The EU has negotiated a deal to allow the U.S. to spy on travelers coming from Europe or Britain, according to the Telegraph, and All Headline News. Details of the deal were made available through a Freedom of Information request to the Department of Transport.
Under the terms of the deal, the U.S. authorities can demand 34 different types of records for inspection including bank and credit card statements of travelers. They can also demand access to email messages sent or received through an email address given to airlines and complete flight history, including itineraries, religious, and dietary restrictions. (more)
Wednesday, January 3, 2007
Chinese Spies Difficult to Contain
A Cautionary Tale for US Business
Former CIA operative and later US Ambassador to China, James Lilley said the Chinese regime used very different techniques and were accordingly difficult to monitor.
Speaking on US news program, Frontline, Mr Lilley said that only a small percentage of Chinese spies did "clandestine work". The rest, he said, gathered enormous amounts of bite sized information which were then assembled into a bigger picture. ...
"Ultimately we weren't successful in identifying a lot of their activities and a lot of their targets," he said, adding that Chinese espionage was so subtle it was often difficult to "explain and justify budget for continuing operations."
Dan Stober, American author of a book on Chinese espionage, explained that Chinese agents target specific industries then work on building relationships with senior executives or experts in the field... (more)
q.v. A real-life example.
Former CIA operative and later US Ambassador to China, James Lilley said the Chinese regime used very different techniques and were accordingly difficult to monitor.
Speaking on US news program, Frontline, Mr Lilley said that only a small percentage of Chinese spies did "clandestine work". The rest, he said, gathered enormous amounts of bite sized information which were then assembled into a bigger picture. ...
"Ultimately we weren't successful in identifying a lot of their activities and a lot of their targets," he said, adding that Chinese espionage was so subtle it was often difficult to "explain and justify budget for continuing operations."
Dan Stober, American author of a book on Chinese espionage, explained that Chinese agents target specific industries then work on building relationships with senior executives or experts in the field... (more)
q.v. A real-life example.
GSM Cell Phone Encryption
I received a email from Silentel, s.r.o. in Slovakia with information about their novel new product designed to protect GSM cell phone calls against eavesdropping.
Interesting concept...
You provide the phone (any standard Smartphone using the Symbian OS). They provide the software and a hardware module with headset (pictured). The hardware connects to your cell phone using Bluetooth! Cool concept. Looks portable and covert.
Here is what they say...
"Silentel SecureCall is a system that encrypts your call through the GSM mobile phone and absolutely thwarts its tapping. Encryption uses the AES 256 algorithm which is currently the highest security standard worldwide. It is the system with the end-to-end security. The whole conversation from one user to the other is encrypted." (more)
Interesting concept...
You provide the phone (any standard Smartphone using the Symbian OS). They provide the software and a hardware module with headset (pictured). The hardware connects to your cell phone using Bluetooth! Cool concept. Looks portable and covert.
Here is what they say...
"Silentel SecureCall is a system that encrypts your call through the GSM mobile phone and absolutely thwarts its tapping. Encryption uses the AES 256 algorithm which is currently the highest security standard worldwide. It is the system with the end-to-end security. The whole conversation from one user to the other is encrypted." (more)
Tuesday, January 2, 2007
Police at risk of bugging charges
Australia - Detectives could face charges over the improper bugging of homes and telephones during a high-profile murder investigation when the results of a new police inquiry into the case are handed to Victoria's Office of Public Prosecutions early next year.
The new inquiry targeted Taskforce Kale, which investigated the deaths of transsexual prostitute Adele Bailey in 1978 and Jennifer Tanner, the sister-in-law of former police detective Denis Tanner, in 1984.
Police sources told The Australian that the brief of evidence to be handed to the OPP included details of whether police improperly obtained warrants for electronic surveillance on people including Mr Tanner and senior detective Gerry McHugh.
It was revealed yesterday that Victoria Police reportedly paid $400,000 in compensation to Mr McHugh, after he was wrongfully implicated in the murder investigation and his Mildura home was bugged. (more)
The new inquiry targeted Taskforce Kale, which investigated the deaths of transsexual prostitute Adele Bailey in 1978 and Jennifer Tanner, the sister-in-law of former police detective Denis Tanner, in 1984.
Police sources told The Australian that the brief of evidence to be handed to the OPP included details of whether police improperly obtained warrants for electronic surveillance on people including Mr Tanner and senior detective Gerry McHugh.
It was revealed yesterday that Victoria Police reportedly paid $400,000 in compensation to Mr McHugh, after he was wrongfully implicated in the murder investigation and his Mildura home was bugged. (more)
Comparative Wiretapping Book
On Wiretapping! (Teknik Dinlemeye Dair!)
by Ali Ozdogan, American University
This book has two parts. The first part covers the historical evolution of the American wiretapping legislation, summary of the American Wiretapping Criminal Procedure, the summary of Communication Assistance for Law Enforcement Act of 1994 (CALEA), and the privacy and property right problems in the CALEA and the corresponding suggestions.
The second part of the book covers analytical summary and comparative analyses of legal positions of wiretapping in Britain, Canada, Germany, France, Israel, and Turkey.
(Note that the manuscript is currently in Turkish. For the English version of the manuscript, please contact to author.)
by Ali Ozdogan, American University
This book has two parts. The first part covers the historical evolution of the American wiretapping legislation, summary of the American Wiretapping Criminal Procedure, the summary of Communication Assistance for Law Enforcement Act of 1994 (CALEA), and the privacy and property right problems in the CALEA and the corresponding suggestions.
The second part of the book covers analytical summary and comparative analyses of legal positions of wiretapping in Britain, Canada, Germany, France, Israel, and Turkey.
(Note that the manuscript is currently in Turkish. For the English version of the manuscript, please contact to author.)
Art Imitates Life... well, some of it.
"All My Children"
(an American daytime TV show)
Certain that Krystal is carrying Tad's baby, Dixie was desperate to find a despondent Tad. Zach and Zarf each accused the other of having killed a woman. Zach confided to Tad that he is tied to the murders somehow, and is convinced that the killer has knowledge of his past. After Josh managed to get DNA samples from Ryan and Emma, Kendall told him to run the test that could prove paternity. Aidan was alarmed when Di intended to make herself a target for the killer. Colby planted a spycam in Josh's room and, as part of her scheme to bring Erica and Jack back together, sent Erica a gift from "J." Coming: Kendall possesses life-altering news. (more)
(an American daytime TV show)
Certain that Krystal is carrying Tad's baby, Dixie was desperate to find a despondent Tad. Zach and Zarf each accused the other of having killed a woman. Zach confided to Tad that he is tied to the murders somehow, and is convinced that the killer has knowledge of his past. After Josh managed to get DNA samples from Ryan and Emma, Kendall told him to run the test that could prove paternity. Aidan was alarmed when Di intended to make herself a target for the killer. Colby planted a spycam in Josh's room and, as part of her scheme to bring Erica and Jack back together, sent Erica a gift from "J." Coming: Kendall possesses life-altering news. (more)
Teen Tap Takes Rap
A Singapore teenager has pleaded guilty to tapping into a neighbour's wireless internet network and will be sentenced next month, a newspaper has reported.
Seventeen-year-old Garyl Tan Jia Luo's offence falls under the Computer Misuse Act and carries a penalty of up to three years in jail and fines of up to $S10,000.
He is the first person in Singapore to be charged with this offence. (more)
Seventeen-year-old Garyl Tan Jia Luo's offence falls under the Computer Misuse Act and carries a penalty of up to three years in jail and fines of up to $S10,000.
He is the first person in Singapore to be charged with this offence. (more)
FBI Investigates Alleged Wiretapping
WV - The FBI is looking into whether wiretapping went on at Hinton City Hall.
State Police say they turned a tape over to the FBI. Hinton Police Chief Thomas Peal says the tape was found at the police station, which is inside City Hall.
The federal investigation is underway to find out how the tape got there and what is on it.
On Thursday, the Hinton City Council voted unanimously to call for an investigation into whether City Hall is being wiretapped. (more)
State Police say they turned a tape over to the FBI. Hinton Police Chief Thomas Peal says the tape was found at the police station, which is inside City Hall.
The federal investigation is underway to find out how the tape got there and what is on it.
On Thursday, the Hinton City Council voted unanimously to call for an investigation into whether City Hall is being wiretapped. (more)
Secure your business's future
Electronic debugging, once the exclusive realm of James Bond, is now done regularly.
"Industrial espionage is a particularly hot topic right now," said Kevin D. Murray, an IAPSC member and spokesman for the group. "About half the time when there has been an intrusion, it is a competitor. For the rest, it's done by people within the company, snooping for advantage or involved with internal politics."
Debugging is not an idle practice.
"If a company has business or trade secrets and there is litigation, a court will look to the firm's extended security measures as part of the proof that it is indeed a business secret," Murray said. "Security sweeps done on a regular basis will catch problems before they become problems." (more)
"Industrial espionage is a particularly hot topic right now," said Kevin D. Murray, an IAPSC member and spokesman for the group. "About half the time when there has been an intrusion, it is a competitor. For the rest, it's done by people within the company, snooping for advantage or involved with internal politics."
Debugging is not an idle practice.
"If a company has business or trade secrets and there is litigation, a court will look to the firm's extended security measures as part of the proof that it is indeed a business secret," Murray said. "Security sweeps done on a regular basis will catch problems before they become problems." (more)
Wednesday, December 20, 2006
Christmas Toys Which Teach (somesorta) Lessons
From the 'ol spymaster himself, Santa.
Spy Ear
Spy Watch
Spy Bug Toy
Spy Motion Alarm
Spy Voice Locator
Spy Kit
Spy Camera
Spy Belt
Spy Night Patrol Listener
Spy Launcher
Spy Night Writer
Spy Sun Glases
Spy Video Car
Spy Link Walkie Talkies
Spy Disappearing Ink
Spy Lazer Chase
Spy Listener
Spy Pen Writing Set
Spy Vision Scope
Spy Voice Scrambler
Spy Utility Belt
Spy Listener
Spy Super Sonic Listener
Spy Periscope
Spy Binoculars
Spy Disguise
Spy Tech Lab
Spy Voice Changer
Spy Tool Kit
Spy Board Game
Spy Secret Messenger Kit
Spy Truth Detector
Spy Voice Trap
Spy Night Vision Goggles
Spy Tracker
Spy Paper
Spy Metal Detector
and, for your protection, a Spy Detector
..."he sees you when you're sleeping, he knows"... (more)
Amateur Counterspy - Stop Eavesdropping Snooping Colleagues
"I used to have a work colleague who would annoyingly eavesdrop on private conversations. There wasn’t much you could do about it short of taking calls outside or whispering down the phone (which he used to do funnily enough). So I read with interest, about a technology solution to the problem, the Babble.
The babble works by detecting when you are on the phone and transmitting mumbled recordings of your voice. To other people in the office this will just sound like background noise and they shouldn’t be able to make out specific words in the babble that is masking your actual conversation." (more)
Amateur Spy
Ever did the dishes in the kitchen, looking out the window while wondering what was Mrs. Jones talking about to Mrs. Potts next door over the fence? Of course you don’t have super sensitive hearing like Daredevil or Superman, but you definitely know you want in on their hush-hush conversation. Is it something juicy about Mr. Jones and his supposed friendship with his secretary? Could she be gossiping about how you let Rover run free, performing his business on your neighbor’s lawn instead?
Put all those speculative thoughts to rest with the Spion Orbitor Electronic Listening Device. This unique device is capable of zooming in on conversations within a range of 300 feet without any obstacles in between, of course. (more)
Tuesday, December 19, 2006
Voyeur landlord suit to proceed
OH - A motion seeking judgment was filed Friday in a case in which several people are suing a deceased Gibsonburg landlord who was accused of secretly videotaping hundreds of people before he was discovered in 2002.
Samuel Bolotin, a Toledo attorney representing several of the plaintiffs in the case, said the motion is essentially asking the court to rule that James Rogers' estate is liable in the case. Rogers, a double amputee from the knees down, shot himself in the head with a handgun when police searched his apartment in early 2002.
The motion also shows that throughout the investigation, Gibsonburg police confiscated 237 video tapes and 83 pieces of electronic surveillance equipment.
In all, as many as 400 people may have been secretly videotaped during their time in those buildings, while a handful of victims are acting as representatives. (more)
Samuel Bolotin, a Toledo attorney representing several of the plaintiffs in the case, said the motion is essentially asking the court to rule that James Rogers' estate is liable in the case. Rogers, a double amputee from the knees down, shot himself in the head with a handgun when police searched his apartment in early 2002.
The motion also shows that throughout the investigation, Gibsonburg police confiscated 237 video tapes and 83 pieces of electronic surveillance equipment.
In all, as many as 400 people may have been secretly videotaped during their time in those buildings, while a handful of victims are acting as representatives. (more)
Sunday, December 17, 2006
Spy Game - Part 2
Kevin Murray, the president of Murray Associates, has been hired by six professional sports teams (three NFL teams) to secure facilities before big contract negotiations with players -- just to ensure the competition wasn't listening in.
"They brought us in early on because they knew the other side might not be all that ethical," said Murray, who wouldn't specify for which teams he had worked. "We'd go in and do preliminary checks of the area, showing them how to set up their perimeter access control. It's always been proactive reasons."
"Eavesdropping certainly has a long history in the sports world." (more)
"They brought us in early on because they knew the other side might not be all that ethical," said Murray, who wouldn't specify for which teams he had worked. "We'd go in and do preliminary checks of the area, showing them how to set up their perimeter access control. It's always been proactive reasons."
"Eavesdropping certainly has a long history in the sports world." (more)
Spy Game - Part 1
NFL coaching staffs sometimes have used extreme means to protect - and get - secrets.
When Saban's former boss, Jerry Glanville, told him to pass out those notebooks filled with strategy and terminology, Saban obliged as any good assistant coach would -- even if it didn't make much sense to him at the time.
"The first page of the notebook was from the 1973 Atlanta Falcons," Saban recalled. "It was a 15-year-old notebook."
Just another extreme -- and extremely bizarre -- example of the often unbelievable measures taken by some coaches to avoid falling victim of espionage in the NFL. Maybe Glanville was being paranoid back then. Or maybe he was just being smart. ...
Did the Dolphins commit an act of football treason last week when they listened to television broadcasts of past Patriots games so they could learn quarterback Tom Brady's calls at the line of scrimmage?
If only you knew.
"Just because you don't know something goes on," Saban said, "doesn't mean it doesn't go on." (more)
When Saban's former boss, Jerry Glanville, told him to pass out those notebooks filled with strategy and terminology, Saban obliged as any good assistant coach would -- even if it didn't make much sense to him at the time.
"The first page of the notebook was from the 1973 Atlanta Falcons," Saban recalled. "It was a 15-year-old notebook."
Just another extreme -- and extremely bizarre -- example of the often unbelievable measures taken by some coaches to avoid falling victim of espionage in the NFL. Maybe Glanville was being paranoid back then. Or maybe he was just being smart. ...
Did the Dolphins commit an act of football treason last week when they listened to television broadcasts of past Patriots games so they could learn quarterback Tom Brady's calls at the line of scrimmage?
If only you knew.
"Just because you don't know something goes on," Saban said, "doesn't mean it doesn't go on." (more)
Subscribe to:
Posts (Atom)