a bathroom. "The recording device captured the victim in a state of nudity as well as the identity of Anthony McDaniel placing the device and attempting to hide it," police records state. It is unclear how the phone was discovered. more
UK - Britain's Parliament has approved a law that will make it illegal to take so-called "upskirting" photos...Gina Martin, 26, campaigned to ban upskirting after she chased down a man who had placed a phone between her legs and taken a picture while she was at a crowded music festival in London's Hyde Park in 2017. more
AR - A man has been found guilty of video voyeurism in Washington County Circuit Court...found guilty on multiple counts of video voyeurism and was sentenced to four years in prison, and two years suspended...Godfirnon hid an iPhone with the "Pocket Spy" app enabled in a restroom where he was installing light fixtures. more
S. Korea - A four-year jail sentence given to the co-founder of a South Korean porn website that hosted thousands of videos of women filmed secretly was criticized by campaigners on Thursday for being too light to be a deterrent. more
AR - The Benton Police Department arrested 28-year-old Matthew McCoy, of Rison, without incident Monday, on 30 counts of video voyeurism and two counts of computer child pornography.
All charges stem from a camera discovered in a restroom at a Benton residence. more
WA - A former volunteer coach and athletic director at the Puget Sound Adventist Academy has been sentenced to 10 months in jail after he pleaded guilty to voyeurism...students who were using an athletic department tablet found a video of two female students changing into the basketball uniforms, police said...The volunteer coach was identified because he also recorded himself and could be seen adjusting the camera angle and turning the video on and off. more
UT - Foster parent charged with 100 counts...state police first became aware of the situation and ordered a search warrant after one of the foster children, a 15-year-old, called his sister and told her he found a digital camera device hidden inside a candle holder in the bathroom he showered in. more
Ireland - One of the first sex offenders to be detected in Northern Ireland by the National Crime Agency has appeared in court charged with breaching the terms of a Sexual Offenses Prevention Order...The voyeurism matters came to light when Dynes was caught on his own recording equipment while installing it in a bedroom, which then filmed a female carrying out private act. more
Canada - Former teacher and voyeuristic vice-principal Brent Hachborn’s teaching licence has been revoked by the Ontario College of Teachers. Hachborn, who was convicted of nine counts of voyeurism after it was learned he had been hiding cameras in the false ceiling of a school bathroom... more
KY - A man is accused of spying on a woman and recording her as she was getting out of the shower...According to his arrest citation, Sales-Molina hid a cell phone in a laundry basket. The phone recorded the woman in the nude after she had taken a shower. more
OH - Cleveland County man accused of filming girls on his boat is expected in court Friday...Detectives said Hillard chiseled a hole at the bottom of the door to sneak in a camera to watch... more
NM - Santos Leon-Pereira was sentenced 94 days in jail for placing recording devices in dressing rooms at stores at Coronado Center...According to court documents, two phones were found in a dressing room at Forever 21, both with the video cameras rolling. more
KY - An Owensboro electrician is accused of voyeurism. Officers were notified on Tuesday of a small camera and memory card installed inside a home where Ryan Lloyd had been working.
The
victim told police that Lloyd was doing electrical work in their
bathroom...The victim found the camera
earlier this week...The memory card obtained nude images of the victim's daughter. more
IN - A Gary middle school employee was fired Monday after he was arrested and charged with child pornography and voyeurism...police said the suspect's statements led them to obtain a search warrant for Saldana's home where authorities found photographs, video files, a hidden pinhole camera and photo negatives they said Saldana appeared to be burning when they arrived Saturday. more
IN - A Gary middle school employee was fired Monday after he was arrested and charged with child pornography and voyeurism...police said the suspect's statements led them to obtain a search warrant for Saldana's home where authorities found photographs, video files, a hidden pinhole camera and photo negatives they said Saldana appeared to be burning when they arrived Saturday. more
Questions We Get - Cell Phone Location Data
"I want to know is whether your location can be tracked if your location based services are turned off?" - from an attorney who reported on the selling of cell phone location data to bounty hunters. more
Good question. The answer is yes.
The information the phone companies are selling is gathered from the phone's administration communications with the cell sites, "Hi. I'm here. I can accept a call." The signal is picked up from multiple cell sites and is evaluated to determine which site is receiving the strongest signal.
Location is determined by triangulation. While not precise, it can get you into the neighborhood.
If they were using the phone's GPS-based location services the location accuracy would be within a few yards. ~Kevin
Good question. The answer is yes.
The information the phone companies are selling is gathered from the phone's administration communications with the cell sites, "Hi. I'm here. I can accept a call." The signal is picked up from multiple cell sites and is evaluated to determine which site is receiving the strongest signal.
Location is determined by triangulation. While not precise, it can get you into the neighborhood.
If they were using the phone's GPS-based location services the location accuracy would be within a few yards. ~Kevin
Labels:
advice,
cell phone,
cybersecurity,
detection,
GPS,
privacy,
tracking
Friday, January 18, 2019
Counterespionage Checklist: How to Be Safe on the Internet
An open source checklist of resources designed to improve your online privacy and security. Check things off to keep track as you go. more Scott Adams
Subscribe to:
Posts (Atom)