Sunday, August 10, 2008
SpyCam Story #455 - The IT Boy
The alleged victim is a Hialeah woman who told police she had a man perform some maintenance on her computer in early July. The woman told police she discovered the program on Monday along with about 20,000 photos of herself and her friends that had been made from the videos taken with the camera.
The man arrested in the case was identified as Craig Matthew Feigin, 23, who was charged with modifying computer data and disrupting or denying computer system services.
Once he was taken into custody, he quickly admitted to this crime, but also admitted to installing these programs on other computers as well. The Gainesville Florida Police believe there are eight or nine other victims. (more) (more)
Saturday, August 9, 2008
Bug Bites... with Bluetooth
One example of this are bugs which use off-the-shelf Bluetooth technology, like Bluegiga. Short range, but very effective.
Another example is second generation Zigbee which can transmit audio a much greater distance.
Both signals are digital. Both blend their transmissions into the sea of legitimate WiFi signals which surround us.
The cost for building these advanced bugging devices is less than $100. per bug.
Discovery requires the most advanced TSCM instrumentation... like what you will find only here.
Wednesday, August 6, 2008
Bugs don't grill people. People grill people.
The suggestion that Mary Lou McFate was a double agent is contained in a deposition filed as part of a contract dispute involving a security firm. (more)
The employee double-cross is an old and highly successful trick. Aside from the obvious, undercover employees also have the time and opportunity to plant bugs and wiretaps. If an employee-spy is discovered be sure to conduct a thorough bug sweep after they are fired. Better... Conducting thorough bug sweeps on a regular basis is a good way to uncover the undercover spy.
SpyCam Story #454 - "Baby let me be..."
Put a chain around my neck,
And lead me anywhere
Oh let me be
Your teddy bear.
Australia - A Rivervale man has admitted to secretly filming his female housemate with a camera concealed in a teddy bear in her bedroom.
Russell Christopher Hounslow, 22, pleaded guilty to one count each of using an optical device to record a private activity and possessing an obscene article in the Perth Magistrate's Court today.
Magistrate Steven Heath heard how on April 22 this year, Hounslow's flatmate found a covert camera in the toy, linked to a transmitter under her bed.
Police prosecutor Steve Mayne said the woman then found a similar transmitter on top of a video recorder in the house. (more)
"You talkin' to me?" - India
"You talkin' to me!" - China
The tiny listening devices, which are connected to a global positioning system able to track a cab's location by satellite, have been installed in almost all of the city's 70,000 taxis over the past three years, taxi drivers and industry officials say.
...those devices in Beijing taxis can be remotely activated without the driver's knowledge to eavesdrop on passengers, according to drivers and Yaxon Networks Co., a Chinese company that makes some of the systems used in Beijing. The machines can even remotely shut off engines. (more)
"No, I wasn't talkin' to you!" - New Zealand
Key says the latest recordings are not significant and he has accused Young Labour activists of bugging National's party conference. (more)
Monday, August 4, 2008
Yawn, and your laptop goes to sleep
Emotiv is currently fine-tuning a mind-reading headset called the Epoc, which should ship late this year. The $299 device purports to eavesdrop on your thoughts and translate them into computer instructions, so you can play a game or arrange photos without using your hands or speaking words.
Epoc "neuroheadset" has 16 sensors embedded in its crossbars that communicate wirelessly with your PC. There are no messy smears or tangles of wires. But in order to get correct readings, the sensors must make just the right contact with your scalp, which can take a fair amount of fiddling. And once the headset is in place, you have to be careful not to move around too much or the sensors will slip, preventing the computer from getting a clear signal. (more)
...and you were self-conscious about wearing your Bluetooth earpiece.
Seriously, you are witnessing the future of eavesdropping. Near-term... physical motion replacement, a boon to the seriously handicapped. Mid-term... Doors that auto-lock if the person approaching is of the wrong frame of mind. Far-term... TiVO your life whenever you want. I can't wait.
Friday, August 1, 2008
PI Toolkit Item #141 - Pocket Phone Bud-dy
Call on your Pocket Phone Bud-dy! An Olympus TP-7 headset.
Plug it into the ‘MIC’ jack of a recorder. Pop the bud in your ear and you are good-to-go.
Captures both sides of the conversation. Frequency range is 50 - 20,000 Hz. Plugs into a 3.5mm monaural jack and comes with two plug adaptors to convert either to a 3.5mm stereo plug or a 2.5mm monaural plug. (more)
Deep Packet Inspection - Computer Santa Claws
Creep'ed out yet?
If so, stop reading now.
"Anyone who uses the Internet needs to be aware of Deep Packet Inspection (DPI), its uses, and potential misuses... DPI is next-generation technology that’s capable of inspecting every byte of every packet that passes through the DPI device, that means packet headers, types of applications, and actual packet content... DPI allows people controlling the device to know everything, including the payload of each packet in the data stream. For example, if an unencrypted e-mail is scanned, the actual body of the e-mail can be reassembled and read.
What makes DPI all the more impressive is that the packet analysis happens in real time, with data stream throughput approaching 20-30 Gb. See where I’m going with this? With no loss of throughput, ISPs are able to insert these devices directly in their data streams, forcing all traffic to pass through the devices. Procera, Narus, and Ellacoya are front-runners in development of this technology, having placed equipment throughout the world.
DPI developers are adamant that the technology is benign and will create a better Internet. experience. However, privacy groups have two major concerns: little or no oversight and the potential for losing still more individual privacy.
An optimist would say that DPI will help enhance the experience, even producing ads that are relevant to each individual user. Whereas a pessimist would say it’s “big brother” technology that only benefits ISPs." (more)
A realist would say: "history tends to repeat" "mission creep" "if a technology can be abused..."
Wednesday, July 30, 2008
"Nailing bronze in the Tap-athlon...
...Sweden." Swedes may cherish openness and transparency, but not enough to accept a new law giving the government the right to snoop on all e-mails and phone calls crossing the country's borders. Outrage over the statute has led to 2 million protests — filed by e-mail... Swedish telecommunications group TeliaSonera AB and U.S.-based Google Inc. have called the law passed June 18 the most far-reaching eavesdropping plan in Europe, comparable to snooping powers authorized in the United States. The law narrowly passed Parliament in a 142-138 vote two weeks ago, despite protests that included demonstrators handing out copies of George Orwell's novel "1984" about a fictional futuristic police state. It gives Sweden's National Defense Radio Establishment, or FRA, the right to scan all international phone calls, e-mails and faxes without a court order as of January. (more)
"Nailing silver in the Tap-athlon...
The FBI has quietly built a sophisticated, point-and-click surveillance system that performs instant wiretaps on almost any communications device, according to nearly a thousand pages of restricted documents newly released under the Freedom of Information Act.
The surveillance system, called DCSNet, for Digital Collection System Network, connects FBI wiretapping rooms to switches controlled by traditional land-line operators, internet-telephony providers and cellular companies. It is far more intricately woven into the nation's telecom infrastructure than observers suspected...
DCS-3000 client, also known as Red Hook, handles pen-registers and trap-and-traces, a type of surveillance that collects signaling information...
DCS-6000, known as Digital Storm, captures and collects the content of phone calls and text messages for full wiretap orders.
A third, classified system, called DCS-5000, is used for wiretaps targeting spies or terrorists. (more)
"Nailing gold in the Tap-athlon...
"The Chinese Government has put in place a system to spy on and gather information about every guest at hotels where Olympic visitors are staying," Senator Sam Brownback said.
The conservative Republican from Kansas, citing hotel documents he received, added that journalists, athletes' families and others attending the Olympics next month "will be subjected to invasive intelligence-gathering" by China's Public Security Bureau.
He said the agency will be monitoring internet communications at the hotels.
The US senator made a similar charge a few months ago but said that since then, hotels have come forward with detailed information on the monitoring systems that have been required by Beijing.
Senator Brownback refused to identify the hotels, but said "several international hotel chains have confirmed the existence of this order".
Spokesmen at the Chinese Embassy in Washington were not available for comment. (more)
Monday, July 28, 2008
Builders uncover 'bugging device'
It is believed that Sean O'Farrell, an IRA member shot by the SAS in 1992, may have had some connection with the house.
Builders working at the house on Monday found a 60cm box-like object with batteries in a roof space. It is believed the device had been there since the early 1990s. (more)
Wi-Fi Wall to Block Outsiders
"Wireless security has largely been about applying wired techniques [like encryption and IPS]," said Joe Epstein, Meru's senior director of technology. "But most really damaging attacks have taken advantage of wireless signal bleed into areas like parking lots. Those [passive eavesdropping attacks] are the worst because they cannot be detected electronically. This is where RF Barrier comes in, to stop signals from reaching perimeter attackers." (more)
How RF Barrier Works
from their press release...
"RF Barrier (patent pending) is installed by mounting a Meru Networks wireless access point along the inside perimeter of a building, and an advanced external antenna outside the perimeter. RF Barrier technology inspects the traffic in real time to determine which part belongs to the WLAN (and is therefore designated as sensitive) and uses the external antenna to block outbound traffic at the RF layer. Would-be attackers are limited in their ability to see useful packet information about the internal network.
Because RF Barrier uses directional antennas and selective enforcement technology, it has no impact on signals within the building or from other networks. Internal clients connect normally, with enterprise access points serving them at full speed. RF Barrier can be turned on and off as needed, giving enterprises the flexibility to allow access at certain times of day while restricting it at others." In short, it drowns out the real signal."
The fine print... "Available beginning in September 2008 for networks using any Meru 802.11a/b/g access points."