Friday, October 17, 2008

Say "cheese" for details.

All visitors to internet cafés in Beijing are to be required to have their photographs taken in a stringent new control on the public use of cyberspace.

According to the latest rules, by mid-December all internet cafés in the main 14 city districts must install cameras to record the identities of their web surfers, who must by law be 18 or over.

All photographs and scanned identity cards will be entered into a city-wide database run by the Cultural Law Enforcement Taskforce. The details will be available in any internet café. (more)

MINOX Agent M - One-Stop SpyCam Shopping

Agent M DSC DigitalSpyCam
DSC is the name of the new mini MINOX model: Digital SpyCam. This outstanding masterpiece in minimalist design and photo technology packs remarkable features into dimensions of just 86 x 29 x 20 mm. With a resolution of five million pixels it can compete with traditional digital cameras with ease. The bright viewfinder allows spontaneous, fast shots, even in critical light conditions. In twilight the integrated flash switches on automatically. In total these features make the new DSC a very sound optical notebook.
229,00 EUR / $308.47

Agent M Digital Sunglasses Camera
This pair of sunglasses has more than just one surprise in store: a micro camera is integrated in one of the earpieces and can be controlled via a remote control without attracting attention. The other earpiece houses a MP3 player. The lenses are replaceable, making this ingenious eyewear adjustable to the diopter strength required by the person wearing them.
169,00 EUR / $227.65

Agent M Spy Sunglasses 180°
These unusual sunglasses have lenses that are mirror-coated on the inside, at their outer edges. They reflect everything going on behind the back of the person wearing them to allow perfect observation without having to turn around. The new MINOX spy sunglasses are also exactly what they look like, a perfectly normal pair of sunglasses with excellent UV protection.
99,00 EUR / $133.35

Agent M Digital Belt Camera
Camouflaged as an inconspicuous belt buckle the MINOX Belt Camera enables videos to be taken without being noticed. The micro-optics are perfectly concealed on the front of this ingenious camera, allowing undercover surveillance to be recorded inconspicuously in 3GP format. The controls are arranged on the underside of the buckle and are within easy reach.
229,00 EUR / $308.47

Agent M Digital Pen Camera
This normal-looking pen would appear to be just another ball-point. But hidden behind its clip there’s a micro video camera that records video films in AVI realtime format. The high-power microphone is additionally integrated in the chrome-plated clip. A USB port for downloading the videos is built into the front part of the pen. 189,00 EUR / $254.69
Special... The secret spy brochure.
Bonus... MINOX DSC has its own internet forum on www.license-to-shoot.com. Original and exciting “Agent M Shots“ can be placed on this site and contacts made to other “agents” all over the world.

FutureWatch - VoIP Encryption for All

by Patrick Thorel, Alcatel-Lucent
Over the last few years adoption of VoIP has grown rapidly. ...migration to an IP network also brings a host of new security challenges that are driving a trend toward voice encryption.

Voice communication ... needs be assured 24/7 and always go to all the right people and none of the wrong ones. In recent times eavesdropping has led to a number of information leaks in legal cases. Certain industries are particularly susceptible to this type of security risk and are thus driving the trend toward voice encryption.

In finance, for example, worldwide agreements which dictate data security in the banking and finance industry make data and voice protection a legal requirement. Healthcare professionals are also aware of patient confidentiality, although no government or company is excluded from the threat of industrial espionage...

To limit the risk of such security breaches encryption of voice traffic is essential... In order to maintain total security everything within the network must be encrypted... One solution is to install hardware in front of the communication server in the gateways and use encryption-optimized firmware in the phones. (more)

Prediction...
Eventually, end-to-end
telephone/data encryption will be standard – with CALEA access. Until then, the best choice is to call us (from a safe phone) to inspect for bugs and taps. We can also advise you on current encryption solutions.

Thursday, October 16, 2008

What It Takes to be a Spy

Former MI6 spy Harry Ferguson has revealed the skills necessary to be a real-life James Bond.

Resourcefulness: "It might surprise people, but unfortunately in real life out gadgets often don't work when we need them and so you have to adapt."


Observation: "You have to understand what you see, like if someone has you under surveillance or if you spot a face you saw in a briefing a few months earlier."

Empathy: "People must have trust in you, and you must protect them."

Weapon skills: "In the past agents did not really have to use arms, but with the work now in Iraq and Afghanistan that has changed."

Coolness: "The ability to stay unshaken involves keeping your level of eye contact normal and retaining a relaxed body posture."

Social skills: "You have to move in playboy circles, and go to Monte Carlo and drive a flash car and be able to carry it off like a natural.

Languages: "The more easily you can slip intro a foreign country without drawing attention, the better."

"If we're going to use gadgets, a lot of the stuff you can get in shops will do. If you plant a commercially made bug and it's found, it's not tied to a government organisation. The last resort would be a gadget made by the technical sections at MI6." (more)

You might also want to review...
What does a spy look like?
Quiz - Would you make a good spy?
Why do I mention this?
So you will know who you are up against.

SpyCam Story #482 - Free SpyCam Gadget


Using Vista?
Using a Logitech Webcam?

Bingo!
Instant spycam.


from Logitech...
"Keep a watchful eye—even when you're not around. This Gadget acts like a motion detection sonar, triggering a recording whenever it senses movement within the field of view of your QuickCam. Recording stops when the motion stops, and an .AVI file is saved in a location you specify. The videos are even time & date stamped to help you keep track of what happened, when." (more)

The important stuff – "...
an .AVI file is saved in a location you specify."

Make sure no one loads this on your computer without your knowledge. They could be collecting movies and storing them elsewhere on your network, or the Internet. Very bad for computers located in offices and bedrooms. ~Kevin

Tuesday, October 14, 2008

Book Review - The Shadow Factory - NSA

Once upon a time the NSA was so secret that its acronym was said to mean No Such Agency.

Today we know a great deal more about it, in part because of James Bamford, who in The Puzzle Palace (1982), a portrait of the agency, offered secrets so sensitive that the NSA attempted to block the book's publication.

Now, with The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America Mr. Bamford takes a close look at the National Security Agency's performance just before 9/11 and after. (
more)

Monday, October 13, 2008

Bright Idea: LED WiFi Hotspots

Folks at Boston University's College of Engineering are researching a program aimed at developing the next generation of wireless communication -- based on visible light.

The aim of the initiative is to eventually develop an optical communication technology which would make an LED light, the equivalent of a Wi-Fi access point.


BU Engineering Professor Thomas Little paints the ideal scenario for these LEDs: "Imagine if your computer, iPhone, TV, radio and thermostat could all communicate with you when you walked in a room just by flipping the wall light switch and without the usual cluster of wires..."

Additionally, as these networks work on the "line of sight" theory, it would be impossible to eavesdrop into a network by a person sitting across the wall. (more)
Humm...
• Light reflects.
• Fiber optics channel.
• Photocells convert.
• Appearance points can be tapped.
Impossible-to-eavesdrop type "progress" often brings with it info-vulnerabilities to be discovered. I can't wait. ~Kevin

Meanwhile, from the minds at MIT...
Talking-Lights.com "The Talking Lights System (using fluorescent lamps) can be used to form a hybrid network that combines the advantages of optical location-finding with broadband WiFi duplex data transfer... The systems can also be used to offer information and guidance to shoppers, museum-goers and trade show attendees, improve security in office buildings and secure facilities..."

Historical Note: Both LEDs and
fluorescent lights are already being used for electronic eavesdropping bugging purposes.

Spies, Get Ready For Halloween...

Learn from the Masters of Disguise
Magicians, like spies, excel at the art of misdirection and deception. Join Jonna and Tony Mendez, both former CIA chiefs of disguise, as they explore how magic and illusion have been used through the centuries to deceive the enemy.

Spy Magic: Disguise, Deception, Illusion and Espionage

At the International Spy Museum
Tuesday, 28 October; 6:30 pm $15.00 / Members $12.00 (more)

Get Your Disguise Gear Ready
Black Bar Glasses.
Make yourself photo-proof.

$8.99 (more)




And, above all...
Don't Act Furtive
Play this CD.

It features some really disturbing noises... unforgettable tracks like Unhappy Dog, the agonizing squeal of Violin Practice, and the exquisitely excruciating din of House Party.
$7.00 (more)

Remember Alex Allan?

Right, now do you remember Alex Allan?

If not check here. If so, read on and learn more about this spook.

Although the press knocked him a bit, his creative mental outlook and humor makes him perfect as an intelligence adviser. His resume is impressive.
My kind of guy!

This Alex Allan caught the attention of Philadelphia, PA bookplate maven, Louis Jaffe...

"I was looking through an album of 20th century British bookplates this morning and selected a few of my favorites. There is never enough time to research every bookplate so the backlog grows.

If you know something about any of these owners or the artists please share it with us.

I purchased the Alex Allan bookplate in England after seeing it in The Bookplate Society Journal (vol.v11,1989). It is a wood engraving by Anne Jope and it is one of the earliest if not the first plate depicting a computer. The owner may be the larger than life Alex Allan, Chairman of The Joint Intelligence Commission Of The United Kingdom and Grateful Dead enthusiast." (more)
Update... This is, indeed, Mr. Allan's bookplate.

First quantum encrypted network goes live

The first network protected by quantum encryption has gone live at a scientific conference in Vienna...

The quantum cryptography systems rely on an application of the Heisenberg Uncertainty Principle, which broadly states that it is impossible to observe quantum information without altering it.

This makes eavesdropping impossible, since as soon as it takes place the change in data can be recognised and the network shut down. (more)

FutureWatch – Fistfights between network operators and governments demanding surveillance capabilities. Result: This level of protection may never trickle down to the average user of data services unless a back-door compromise can be reached. Retrospect

Sunday, October 12, 2008

Spy Toolkit Item #141 - Dissolving Paper


Sources:
Mitsui USA
Endless Technologies
Nic Law Enforcement Supply
Defense Devices

Bonus...

Next time you venture out into that unhygienic world of ours, make sure you bring along our Dissolving Paper Soap! Simply wet your hands and rub them together with one sheet of paper soap -- and watch as the "paper" transforms into sudsy lather!

Meanwhile, over at Xerox...
Scientists demonstrated paper that can be reused after printed text automatically deletes itself from the paper's surface within 24 hours. Instead of trashing or recycling after one use, a single piece of paper can be used a second time, and reused up to 100 times, said Eric Shrader, area manager at PARC. (more)

Friday, October 10, 2008

Corporate TSCM - Bug Sweep Demand vs. Supply

The Australian Securities and Investments Commission (ASIC) released a request for tender (RFT) to source technical surveillance counter-measure (TSCM) services. ASIC hopes to find a company to sweep its offices and IT systems for spying devices, a task ASIC is mandated to do.

The problem with ASIC's RFT is that it wants the TSCM — a phrase coined by military describing scanning a site for spying devices — from a single company.

"For TSCM, which is the bug detection process, there are not enough qualified people in Australia with the right level of industry training or government experience to provide the service," Les Goldsmith, managing director of Australian counter-intelligence firm, ESD Australia told ZDNet.com.au.

Goldsmith said his company would not bid for the work due to the likely scale of it. However, he added, "I don't see for this contract they're going to find a single contractor that can do that scope of work."...

Goldsmith said that spying devices are found in around three out of every 10 inspections within Australia, with much higher rates in Asia, particularly in the government sector. (more)

Interesting statistic. Here in the US, the 35-year average I have seen (subjectively) is more like one in 20. (30% vs. 5%) This may be due to the already relatively high security posture of my client family. But, it doesn't matter. All it takes is one strategically located bug or wiretap to cripple a corporation.

More interesting, however, is the one-stop-shopping problem. The solution I had to develop about 10-years ago, due to client demand, can be seen here.

Note to ASIC: Don't let defeatist news reports fool you. I personally know of several quality TSCM providers in Australia who would pool their resources and offer you one-stop shopping, like I do. Please feel free to contact me if you need any help in getting this ball rolling.
Kevin

Thursday, October 9, 2008

Question of the Week - Secure Conference Calls

"Are you aware of whether or not there is such a thing as a company that offers a 'secure' conference calling service? A company that provides an 800 number that people can call in to and participate in a 'secure' multi-party conference call?"

No one-stop solutions. How about a two-stop solution?

Set up encrypted conference calls via VoIP using ZFone. Combine this with an on-line conference call service which uses Asterisk software.

• Participant requirements
-- Access to the Internet.
-- ZFone software on their computer (lap or desktop). It's FREE.
-- Optional, for added privacy:
---
A plug-in headset $3.99
--- Or,
plug-in ear-buds $23.99

• Teleconferencing requirements
-- Schedule calls with an Asterisk-based provider, like Rondee. It's FREE. (others)
-- Major carriers offer secure 'web-meeting' services for a fee. (example)
Note: Conference providers have access unencrypted calls; CALEA.

Other options
VoIP telephony - Just route all calls through a Virtual Private Network (VPN). Good for inter-company conference calls.

"Very occasionally, there is a half second of delay when you have a few VPN-based users on a conference call together, but that has a nice social side effect of stopping people from trying to interrupt each other." Posted by Bradley M. Kuhn on June 20, 2008.

Polycom Encrypted Video Conference Calling (Point to Point)

As I learn of new solutions I will let you know.
Until then, I hope this helps.

Kevin

Wednesday, October 8, 2008

SpyCam Story #480 - Clickjacking ALERT

A security researcher in Israel has released a demo of a “clickjacking” attack, using an JavaScript game to turn every browser into a surveillance zombie.

The release of the demo follows last month’s partial disclosure of the cross-platform attack/threat, which affects all the major desktop platforms — Microsoft Internet Explorer, Mozilla Firefox, Apple Safari, Opera and Adobe Flash.

In Guy Aharonovsky’s demo game, a Web page is set up to seamlessly hide another page in the background that’s actually managing the target’s Adobe Flash Player privacy settings manager.

Using a series of clicks bouncing around the rigged page, Aharonovsky is able to silently hijack the user’s clicks to modify the Flash privacy settings and take complete control of the installed webcam.

The wet dream of every private eye and peeping tom. Imagine this scenario, you play a short game on the web and by doing that you unknowingly grant someone full access to your webcam and microphone.

If you don’t want to try it or don’t have a webcam connected, you can see the attack in action in this YouTube video.
[more]
[ SEE: Clickjacking: Scary new cross-browser exploit]
[ UPDATE: The details are out. Lots of unresolved clickjacking issues]
[Quote of the Day: "...the average end user would have no idea what’s going on during a Clickjack attack." – Ryan Naraine]

FINAL UPDATE – 10/15/08
Adobe Systems has released a new version of its Flash Player software, fixing a critical security bug that could make the Internet a dangerous place for Web surfers.

The new Flash Player 10 software, released Wednesday, fixes security flaws in Adobe's multimedia software including bugs that could allow hackers to pull off what's known as a clickjacking attack, wrote Adobe spokesman David Lenoe in a blog posting.

For those who can't update to this new version of Flash, a Flash 9 security patch is still about a month off, he added. Adobe rates the clickjacking bug as 'critical.' (more)

Tuesday, October 7, 2008

In Brazil, Business as Usual Often Involves Wiretapping

via The Wall Street Journal...
Brazilian banker Daniel Dantas is a very wary guy. He avoids sending email, switches phones frequently and makes calls from moving cars...


It all wasn't enough to escape Federal Police Inspector Protógenes Pinheiro de Queiroz. Beginning early last year, investigators led by Inspector Queiroz began monitoring dozens of phones and email addresses belonging to Mr. Dantas, his family and associates.

Mr. Dantas still faces charges related to the arrest, but Inspector Queiroz's methods are under the spotlight, too.

The bearded, bespectacled detective was hauled before a congressional committee, and police opened an internal inquiry. The head of Brazil's intelligence agency, whose operatives took part, was suspended pending an investigation into illegal wiretapping. Now, there's a growing debate in Brazil over what some call rampant official -- and unofficial -- eavesdropping...

Mr. Dantas's side hired Kroll Inc., the U.S. risk-consulting firm, to investigate Telecom Italia, as well as political rivals and journalists; Kroll even had hidden-camera films taken of the then head of the Banco do Brasil. But Brazilian police were wiretapping Kroll personnel and broke up the operation in a 2004 raid. Kroll, whose employees now face espionage charges, denies it acted illegally.

Officials in Italy say former Telecom Italia employees operated their own spy ring, at one point breaking into Kroll's computers. Prosecutors there are seeking to indict six ex-staffers, part of a probe that has targeted more than 30 people. Telecom Italia declined to comment. (
more)

A Busy Week for Spy Chiefs Worldwide

French spy chief to step down
The head of France’s foreign intelligence agency is to step down in the coming days, an official said yesterday, following a shake-up in the upper reaches of the country’s spying networks. Pierre Brochand, the 68-year-old director of the DGSE, has led France’s overseas intelligence gathering since July 2002, and was notably involved in operations to win the freedom of French hostages in Iraq and Afghanistan. (more)

Local council hires former spy chief
Gloucestershire County Council has hired the former head of GCHQ to look into its overall performance and "challenge" the way the authority runs. Sir David Pepper, who ran the government's huge intelligence gathering base in Cheltenham from 2003 until earlier this year has been hired as a non-executive director of the council, working two days a month until April 2009. (more)

Spy chief dodged torture arrest
Discreet negotiations between Israel and the Netherlands allowed a former chief of Israel's security agency to avoid arrest on torture charges, sources say. Citing unnamed sources, the Israel newspaper Yedioth Ahronoth reported Tuesday that Dutch authorities were considering a request from an alleged Palestinian torture victim that former Shin Bet head Ami Ayalon be detained and taken to the International Court of Justice in The Hague during a May visit to the Netherlands. (more)

Israelis say spy chief killed Hezbollah commander Mughniyah
A panel of experts assembled by Israel's most powerful television channel honored Israeli Mossad chief Meir Dagan as the nation's "man of the year" for, among other things, killing Hezbollah commander Imad Mughniyah in the Syrian capital in February, according to a recent report in the Israeli newspaper Haaretz. (more)

Pakistan’s New Spy Chief
The chief of the Pakistani Army on Tuesday appointed a new head of the nation's top spy organization in a move that consolidated his control over an agency that the United States contends has been helping the Taliban mount operations against U.S. forces in Afghanistan. The new spy chief is Lieutenant General Ahmed Shuja Pasha, 56, director general of military operations, the nerve center for the Pakistani Army. (more)

Former Kazakh spy chief hurt in suspected kidnap bid
Kazakhstan's former spy chief Alnur Mussayev, who is living in exile in Austria, was seriously hurt in a suspected abduction bid, the Austrian prosecutors office said Friday, AFP reported. (more)

Former spy chief joins 42-day detention critics
The government's 42 days counterterrorism legislation came under fresh fire last night when a former director general of MI5 said the provision to hold suspects for six weeks without charge was excessive. Dame Stella Rimington became the second former MI5 chief in three months to come out against the controversial measures. (more)

Seoul Spy chief says North Korean leader's health has improved
South Korea's spy chief says North Korean leader Kim Jong Il's health appears to have improved. Legislators from South Korea's ruling party say National Intelligence Service chief Kim Sung-ho told them Tuesday that his agency believes Kim Jong Il's health "has improved a little." (more)

Israeli spy chief who masterminded bombing of Western targets in Egypt dies
Binyamin Gibli, who as director of Israeli military intelligence in the early 1950s was a key player in his country's most debilitating political scandal, the Lavon affair, has died, aged 89. Gibli initiated an illicit campaign of bombing and sabotage against Western targets in Egypt — and after being forced to resign, admitted having forged documents that falsely implicated his boss, the Israeli defence minister Pinhas Lavon, in the plot. (more)

Spy Chief Questioned
Grenada's former spy chief, Assistant Superintendent of Police (ASP), Anthony De Gale has finally been questioned in connection with reports of missing files from the department. The Spy Master was sent on his 120 days accumulated leave by newly installed Police Commissioner, James Clarkson after it was discovered that at the files at Special Branch were destroyed immediately after the July 8 General Elections which brought the then opposition National Democratic Congress of Tillman Thomas to power. (more)

Spy chief to speak on Haneef arrest
AUSTRALIA'S domestic spy chief will give evidence today on the arrest and investigation of Indian doctor Mohamed Haneef. ASIO director-general Paul O'Sullivan will be interviewed by the Clarke inquiry, which is investigating the bungled arrest and charging of Dr Haneef in July last year in connection with terror attacks in Britain. (more)

Indonesian court to proceed with murder trial of former spy chief
An Indonesian court on Tuesday rejected a motion by the defence to drop charges against a former senior intelligence official accused of ordering the killing of a prominent human rights activist. Purwoprandjono (who like many Indonesians uses only one name), 59, a former deputy chief of Indonesia's National Intelligence Agency, is accused of ordering the murder of Munir Said Thalib, an outspoken critic of the country's military. (more)

Former Italian Spy Chief Wants Rice
Italy's former spy chief, on trial for participating with the CIA in the abduction of a Muslim cleric, says he wants Condoleezza Rice to testify in the case. Prosecutors say Niccolo Pollari, former head of the Italian military intelligence service SISMI, and eight other Italians participated in the 2003 "rendition" of Hassan Mustafa Omar Nasr. (more)

SpyCam Story #479 - The Cost of Star Gazing

Malaysia - The man who trespassed and installed a spy camera in model Nasha Aziz’s rented apartment six years ago will spend six months in Kajang Prison after he failed in his appeal to quash his conviction.

Supervisor cum maintenance manager Ahmad Bakhtiar Abdul Kayoom (pic), 31, was found guilty of two charges of trespassing into the apartment rented by Nasha, whose real name is Noraisha A. Aziz, and intruding upon her privacy by installing a closed-circuit camera between the month of April and July in 2002.

The camera was wired to a maintenance office by Ahmad Bakhtiar, whose father owned the entire apartment block. (more)

Monday, October 6, 2008

The Case of the 'Knotso' Safe House

UK - A handheld computer reportedly belonging to Britain's domestic spy agency (MI-5) has been stolen from a house in northern England.

Police in the city of Manchester confirmed in a statement that a house had been broken into over the weekend and that an encrypted handheld computer was stolen. It is believed the burglar entered the house through an open window.

Press Association said the house was being rented by the domestic spy service MI-5.

The intelligence services have been hit by a number of security breaches recently. (more)

Meanwhile over at MI-6...
...police are investigating the sale of a camera on eBay that is said to have contained MI-6 images of terror suspects. (more)

Don't laugh.
If it can happen at the MI's, it can easily happen at your company, and probably does. What are you doing about it? Need help? Call me.

SpyCam Story #478 - Wolf J. Flywheel II

Two former employees of a Neiman Marcus store in suburban Chicago who were fired for having sex at work say the department store's management illegally videotaped them.

Steven Chalem and Veronica Miranda filed a lawsuit Tuesday in Cook County Circuit Court, saying a manager used a hidden camera.
The lawsuit says the security employees were fired last October for "engaging in sexual activity" twice at the Northbrook store. It alleges the manager shared the videotape with other people and posted it on the Web.

The plaintiffs want damages for violation of Illinois' eavesdropping statute, emotional distress and other complaints. (more) (similar story)

Saturday, October 4, 2008

SpyCam Story #477 - Night Rider, SpyCam Car

Peering its leering nose around the corner, just in time for the holidays, we have a mobile night-vision spy toy for the kids.

If teaching integrity, morals and ethics is just too hard, consider giving your kids a career in the world of spying. Idea! Bulking up on the spy toy training tools now can put that college fund right back into your pocket!

from the seller's web site...

"Use the video feed on this radio-controlled car to maneuver it carefully into dangerous territory.
With near-silent motors, high-traction tread and IR illuminators, it stealthily travels in the dark, providing you with real-time visuals... you see what the car sees!

The spy headset plugs into the controller and displays the live video into the eyepiece."

Requires 12 AA batteries, not included.
• 2.4GHz monochrome TV
• 1/4 VGR CMOS camera
• IR emitter for night vision
• 49MHz control frequency

• Up to 75 ft. range
(more)

Stay tuned for our yearly review of children's spy toys. The list gets longer each year. You will either find it fascinating, or revolting ...depending upon your moral quotient.
But, who are we to judge?
Right, Santa?

"Spy Software for Mobile Phones" Skirts Laws

via Wired...
Arizona company Retina-X Studios has released the latest version of Mobile Spy, a monitoring software for smartphones.


The software allows users to spy on SMS text and call details in real time online. The program runs in total stealth mode and no entries are shown inside a phone's task manager, says the company.
.. The details can be then checked online without any further access to the phone.

The software is available for Windows Mobile and Symbian OS smartphones and a version for the iPhone is in development for a December release, says the company. Currently it is priced at $50 for three months use and $100 for a year.


This may be legal in some circumstances but it raises privacy questions.
• In what circumstances is it okay to use this phone?
• Can spying on kids really help create a better relationship with them?
• Or, to what extent can taking away employees' privacy be justified in the name of protecting the secrets of a corporation? (more)

Note: "Mobile Spy" does not allow audio eavesdropping, which explains how it circumvents current U.S. privacy laws.

Skype Acknowledges Chinese Spying

Skype's president has acknowledged that users in China have had instant messages both blocked and copied to servers owned by TOM Online, Skype's partner in the country.

According to Skype president Tom Silverman, Skype knew when it partnered with TOM that TOM would censor instant-messages containing certain keywords, according to rules set down by the Chinese government. Although Skype provides the underlying software code, TOM is considered to be the majority partner in China.In his blog post, Silverman reminded Skype's customers that the company had no intention of spying on customers that used the official version of Skype outside of China...

As Reuters noted, however, the TOM-Skype version of the Skype software is the only version that can be accessed inside the company.

"It's important to remind everybody that the issues highlighted in yesterday's Information Warfare Monitor / ONI Asia report refer only to communications in which one or more parties are using TOM software to conduct instant messaging," Silverman added. "It does not affect communications where all parties are using standard Skype software. Skype-to-Skype communications are, and always have been, completely secure and private." (maybe not) (more)

Friday, October 3, 2008

32 SpyCams. 14 Mics. 20 Years. 2000 Charges.

A SpyCam World's Record?
PA - The Norristown landlord who allegedly concealed cameras throughout his tenants' apartments for two decades...

Thomas C. Daley hiked his light-blue denim shirt up over his face... on his way into district court. There, the 45-year-old Phoenixville resident was arraigned on more than 2,000 charges by Magisterial District Judge Francis Lawrence Jr....

Prosecutors withdrew the two criminal complaints filed last month against Daley, replacing them with one document that added offenses related to 25 additional victims. That brings the total of victims identified in the complaint to 34 - all of whom "feel completely violated," said Montgomery County District Attorney Risa Vetri Ferman...

Ferman said authorities believe the real number of victims is substantially higher than 34. She said that police found 32 cameras, 14 of which had audio capability, and that Daley admitted spying on his female tenants - and their guests - for 20 years.

The statute of limitations for Daley's crimes allows prosecutors to file charges dating back three years...

Surrounded by piles of Daley's electronic equipment, Ferman detailed the "incredibly sophisticated scheme" he employed to catch his female tenants, most aged 20 to 30, in "compromising positions."

In some instances, the screws holding doorbells, towel rods, and ceiling fans were hollowed out to create "pinholes" linked to hidden cameras, she said. Daley ran lines into the basements of his apartment buildings, connecting them to DVRs; those were then connected to the Internet so he could access the footage from home, Ferman said...

The judge scheduled a formal arraignment date of Dec. 3 for and set bail at $1 million; Daley, again covering his face with his shirt, was returned to the Montgomery County jail. (more) (history)

Thursday, October 2, 2008

Spying on Chinese Skype

Among China’s community of dissidents and activists, there’s a commonly held belief that, while e-mail and regular phone conversations may be subject to surveillance, Skype is safe from such interference.

Not so, according to a new report, which has uncovered a far-reaching web of surveillance of text messages sent through Tom-Skype, a Chinese joint venture between Ebay, which owns Skype, and Tom Online, the Chinese Internet subsidiary of Tom Group, a Hong Kong-based company controlled by billionaire Li Ka-Shing...

The full report is available here. Key findings are summarized...

–Full text chat messages of Tom-Skype users are regularly scanned for sensitive keywords. If the keywords are found, the messages are uploaded and stored on Tom-Skype’s servers in China.

–The text messages and other records containing personal information are stored on publicly accessible Web servers along with the encryption key that allows the data to be decrypted.

–Keyword scanning looks for terms relating to sensitive topics such as Taiwanese independence, banned religious sect Falun Gong, and opposition to the Communist Party.

–The surveillance may not be solely keyword-driven, as a number of stored messages contained only common words. The report suggests that “that there may be criteria, such as specific usernames, that determine whether messages are captured by the system.”

–The report focuses on text messages, but it says that information on voice calls is also being stored. Logs dating from August 2007 contain records of the IP addresses and usernames of all participants in voice calls (including the username and/or phone number of the recipient). (more)

15 Great, Free Privacy Downloads

One of the worst privacy invaders the world has ever seen is the Internet. When you surf, Web sites can find out where you've been and can gather other information about you. Trojan horses and spyware can snoop on you. Key loggers can capture your keystrokes as you type. Eavesdroppers can steal your passwords.

It doesn't have to be that way. These free products can save you from malicious software and eavesdroppers. Don't leave your PC exposed and vulnerable. (more)

Tuesday, September 30, 2008

jbond ( 007 ) Power Seller



UK - Police are investigating the sale of a digital camera said to contain MI6 images of
terror suspects, the Foreign Office has said. The camera was bought for £17 on auction website eBay by a 28-year-old from Hemel Hempstead, Hertfordshire. The pictures were also said to include rocket launchers and missiles. ...refused to comment on the report that the camera was sold by an MI6 agent. (more)

Monday, September 29, 2008

MacSpy - Video Surveillance Goes Franchise

The 1970's dream of Dictograph Surveillance Centers has finally come true. Franchise video monitoring is now real.

Dictograph pioneered franchise security and even had a "Video Surveillance Center" before it was technologically feasible.

The center consisted of a wall of wooden outlines of TV monitor screens with photographs of client locations pasted in the screen spaces. To add realism,
the photos had horizontal TV scan lines superimposed over the picture.

A poster-sized photograph of this wall – complete with an official surveillance person eyeing the wall carefully – was placed at client locations to let employees know that they were being watched. Hollywood, but it worked.

In fact, usually only one of the client location cameras was hooked to a local monitor. The rest of the cameras were empty shells with a big red blinking tally light on the front.

The future is here, and so are new video surveillance franchises, like MonitorClosely.com

and SightMind

FutureWatch – "Neighborhood Watch Alarms" A sales technique to convince entire neighborhoods to sign on with one provider. The hook... When trouble is spotted on one system, all the neighbors will be instantly alerted.

How do I know about the fake video wall?
I was one of those official surveillance persons.
And, I kept the secret, until now.

SpyCam Story #476 - Follow Me Roaming

Singapore - A brain might well be added to those all-seeing eyes along streets, train stations and shopping centres.

The Home Affairs Ministry wants those surveillance cameras put to more pro-active use, with new technology that can detect a face in a crowd, for example.


Last month, it made pu
blic two 'request for information' (RFI) documents asking about two similar types of technology: one that can recognise suspects by their facial features and another that can pick out objects of interest - from video footage. (more) (spoof video)

FutureWatch - Although facial recognition and tracking didn't catch on the first go-around (the Tampa, Florida experiment), it is ripe for a come-back. 5 years from now, this will be commonplace – along with automatic license plate readers and motion-intention evaluators.

Flashback - August 23, 2003
It is with sadness we note the demise of our favorite city motto... Tampa - "You're only a stranger here once."

August 2003 - Tampa police have scrapped their controversial security camera system that scanned city streets for criminals, citing its failure over two years to recognize anyone wanted by authorities.

History...
July 2001 - The Tampa City Council took a fully-informed look at Ybor City's controversial high-tech face-scanning software. When the dust settled, the council split down the middle with a 3-3 vote on whether or not to do away with the face-scanning software.
http://www.spybusters.com/SS018.html (search word: Ybor)

A Nobel Change of Heart

Sweden's ruling four-party coalition added a series of amendments on Thursday to a law for monitoring cross-border internet and telephone traffic, bowing to pressure from privacy advocates and worried legislators.

Under the revised bill, the military National Defence Radio Establishment will be allowed to monitor Swedes' internet usage as well as content from e-mails, phone calls and mobile text messages, but only after getting court approval. (more)

Sunday, September 28, 2008

Spys Under Fire

Grenada's former spy chief, Assistant Superintendent of Police (ASP), Anthony De Gale has finally been questioned in connection with reports of missing files from the department. De Gale was questioned on Tuesday by members of the Criminal Investigation Department (CID) at their location on Hillsborough Street, St. George's. The Spy Master was sent on his 120 days accumulated leave by newly installed Police Commissioner, James Clarkson after it was discovered that at the files at Special Branch were destroyed immediately after the July 8 General Elections which brought the then opposition National Democratic Congress of Tillman Thomas to power. (more)

Former India coach Greg Chappell on Saturday laughed off speculation that he was passing on secret information about the Indian team to Australia. Chappell, who quit as India coach last year after the team's first-round exit at the World Cup, is now touring with the Australian team as their assistant coach. (more)

And... they fire back!
A former MI5 chief, Dame Stella Rimington, has criticised the government's plans to extend the period under which suspects can be held without charge.

In comments cited by the Guardian newspaper, the ex-intelligence supremo said the 42-day detention plans were
excessive.

Dame Rimington was speaking at the Crime Scene festival where she was lau
nching her espionage thriller, Dead Line. (more)

Bonus points:
Guess who is who.

--------------------------------
Update - The winner is my very knowledgeable conterespionage colleague from Australia, who writes...
"Dame Stella Rimington was the former head of the domestic counter intelligence agency 'The Security Service' (aka MI5) whereas Dame Judy Dench plays the role of M (head of the Foreign Intelligence Service 'The Secret Service' aka MI6) in the James Bond Series.
So they don't represent the same agency... small point I know :)"

And I thought the casting department was being clever. Never underestimate the vast knowledge of the Security Scrapbook readership!

Have a spy question? Send it in. If I don't know the answer, I am sure one of our readers knows.

Tracking a Corporate Spy

May 1988: On behalf of the U.S. Surgical Corp., Mary McFate begins monitoring an animal rights group protesting the company's use of dogs in surgical training at its Connecticut headquarters. As an undercover agent, McFate meets activist Fran Trutt at a rally and records her making threats to kill company president Leon C. Hirsch. McFate reports the threat to Hirsch and begins extensively monitoring Trutt.
From here the story gets weirder... (more)

August 2008: After reports of connections to the NRA, gun safety advocates try contacting McFate. Unable to do so, they expel her.

Put us on our team before you corporation has to deal with espionage issues like these.

Eavesdrop on Astronauts

Conversations between astronauts aboard the International Space Station and flight controllers on the ground now are available for the public to hear live, 24 hours a day, seven days a week on NASA's Web site.

The streaming audio of space-to-ground communications includes NASA commentary during specific station mission events and regularly scheduled space station commentary on NASA Television Monday through Friday at 10 a.m. Central time. NASA already provides this space-to-ground communication with commentary during space shuttle missions.

The streaming station and shuttle mission audio is available on the following NASA sites:
- Under the NASA TV (Live) tab at: http://www.nasa.gov
- Under the left navigation at: http://www.nasa.gov/station and http://www.nasa.gov/shuttle
- In the list of channels at: http://www.nasa.gov/ntv

Spouse Spying Causes More Problems

New Zealand - Suspicious spouses who use spy software to track phone calls and text messages on their cheating partner's cellphone may be breaking the law.

One website to offer the spyware service, Flexispy, allows people to download the software to a suspected adulterer's internet-capable phone for a fee. The virtually undetectable software tracks every text and phone call made from the phone and a summary can be viewed online. But New Zealand Institute of Professional Investigators president Trevor Morley says use of the software would amount to phone-tapping, which is illegal in this country.

"Even if it was not an offence under the... Crimes Act provisions to use that software, we suggest that its use would definitely be a breach of various provisions of the Privacy Act.

Assistant privacy commissioner Katrine Evans said there were cases where spying or surveillance by a parent of a child or within a couple did not breach privacy laws. (more)

The same is generally true in the United States of America.

Low-Tek, Bones

OH - A Strongsville chiropractor was convicted Friday of spying on female patients as they undressed in his offices.

James Starek, 38, pleaded no contest to misdemeanor charges of voyeurism and obstruction of justice. Berea Municipal Judge Mark Comstock found him guilty. A sentencing date was not immediately set.

Mary Ann Suchan said she quit working for Starek after her daughter Stephanie raised concerns about unusual behavior by the doctor and a suspicious mirror in a room where she undressed.

Stephanie Suchan said she suspected the mirror was actually two-sided. Her mother later removed the roughly 8-by-10 mirror while Starek was away and found a large hole in the wall, she said. The women took photos of the hole and shared them with Strongsville police and reporters. (more)

Saturday, September 27, 2008

SpyCam Story #475 - Vermont Made

A former University of Vermont student is admitting he used cameras to spy on people.

Jordan Yarosh, 18, pleaded guilty in court Tuesday to three counts of voyeurism. Yarosh placed hidden cameras, disguised as clock radios, in various bathrooms. (more)

Spycam Story #474 - Sign of the Times

35+ Surveillance cameras spy on the product in a window display.

Overkill for shoplifters?
Hardly.

"Everyone notices you when you carry the right bag, even all the surveillance cameras. It's a sign of the times."


Louis Vuitton: luxury leather luggage, French fashion designer, society's pulse taker. Seen in Century City, CA by Secret Agent AT.

Wednesday, September 24, 2008

Bin there... dunned that.

Pakistan recovers 'US spy drone'
A military spokesman told the BBC that the drone was recovered on Tuesday in the South Waziristan tribal area and the wreckage was being examined. (more)

"Me, too"
Georgia today said it had shot down a Russian drone over territory close to the breakaway province of South Ossetia, which is due to be patrolled by EU observers. (more)

Estonia Catches Its First Spy!

Estonian police have arrested high-ranking member of the Defense Ministry Herman Simm on accusations of espionage. His wife Heete Simm, a police lawyer, faces similarly charges. Estonian authorities have not named the country the couple were providing information to, but Estonian media and local experts claim it was Russia. (more)

SpyCam Story #473 - His Indespensible Disposable

UT - A man is accused of hiding a camera in the bedroom of an acquaintance so he could watch her undress. In charges filed Monday, police wrote that the victim found an electronic surveillance camera May 10 in her Millcreek home. The camera was hidden inside a disposable camera and placed behind her desk, pointed toward the area in the bedroom where she dresses, police wrote. A small antenna was attached to transmit the images, police wrote. In July, another woman told police that her boyfriend admitted to putting the camera there, saying he was "addicted to pornography and wanted to see it in real life," investigators wrote. The man was charged with voyeurism and obstruction of justice, both misdemeanors. (more)

A Different Governmental Drummer

The Guyana Postal and Telecommunications Workers Union (GPTWU) has called on the government to withdraw legislation that will allow the authorities to tap and intercept telephone conversations. (more)