Australia - Private companies must institute a classification system similar to the one used by spies and the military, assigning confidential, secret or top-secret status to information rather than assuming computer networks can be defended from increasingly sophisticated cyber attacks.
The former head of the Defence Signals Directorate's highly secretive Cyber Security Operations Centre, Tim Scully, has called for a reorganisation of cyber security, saying the present approach focuses too much on protecting networks and not the information in them.
He said the private sector must begin to think like government and create a classification system that reflects the value and sensitivity of the information in its possession.
From there, risk assessments can be performed about how, if at all, the most sensitive information is conveyed across the internet. Under the new national security classification system information is marked protected, confidential, secret or top-secret.
The most sensitive information is then "air-gapped" - or stored on a closed network not accessible via the internet. (more) (see also) (see also)
Thursday, June 7, 2012
Russian Wiretaps Double
Russia - Legal wiretaps have almost doubled in Russia over the past five years due to lack of external control over the secret services, according to official and publicly available statistics unearthed by a leading Russian security analyst.
“This is both a political and a bureaucratic story,” said Andrei Soldatov, editor-in-chief of Agentura.ru, an online secret services think-tank. He added that the services often abuse their powers, including for illegal monitoring of political opposition.
The courts issued 466,152 sanctions for telephone wiretaps and inspection of regular and electronic mail in 2011, according to the website of the Judicial Department at the Russian Supreme Court.
The figure stood at 265,937 in 2007, the department said.
Only 3,554 wiretap requests, or under 1 percent of the total, were rejected in 2011, compared to 4,246 in 2007. (more)
“This is both a political and a bureaucratic story,” said Andrei Soldatov, editor-in-chief of Agentura.ru, an online secret services think-tank. He added that the services often abuse their powers, including for illegal monitoring of political opposition.
The courts issued 466,152 sanctions for telephone wiretaps and inspection of regular and electronic mail in 2011, according to the website of the Judicial Department at the Russian Supreme Court.
The figure stood at 265,937 in 2007, the department said.
Only 3,554 wiretap requests, or under 1 percent of the total, were rejected in 2011, compared to 4,246 in 2007. (more)
Sunday, June 3, 2012
More Than A Feeling - Boston Rocked by SpyCam Death
Boston singer Brad Delp installed a hidden camera in his fiancee’s sister’s bedroom – and killed himself nine days after he was caught.
Evidence given in the court case between Boston mainman Tom Scholz and a newspaper revealed how Delp, who committed suicide in 2007, was ashamed and apologetic after his spy device was found.
Events came to light as part of Scholz’s claim that the Boston Herald defamed him by suggesting he was to blame for his bandmate’s death. (more)
Evidence given in the court case between Boston mainman Tom Scholz and a newspaper revealed how Delp, who committed suicide in 2007, was ashamed and apologetic after his spy device was found.
Events came to light as part of Scholz’s claim that the Boston Herald defamed him by suggesting he was to blame for his bandmate’s death. (more)
Saturday, June 2, 2012
One Day - Two Headlines - A Salute to US Spies
"China 'arrests high-level US spy' in Hong Kong" (more)
"Retired Russian colonel has been convicted and sentenced on charges of spying for the United States" (more)
Friday, June 1, 2012
"Be Sociable"
Banners signed by a cult-like Mexican drug gang say that cartel members
launched firebombing attacks on a PepsiCo. subsidiary because they
believe the snack company let law-enforcement agents use its trucks for
surveillance. (more)
Thursday, May 31, 2012
$71 million divorce - Electronic Bugging Allegations
The extraordinarily bitter break up of Silicon Valley
power player Susan Decker, 49, and Michael Dovey, 52, led to the couple
hurling allegations of infidelity, drug use and electronic bugging at each other.
Miss
Decker was accused of extramarital affairs, drug use, and bugging the Laguna
Beach home to spy on him.
Mr Dovey's lawyers also issued subpoenas to Yahoo demanding emails and
records, and the company's head of corporate security was among witnesses
due to give evidence in court over the bugging claims. (more)
Wednesday, May 30, 2012
Security Quote of the Month
"We're going to double down on secrecy..."
Tim Cook, Apple, CEO (more)
Meanwhile...
“Before, criminals used to steal money to become rich, but now they have realized that they can be rich by stealing corporate information.”
These words from a U.S. Treasury Department official send a chilling reminder to industry about the growing threat – and cost – of trade secret misappropriation...
Today, trade secret theft costs multinational corporations billions of dollars each year – and no company is immune. Any company with valuable commercial information, processes or intellectual property is at risk; and global companies from all sectors continue to experience significant economic losses not only from trade secret theft, but also from piracy, counterfeit products and corruption. (more)
What's your policy?
Sunday, May 27, 2012
Could this mean that you will never again hear a cellphone go off at a concert?
French researchers have developed wallpaper that would block cellular and wi-fi signals while letting through AM/FM radio waves and emergency transmissions.
Developed by engineers at the Grenoble Institute of Technology and the Centre Technique du Papier—and making use of a conductive ink containing silver particles (it’s a passive block, not a jamming system)—the wallpaper will be marketed to people concerned about outsiders’ snooping on their private networks as well as those who, for health reasons, simply want to shield themselves from as many electromagnetic waves as possible. Researchers say the cost of the product will be in line with what people pay for mid-priced purely decorative wallpaper.
Windows remain a challenge, but even without covering them (and transparent filters do exist), users will enjoy substantial increases in privacy, the researchers say. (more)
Tip: Need a compact VHF/UHF TV antenna? Check out Mohu Leaf, another invention which incorporates fractals into antenna design. We're not entirely sure why, but fractal antennas work. Trust nature's designs.
Click to enlarge. |
Windows remain a challenge, but even without covering them (and transparent filters do exist), users will enjoy substantial increases in privacy, the researchers say. (more)
Labels:
cell phone,
counterespionage,
Hack,
privacy,
product,
Tips,
Wi-Fi,
wireless
The Cold War Has Veterans Too, Remember. A Spy Talks.
IL - Blindfolded, Richard Rogala didn’t know what was going on when the USS Pueblo was captured by the North Koreans in 1968.
The former Niles resident along with Werner Juretzko, of the Northwest suburbs, shared their experiences with an attentive audience May 20 at Niles Public Library.
Rogala was a storekeeper aboard the USS Pueblo and remained a prisoner for 11 months. Juretzko was imprisoned in East Germany for six years.
The Cold War was a state of military and political tension between the United States and the Soviet Union in the decades following World War II. The war never blossomed into full-scale military action, but was marked by espionage, lasting from 1945 to 1991...
Juretzko worked as a G-2 undercover U.S. Army political operative. In 1955, he was captured by the East German secret police, called the Stasi.
Juretzko is the author of “Years Without Hope,” which tells the stories of his espionage work during the Cold War. He showed audience members images of a prison cell and Guillotine that was used to kill Western prisoners. He said everyone left prison either in a horizontal or vertical position.
“I was fortunate I left in a vertical position,” Juretzko said. (more) Thank you, Sirs.
The former Niles resident along with Werner Juretzko, of the Northwest suburbs, shared their experiences with an attentive audience May 20 at Niles Public Library.
Rogala was a storekeeper aboard the USS Pueblo and remained a prisoner for 11 months. Juretzko was imprisoned in East Germany for six years.
The Cold War was a state of military and political tension between the United States and the Soviet Union in the decades following World War II. The war never blossomed into full-scale military action, but was marked by espionage, lasting from 1945 to 1991...
Juretzko worked as a G-2 undercover U.S. Army political operative. In 1955, he was captured by the East German secret police, called the Stasi.
Juretzko is the author of “Years Without Hope,” which tells the stories of his espionage work during the Cold War. He showed audience members images of a prison cell and Guillotine that was used to kill Western prisoners. He said everyone left prison either in a horizontal or vertical position.
“I was fortunate I left in a vertical position,” Juretzko said. (more) Thank you, Sirs.
Saturday, May 26, 2012
Holy Info Leak. Pope's Batman Arrested.
Vatican magistrates
formally charged Pope Benedict's butler with illegal possession of
secret documents on Saturday and said a wider investigation would take
place to see if he had any accomplices who helped him leak them.
Paolo Gabriele is suspected of
leaking highly sensitive documents, some alleging cronyism and
corruption in Vatican contracts, in a scandal which has come to be known
as "Vatileaks"...
Vatican
magistrates formally charged Pope Benedict's butler with illegal
possession of secret documents on Saturday and said a wider
investigation would take place to see if he had any accomplices who
helped him leak them.
Because the Vatican has no jail, Gabriele was
being held in one of the three so-called "secure rooms" in the offices
of the Vatican's tiny police force inside the walled city-state. (more) (sing-a-long)
SpyCam Story #660 - This Week in SpyCam News
SpyCam stories have become commonplace and the techniques used, repetitive. We
continue to keep lose track of the subject for statistical purposes,
but won't bore you with too many details. Only links to the stories will be
supplied unless there is something useful to be learned.
OH - Woman catches spycam'er, takes his phone, calls police, punches and detains him.
Read more here: http://www.thenewstribune.com/2012/05/04/2131140/capital-playhouse-employee-charged.html#storylink=cpy
OH - Woman catches spycam'er, takes his phone, calls police, punches and detains him.
Read more here: http://www.thenewstribune.com/2012/05/04/2131140/capital-playhouse-employee-charged.html#storylink=cpy
Thursday, May 24, 2012
FutureWatch: Canada's CALEA
Canada - As authorities in the United States and United Kingdom push for greater Internet surveillance powers, the Canadian government is locked in its own controversial struggle to wiretap the Web.
Canada’s C-30 surveillance bill is much like the FBI’s recently revealed effort to force Internet communications providers such as Skype and Facebook to provide “back doors” for eavesdropping. In some cases, the Canadian legislation would allow police to obtain user data without a warrant. C-30 had appeared dead following a Supreme Court ruling in April that deemed warrantless wiretaps unconstitutional, plus a storm of opposition from privacy groups. But the government said last week it is still moving forward with the plan.
Now, new documents obtained under Access to Information laws have revealed Canada’s largest telecoms providers held secret meetings with government officials about the wiretapping proposals. The documents show that after forming a behind-closed-doors working group, the companies and government officials discussed the technical reality of introducing new mass eavesdropping capabilities in fascinating detail. (more)
Canada’s C-30 surveillance bill is much like the FBI’s recently revealed effort to force Internet communications providers such as Skype and Facebook to provide “back doors” for eavesdropping. In some cases, the Canadian legislation would allow police to obtain user data without a warrant. C-30 had appeared dead following a Supreme Court ruling in April that deemed warrantless wiretaps unconstitutional, plus a storm of opposition from privacy groups. But the government said last week it is still moving forward with the plan.
Now, new documents obtained under Access to Information laws have revealed Canada’s largest telecoms providers held secret meetings with government officials about the wiretapping proposals. The documents show that after forming a behind-closed-doors working group, the companies and government officials discussed the technical reality of introducing new mass eavesdropping capabilities in fascinating detail. (more)
Bugs found at Russian cultural center in Estonia
Estonia - A wiretapping device has been found in a cultural center for Russian-speaking Estonian citizens in Tallinn. The NGO is run by the mother of the city’s vice mayor, who is suspected of lobbying for Russian interests in the Baltic country.
The wiretap, discovered Tuesday, is the second such device found in the Lira cultural and sports center, after a thorough inspection carried out by center’s security.
The first eavesdropping device, which was clumsily wired into the facility’s alarm system, was found on May 15. Inspectors believe the bugs were installed between September and December 2011. The police opened an investigation but so far no official statements have been made on the issue. (more)
The wiretap, discovered Tuesday, is the second such device found in the Lira cultural and sports center, after a thorough inspection carried out by center’s security.
The first eavesdropping device, which was clumsily wired into the facility’s alarm system, was found on May 15. Inspectors believe the bugs were installed between September and December 2011. The police opened an investigation but so far no official statements have been made on the issue. (more)
Wednesday, May 23, 2012
No Sir'ee. No Siri here. Seri-ously!
If you work for IBM, you can bring your iPhone to work, but forget about using the phone’s voice-activated digital assistant. Siri isn’t welcome on Big Blue’s networks.
The reason? Siri ships everything you say to her to a big data center in Maiden, North Carolina. And the story of what really happens to all of your Siri-launched searches, e-mail messages and inappropriate jokes is a bit of a black box.
IBM CIO Jeanette Horan told MIT’s Technology Review this week that her company has banned Siri outright because, according to the magazine, “The company worries that the spoken queries might be stored somewhere.”
It turns out that Horan is right to worry. In fact, Apple’s iPhone Software License Agreement spells this out: “When you use Siri or Dictation, the things you say will be recorded and sent to Apple in order to convert what you say into text,” Apple says. Siri collects a bunch of other information — names of people from your address book and other unspecified user data, all to help Siri do a better job.
How long does Apple store all of this stuff, and who gets a look at it? Well, the company doesn’t actually say. (ask Siri!) (more)
The reason? Siri ships everything you say to her to a big data center in Maiden, North Carolina. And the story of what really happens to all of your Siri-launched searches, e-mail messages and inappropriate jokes is a bit of a black box.
IBM CIO Jeanette Horan told MIT’s Technology Review this week that her company has banned Siri outright because, according to the magazine, “The company worries that the spoken queries might be stored somewhere.”
It turns out that Horan is right to worry. In fact, Apple’s iPhone Software License Agreement spells this out: “When you use Siri or Dictation, the things you say will be recorded and sent to Apple in order to convert what you say into text,” Apple says. Siri collects a bunch of other information — names of people from your address book and other unspecified user data, all to help Siri do a better job.
How long does Apple store all of this stuff, and who gets a look at it? Well, the company doesn’t actually say. (ask Siri!) (more)
Subscribe to:
Posts (Atom)