Sunday, January 11, 2015

Tip: Turn Your Old iPod into a Security Camera for Free (UPDATE)

Last summer I tipped you off about an app that turns your old Apple devices into video surveillance cameras. It is called Manything.

Manything recently made the news...

A Tempe homeowner caught a would-be burglar rummaging through her house on her "puppy" cam.

Mia used an iPhone app called Manything to set up a live video feed to keep an eye on her dogs while she was away at work. She pulled up the feed on her work computer and saw an unknown man walking through her living room.

Dispatcher: 911. What is your emergency?

Caller: Hi. There's someone in my house

"My dogs are there, he's giving the dog treats," she told the dispatcher. The man then noticed the camera and turned it off, but Mia has already contacted the police.

Officers surrounded the home and took the man into custody.
(more) (video)

"The World's First Espionage Snacks"

New Branding and Espionage Snacks at the Winter Fancy Food Show, January 11-13, 2015

 ...launching at the show, and sure to change the snacking game as we know it, are Captain Honeypot and Admiral Hornblower, the world’s first espionage snacks that allow you to spy on yourself and honeypot with others.

At the helm of these snack innovations is Robert Ehrlich, who has rocked the snack world as the Shaman of Snacks for the past 29 years, creating some of the most iconic snacks on the planet.
(more)

Cash Machine SpyCam Scam

UK - An iPod nano was turned into a spy camera and taped to a cashpoint by thieves in a bid to steal unsuspecting user's bank details.

The Apple device was found by police attached to the hole-in-the wall in Northenden Road in Gatley, Stockport, Greater Manchester.

They discovered that the iPod nano had been turned into a camera and attached to the ATM using duct tape and a fake plastic case was added.
(more)

Privacy App Alert - Turn Your Phone into a Burner Phone

Burner is a privacy layer for your phone. Create unlimited numbers at the touch of a button, and keep your personal number private. 

Real phone numbers when you need them
Burners are real numbers with local area codes you can use for calls, texts, and voicemail to stay in touch with anyone.

Control your mobile identity
Manage who can reach you without compromising your personal information. Features like Touch ID lock and custom line colors will keep you organized and in control.

Burn to "disconnect"
Keep a Burner as long as you want... or delete at the touch of a button. Like magic, your number goes out of service and the data is wiped from your phone.
(more)

The information above is from Burner's publicity material. Keep in mind your calls are going through a 3rd party. Confidential discussions should be avoided on principle. ~Kevin

Friday, January 9, 2015

Hacktivist Group Anonymous Finds a Worthy Target

Hacktivist group Anonymous has come out to avenge the attacks on the office of Paris-based magazine Charlie Hebdo in which 12 people were murdered.

The Belgian 'branch' of Anonymous posted a video message to YouTube describing a new campaign against jihadists, called #OpCharlieHebdo.

The video, which features someone wearing the Guy Fawkes mask and speaking with their voice obscured, explains (in French) that its members have decided to "declare war on you, the terrorists" - referring to Al-Qaeda and ISIS specifically.

"We will track you down - every last one - and will kill you,” the spokesman says. "You allowed yourselves to kill innocent people, we will therefore avenge their deaths."

The figure says that 'hacktivists' from around the world will track all of jihadist activities online and close down their accounts on Twitter, YouTube and Facebook.

"You will not impose your sharia law in our democracies, we will not let your stupidity kill our liberties and our freedom of expression. We have warned you; expect your destruction."
(more) “Je Suis Charlie

The No Back Door Bill is Back

Sen. Ron Wyden (D-Ore.) is reintroducing legislation that bars the government from requiring technology companies to build so-called "backdoor" security vulnerabilities into their devices to allow access to their data.

Wyden first introduced the bill last December after FBI director James Comey criticized moves by some phone companies to encrypt devices to prevent anyone from accessing their data without permission, even law enforcement.

Comey has called on Congress to update a 1994 law to allow a workaround, saying the phone locks could stall some law enforcement investigations.

The problem with this proposal is that there is no such thing as a magic key that can only be used by good people for worthwhile reasons,” Wyden said in a floor statement Thursday. “There is only strong security or weak security.”
(more)

Hanoi Police Seek Criminal Charges in Massive Phone Bugging Case

Hanoi police have finished investigating a deputy director and six employees of a technology firm which sold a spy app that allowed its users to spy on more than 14,000 mobile phones in 2013-2014.

They said Thursday they have recommended that the prosecutor's office charge Viet Hong Technology Company’s Deputy Director Nguyen Viet Hung and six employees for “illegally using information culled from computer, internet and telecommunication networks.”

Police said Hung, 41, and the employees... developed mobile phone-monitoring software and sold it to more than 14,000 people between September 2013 and May 2014.

Hung and the six employees earned around VND900 million (US$42,000) from the illegal activity, police said. 

For VND400,000 ($19) per month, Viet Hong's customers could install the Ptracker software onto anyone's smartphones to listen on calls, read text messages, access contacts, track the owners' movements and use the phone to listen in on their daily lives.

The stolen information was archived on Viet Hong’s servers and could be accessed by signing up for a paid account.
(more)

TEMPEST in a Tea Shop, or Dude, You're Leaking

If you’re sitting in a coffee shop, tapping away on your laptop, feeling safe from hackers because you didn’t connect to the shop’s wifi, think again. The bad guys may be able to see what you’re doing just by analyzing the low-power electronic signals your laptop emits even when it’s not connected to the Internet. And smartphones may be even more vulnerable to such spying.


Researchers at the Georgia Institute of Technology are investigating where these information “leaks” originate so they can help hardware and software designers develop strategies to plug them. By studying emissions from multiple computers, the researchers have developed a metric for measuring the strength of the leaks — known technically as “side-channel signal” — to help prioritize security efforts.
(more)

Thursday, January 8, 2015

Security Directors: Cell Phone App Security... in simple terms, pass it around.

Mobile devices, such as tablets and smartphones, have become one of the primary technologies we use in both our personal and professional lives.

What makes mobile devices so versatile are the millions of apps we can choose from...

However, with the power of all these mobile apps come risks. Here are some steps you can take to securely use and maintain your mobile apps.
(Securely Using Mobile Apps)

Peeking Through Keyholes With Lasers... well, yes and no.

An imaging technique that measures the path of a laser to build up a three-dimensional picture could now let spies map an entire room through a tiny hole.

In 2012, researchers used a laser to see around corners. The system worked by firing short laser pulses at a nearby wall, bouncing light around a corner to a hidden object, which then bounces some of it back to a camera next to the laser...

Now Chenfei Jin of the Harbin Institute of Technology in China and colleagues have taken this a step further. They used a laser set-up to measure the 3D shape and position of three cardboard letters, spelling HIT, through a 2 centimetre hole in a nearby wall...

The letters were coated in highly reflective material while the rest of the room was covered in black light-absorbing cloth, so the technique might not work as well in a real-world setting...

Guy Satat of the Massachusetts Institute of Technology says he likes the work, but points out that if the hole were easily accessible, it would be easier for would-be spies to simply put a camera up against the wall and take a photo of the room.
(more)

Wednesday, January 7, 2015

Encrypted Video-calling and Chat Service by Kim Dotcom

Kim Dotcom, founder of the file hosting service Mega, is preparing to launch an encrypted video-calling and chat service that will shield its users’ communications from government surveillance.

“Mega will soon release a fully encrypted and browser-based video call and chat service including high-speed file transfers,” the entrepreneur known as Kim Dotcom said in a tweet.

Kim Dotcom is positioning the service as a more secure way to chat and collaborate online free of government surveillance or spying, partly by virtue of Mega being based in New Zealand. Kim Dotcom has been teasing the app for some time, though now it appears nearly ready for prime time.
(more)

Movie Scoop - The Man from U.N.C.L.E. (returns)

Henry Cavill (Man of Steel) stars as Napoleon Solo opposite Armie Hammer (The Social Network) as Illya Kuryakin in director Guy Ritchie’s action adventure The Man from U.N.C.L.E., a fresh take on the hugely popular 1960s television series. Set against the backdrop of the early 1960s, at the height of the Cold War, The Man from U.N.C.L.E. centers on CIA agent Solo and KGB agent Kuryakin. Forced to put aside longstanding hostilities, the two team up on a joint mission to stop a mysterious international criminal organization, which is bent on destabilizing the fragile balance of power through the proliferation of nuclear weapons and technology. The duo’s only lead is the daughter of a vanished German scientist, who is the key to infiltrating the criminal organization, and they must race against time to find him and prevent a worldwide catastrophe.

The Man of U.N.C.L.E. is expected in theaters from August 14th, 2015.

Until then...

Weird Spy News - Man in trunk spying on car passenger, CIA admits UFOs, and more...

NJ - Two men were arrested Monday after police say they were found with drugs while trying to spy on someone else. ...police pulled Edguardo Mendez, 24, of Newark, over at 2:54 a.m. Monday while he was driving with a passenger... During the stop, officers found that another man, Trevor Torres, 21, of Belleville, was hiding in the car's trunk... Torres, “was a surprise to the front seat passenger whom (he) was allegedly spying on,” Bloomfield Sgt. Anthony Servedio said... Torres was arrested on multiple drug charges... Mendez was charged with marijuana possession... Police did not immediately respond to questions about the men’s relationship to the passenger, or why the two were trying to spy.
(more)

Spy on and play with your pet from afar with Petcube.
 
The Central Intelligence Agency (CIA) has recently taken responsibility for at least half of all UFO sightings between 1950s-60s... A previously confidential CIA document revealed that most of the sightings were actually U-2 spy planes.
(See Pages 72-73.)


And... What The Hell Is Going On In The Buick Commercial Where The Couple Is Spying On The Garcias?

Tuesday, January 6, 2015

No Warrant Wiretaps - There is a Santa "Clause"

If you're in a public place, don't expect your phone calls and texts to stay private. At least not if the FBI flies a Cessna over your head or drives a car around your neighborhood while you're out for a walk.

Warrant?
The FBI won't bother to obtain search warrants before it uses interception devices on people in public, according to a letter written by Senate Judiciary Committee Chairman Patrick Leahy (D-Vt.) and staffer Sen. Chuck Grassley (R-Iowa).

These devices include Stingrays, the cell-tower decoy interception devices used to scoop up data from devices around it. The FBI puts Stingrays and similar devices known as dirtboxes in cars and small airplanes as a way to quickly dragnet data from a large number of devices while it is hunting for a device that belongs to a suspect.
(more)

Is it OK to spy on your kids? (CNN)

Whether you think spying on your kids is acceptable in today's digital age or a breach of trust seems to really depend on how you define "spying" in the first place.

In conversations over email with parents across the country, it's clear that people have dramatically different views about the definition and whether it's an appropriate behavior to help keep children safe.

"I don't call it spying. I call it parenting," said Amanda Rodriguez, a mom of three boys in Frederick, Maryland... On the other side are parents such as Lori Day, an educational psychologist and mom of a daughter in graduate school, who considers spying "an invasion or privacy and a violation of trust."
(more)