The maker of Bratz dolls accused Mattel Inc. of spying on its rivals and stealing trade secrets for at least 15 years, as the ongoing legal battle between the two toymakers turns nastier.
Bratz maker MGA Entertainment Inc. alleges employees for Mattel, maker of the rival Barbie doll, used fake name badges to gain entry to private showrooms of MGA, Hasbro Inc., and other toy manufacturers, according to a federal filing late Monday.
In the court papers, MGA also alleges Mattel secretly photographed new toy product designs at toy fairs held in different countries.
The allegations are part of the dirty doll laundry that will be aired in the retrial of the Bratz doll copyright infringement case, set for Jan. 11 in Santa Ana, Calif. (more)
Saturday, August 21, 2010
M-I-Cee (see you real soon) K-E-Y (why...)
Walt Disney’s Internet subsidiary, along with several partners, are being sued for allegedly spying on minors. (Complaint) (coffee cup) Have a nice read.
"Tap'em Dano!"
Don't have a voice recorder handy?
Clumsy with tech gear?
No problem. MyPhoneTap.com to the rescue.
from the website...
Record Your Business Calls
Don't miss a single important detail! Now you can pull up that call from three months ago within seconds. Is a team member going to miss an important conference call? Record it for them!
Record Your Friends
Can't remember when or where the party is going to be? You could listen to the call again if you had a recording of it.
Record Your Enemies
Do you feel threatened? Is someone harassing you? Record the call for the proof you need. (more)
Don't miss a single important detail! Now you can pull up that call from three months ago within seconds. Is a team member going to miss an important conference call? Record it for them!
Record Your Friends
Can't remember when or where the party is going to be? You could listen to the call again if you had a recording of it.
Record Your Enemies
Do you feel threatened? Is someone harassing you? Record the call for the proof you need. (more)
Nice touch...
FAQ
Is recording my phone calls legal?
- Yes! There are currently twelve states in the USA that require both parties involved to know that the conversation is being recorded. If the person you are calling is in one of those states we will prompt you to notify them that the call is being recorded. For international calls we will always prompt you to notify the person you are calling.
Why do I mention it?
So you will know what you are up against!
And you though every country already wiretapped.
St Kitts and Nevis’ Attorney General and Minister of Justice and Legal Affairs, Patrice Nisbett, has expressed confidence that the proposed Interception of Communication Bill that will allow wiretapping, contains built-in safeguards to prevent abuse and protect political freedoms. (more)
Monday, August 16, 2010
Wash Your Hands Before Leaking
A study by Department of Computer and Information Science at the University of Pennsylvania has found that it can be possible to uncover passwords by analyzing the smudges left on touchscreen phones. Touch screens are touched, so oily residues, or smudges, remain on the screen as a side effect. Latent smudges may be usable to infer recently and frequently touched areas of the screen - a form of information leakage.
The researchers said that they believe smudge attacks are a threat for three reasons. First, smudges are surprisingly persistent in time. Second, it is surprisingly difficult to incidentally obscure or delete smudges through wiping or pocketing the device. Third and finally, collecting and analyzing oily residue smudges can be done with readily-available equipment such as a camera and a computer.
The analysis requires a photograph of the screen to be uploaded to a computer. However, the presumption that lighting conditions would affect the quality of the photo, and hence the ability to extract passwords was shown to be false. In one experiment, the pattern was partially identifiable in 92% and fully in 68% of the tested lighting and camera setups. Even in our worst performing experiment, under less than ideal pattern entry conditions, the pattern can be partially extracted in 37% of the setups and fully in 14% of them.
By enhancing the photo of the screen in the computer, the smudge patterns could be seen. Critically, the requirement of the password structure as used in Android phones resulted in distinctive patterns, which lead to the ability to work out which "buttons" were pressed. (more) (presentation paper)
The researchers said that they believe smudge attacks are a threat for three reasons. First, smudges are surprisingly persistent in time. Second, it is surprisingly difficult to incidentally obscure or delete smudges through wiping or pocketing the device. Third and finally, collecting and analyzing oily residue smudges can be done with readily-available equipment such as a camera and a computer.
The analysis requires a photograph of the screen to be uploaded to a computer. However, the presumption that lighting conditions would affect the quality of the photo, and hence the ability to extract passwords was shown to be false. In one experiment, the pattern was partially identifiable in 92% and fully in 68% of the tested lighting and camera setups. Even in our worst performing experiment, under less than ideal pattern entry conditions, the pattern can be partially extracted in 37% of the setups and fully in 14% of them.
By enhancing the photo of the screen in the computer, the smudge patterns could be seen. Critically, the requirement of the password structure as used in Android phones resulted in distinctive patterns, which lead to the ability to work out which "buttons" were pressed. (more) (presentation paper)
Saturday, August 14, 2010
Spy Phone Numbers
"When the joint is jumpin' and spies are thumpin' it ain't the time to share your number pumpkin." (c. 1942. Some jerk who thought they sounded like Bogart.)
• Need to protect your real cell or home phone number?
• Not sure about that new guy who asked you out?
• Worried your informant will be caught with your number?
• Need a safe number your spies can call in on?
You need TossableDigits! Expendable phone numbers that contact your private line and evaporate when your caller needs to be hung out to dry.
• Need to connect two adversaries through the web?
• Need to connect your spies to each other over the phone without revealing their phone numbers to each other?
You need Click to Call! The anonymous phone connection.
• Did "M" not sound quite right during your morning briefing?
• Not sure your tipsters are calling from where they say they are?
• Need proof the real Home Office is requesting the microdot?
• Is the Lady Spy Caller ID spoofing the White and Black spies?
You need Phone Number Verification! Make them prove they are calling from the number they say they are calling from.
As Fats used to say,
Friday, August 13, 2010
The Eavesdropping Palm Pre Cell Phone
A British internet security company has demonstrated how to turn the Palm Pre into a secret bugging device, ideal for corporate espionage, and issued a warning that many other popular smartphones are also vulnerable to hackers.
In-house hackers at Basingstoke-based MWR InfoSecurity have created a bug hidden in an electronic business card, or vcard, which enabled them to use the Pre to record conversations and send the audio file back to them, whenever it is connected to a WiFi or 3G network – all without the user being aware anything at all is happening.
The company's 26-year-old principal security researcher – who gives his name only as Nils, and who was hired by MWR last year after having been a freelance hacker since his teens – demonstrated the security flaw in the Pre to journalists and IT specialists this week, saying the phone was "easy" to break into. (more)
In-house hackers at Basingstoke-based MWR InfoSecurity have created a bug hidden in an electronic business card, or vcard, which enabled them to use the Pre to record conversations and send the audio file back to them, whenever it is connected to a WiFi or 3G network – all without the user being aware anything at all is happening.
The company's 26-year-old principal security researcher – who gives his name only as Nils, and who was hired by MWR last year after having been a freelance hacker since his teens – demonstrated the security flaw in the Pre to journalists and IT specialists this week, saying the phone was "easy" to break into. (more)
Wednesday, August 11, 2010
The Farewell Dossier
Movie Synopsis...
Engaging, emotional and riveting, FAREWELL is an intricate and highly intelligent thriller pulled from the pages of history about an ordinary man thrust into the biggest theft of soviet information of the Cold War. A piece of history largely unknown until now, which Ronald Reagan called "one of the most important espionage cases of the 20th century." Directed by Christian Carion. (Trailer)
Engaging, emotional and riveting, FAREWELL is an intricate and highly intelligent thriller pulled from the pages of history about an ordinary man thrust into the biggest theft of soviet information of the Cold War. A piece of history largely unknown until now, which Ronald Reagan called "one of the most important espionage cases of the 20th century." Directed by Christian Carion. (Trailer)
Review...
The movie does reflect the reality of the “Farewell” material: that it revealed to Western intelligence the extent to which Soviet economic development in the 1960s and ’70s was almost entirely the result of industrial espionage... The obsession in the early 1980s with the problem of “technology transfer” arose as a direct result of the Farewell dossier, and in a 1983 National Security Decision Directive, preventing technology loss became a key element of American foreign policy. (more)
Vcard Pops Privacy on Palm Pre. Android Cookies Eaten.
Major vulnerabilities in the Palm Pre and Android smartphones have been detected that could allow data to be stolen.
Research by MWR Labs has revealed a major flaw in the Palm Pre that would allow conversations to be intercepted, while a flaw in the Android operating system from 2.0 onwards exists in the browser and allows login credentials and cookies to be harvested.
A spokesperson demonstrated that sending a Vcard to the Palm Pre allows an attacker to compromise the phone and intercept all audio close to the phone. They said that this is a completely focussed attack that targets a specific user. Alex Fidgen, director at MWR Labs told SC Magazine that this represents industrial espionage and if this was done over a carrier network it would be breaking the law. (more)
Labels:
advice,
cell phone,
data,
eavesdropping,
espionage,
Hack,
leaks,
spyware
Tire Pressure Sensor Surveillance - A Re-Tread
Researchers from Rutgers University and University of South Carolina have found that wireless communications between new cars and their tires can be intercepted or even forged...
The researchers will present their findings at the Usenix Security Symposium, being held this week in Washington D.C.
The tire pressure monitoring systems (TPMS) consist of battery-powered radio frequency identification (RFID) tags on each tire, which can respond with the air pressure readings of the tire when wirelessly queried by an electronic control unit (ECU).
The researchers had found that each sensor has a unique 32-bit ID and that communication between the tag and the control unit was unencrypted, meaning it could be intercepted by third parties from as far away as forty meters. (more)
Readers of Kevin's Security Scrapbook were advised of this back in 2008. See Track My Treads - TPMS Privacy Blowout.
Readers of Kevin's Security Scrapbook were advised of this back in 2008. See Track My Treads - TPMS Privacy Blowout.
Sexting, Speeding Teens Beware the Ra-Parents
Parents Are Listening Services Inc., (has) developed a program to better allow parents to monitor the contents coming into their children's cellphones. (Launching in September.)
It's one of many companies developing software designed to alert parents when children and teenagers exchange lewd text messages, communicate with predatory adults or taunt each other via social-networking websites. Another feature aims to curb texting and driving by disabling the messaging feature in a moving vehicle...
WebSafety Inc., based in Irving, Texas, offers a similar monitoring program that's been available for five months. The company's software draws from a unique library of 6,000 phrases deemed inappropriate, including slang and online abbreviations.
The program can monitor text messages, emails, instant messages and updates to social-networking sites such as Facebook. By using the phone's Global Positioning System, or GPS, features, parents can also set up no-text zones, such as on school grounds, to prevent students from using their phones to cheat on tests or taunt classmates.
Both Kid Phone Advocate and WebSafety's application send alerts as emails or text messages to the parent's computer and phones. The programs typically run in the background, so children don't know the alerts are being sent out.
GoGoStat, from Schakra Inc. of Redmond, Wash., was created by a team of former Microsoft Corp. employees. Like the other mobile parental apps, GoGoStat monitors the messages children send and receive to each other on Facebook, as well as photos that are exchanged. The program, however, doesn't have to be installed on the computer or cellphone; the app runs within Facebook. (more)
It's one of many companies developing software designed to alert parents when children and teenagers exchange lewd text messages, communicate with predatory adults or taunt each other via social-networking websites. Another feature aims to curb texting and driving by disabling the messaging feature in a moving vehicle...
WebSafety Inc., based in Irving, Texas, offers a similar monitoring program that's been available for five months. The company's software draws from a unique library of 6,000 phrases deemed inappropriate, including slang and online abbreviations.
The program can monitor text messages, emails, instant messages and updates to social-networking sites such as Facebook. By using the phone's Global Positioning System, or GPS, features, parents can also set up no-text zones, such as on school grounds, to prevent students from using their phones to cheat on tests or taunt classmates.
Both Kid Phone Advocate and WebSafety's application send alerts as emails or text messages to the parent's computer and phones. The programs typically run in the background, so children don't know the alerts are being sent out.
GoGoStat, from Schakra Inc. of Redmond, Wash., was created by a team of former Microsoft Corp. employees. Like the other mobile parental apps, GoGoStat monitors the messages children send and receive to each other on Facebook, as well as photos that are exchanged. The program, however, doesn't have to be installed on the computer or cellphone; the app runs within Facebook. (more)
Monday, August 9, 2010
Industrial espionage in the 500's shapes the world.
Industrial espionage can alter the wealth of a nation and thus its capacity to compete commercially and wage war. A great example of this took place around 550 CE, when Justinian I, leader of the Byzantine empire wanted to undo China’s historic domination of the silk trade and, at the same time, end the Persian control of this valuable commodity as the middlemen.
Justinian I was undeterred in wresting this information from China, which they protected under penalty of death. So he sent two Nestorian monks into China with the specific intent of conducting industrial espionage. While in China they observed how silk was produced and what the key ingredients were used in silk production. The monks took two hollowed out walking sticks with them (“concealment devices” in intelligence talk) and hid silk worms and mulberry bush seeds inside them — both essential for silk production.
The monks were stopped and searched repeatedly on their journey home. Nevertheless, they were successful in their quest: they single-handedly transferred the technology for silk production to the West and within a short period of time, the silk trade had been completely upended. Byzantium, and thus the Roman Empire, became the world leader in silk production, which is probably why my ties are made in Milan and not in Beijing.
This act of espionage changed trade throughout the world. (more)
Do not make the mistake of thinking industrial espionage is of little consequence. Call me, or the counterespionage specialist who sponsors Kevin's Security Scrapbook.
History also presents second version of this great espionage story. It is called "The Legend of the Silk Princess." You can listen to it here.
Do not make the mistake of thinking industrial espionage is of little consequence. Call me, or the counterespionage specialist who sponsors Kevin's Security Scrapbook.
History also presents second version of this great espionage story. It is called "The Legend of the Silk Princess." You can listen to it here.
Industrial espionage in the 1700 & 1800's shapes the world.
Sarah Rose is the author of For All the Tea in China, which tells the true story of how tea and industrial espionage fueled the great expansion of the British Empire and the East India Company in the 1800s. The book focuses on one central character, Robert Fortune, who was a scientist sent by the British government to literally steal the secret of tea production from China, plant the Chinese tea in Darjeeling, and thus make the British Empire less reliant on trade with the Chinese and more self-sufficient by harvesting its own tea in colonial India. (more)
Industrial Espionage and Technology Transfer: Britain and France in the Eighteenth Century by J.R. Harris
Britain and Europe were the leading industrial nations in 18th-century Europe. This text examines the rivalry which existed between the two nations and the methods used by France to obtain the skilled manpower and technology which had given Britain the edge, particularly in the new coal-based technologies. Despite the British Act of 1719 which outlawed industrial espionage and technology transfer, France continued to bring key industrial workers from Britain and to acquire British machinery and production methods. Drawing on archival material, John Harris investigates the nature and application of British laws and the attitudes of some major British industrialists to these issues. He also discusses the extent to which French espionage had any real success.
Lieven Bauwens (June 14, 1769, Ghent – March 17, 1822, Paris) was a Belgian entrepreneur industrial spy and who was sent to Great Britain at a young age and brought a spinning mule and skilled workers to the European continent. (more)
Smuggling or abduction were not the style of the pious Thomas Whitty of Axminster, although he was not averse to a spot of industrial espionage. Enthused by an entrepreneur's desire to produce faster, wider and cheaper, he visited London in 1755 and took lodgings at the Golden Lion in Fulham. There, he made the acquaintance of a weaver from the factory of Parisot and inveigled a tour of the premises. The knowledge he gleaned enabled him to start making similar carpet in Devon. Increasing competition wiped out Parisot. (more)
Francis Cabot Lowell saw an opportunity in cotton. On the advice of his doctor, in 1810 he took a trip to England to recuperate from his stress. Over the next two years, Lowell visited textile mills in booming Lancashire County and in Scotland, where he saw machines for weaving cloth that were technologically superior to those in America. The British knew this too; they'd made it illegal to let proprietary loom technology out of the country. Undeterred, Lowell memorized the design of the textile machines, and when he returned to New England in 1812, he began work on recreating them in Waltham, Mass. (more) Thanks to a combination of immigrant British technicians, patent infringements, industrial espionage, and local innovations, American power looms were on a par with the English machines by the end of the 1810s. (more)
According to presumptions the Chinese manufactured porcelain, which was filmy, yet outstandingly hard, as early as in the 7th century. Porcelain reached Europe only by the end of the 13th century and rapidly spread in the centuries to come without anyone knowing the secret of its production. It decorated the tables of sovereigns and noblemen, since they were the only ones who could afford it. The Chinese tried to mystify the secret even more by legends and myths. Since they enjoyed a monopoly in manufacturing porcelain, the price of china was very high for a very long time. The mystery of porcelain manufacturing was uncovered in Europe only in the 18th century. The secret reached Paris with the assistance of a Catholic priest, d'Entrecolles, who had served as a Jesuit missionary in China. The priest paid a visit to the centre of the royal porcelain manufacture (Kin Te-chen) where he carefully observed everything, then passed on his information to Europe in the form of letters. He gave minute accounts of his visit to the "secret city". He described the location of the city, the life of the potter families living there, and the security measures introduced, in detail. He carefully observed the process of porcelain production. In spite of the distrust of the Chinese authorities and the stringent security measures the priest managed to send a sample of china clay, (also called porcelain clay, or kaolin) one of the main basic raw materials of porcelain to Europe. (more)
Do not make the mistake of thinking industrial espionage is of little consequence. Call me, or the counterespionage specialist who sponsors Kevin's Security Scrapbook.
"We all prisoners, chickee-baby. We all locked in."
...the position of the Chinese leaders was that China can do no wrong. If Chinese espionage agents abroad were caught in the act, Beijing’s retort would claim false accusations to denigrate China. They would leave it to public memory to fade and forget about it. (more)
The public's memory does fade. Remember silk, gunpowder, porcelain, cloisonne enamel, the compass, Xuan paper, movable type, ink and tea? All became products of the world with the help of a little industrial espionage. All taken from China. What went around, is now going around. You know, "For the loser now will be later to win..." Espionage is just another of life's mandalas.
If you think you know who your competition is (or isn't), you'll be surprised. The winners keep proactively protective. The smug get their pockets picked.
Friday, August 6, 2010
GPS = Global Phone Snitch
via The Wall Street Journal...
Phone companies know where their customers' cellphones are, often within a radius of less than 100 feet. That tracking technology has rescued lost drivers, helped authorities find kidnap victims and let parents keep tabs on their kids.But the technology isn't always used the way the phone company intends.
Technology is enhancing the reach of stalkers, allowing them to take advantage of location-based social networking applications. WSJ's Andy Jordan reports.
The allegations are a stark reminder of a largely hidden cost from the proliferation of sophisticated tracking technology in everyday life—a loss of privacy.
Global-positioning systems, called GPS, and other technologies used by phone companies have unexpectedly made it easier for abusers to track their victims. A U.S. Justice Department report last year estimated that more than 25,000 adults in the U.S. are victims of GPS stalking annually, including by cellphone.
A spokesman for AT&T Inc. says it notifies all phone users when tracking functions are activated. (They send a text message upon initial activation. Useless if the stalker has the phone at that moment.) But users don't have the right to refuse to be tracked by the account holder. Turning off the phone stops the tracking.
Courtesy Executrac Mobile GPS Tracker |
...an unintended consequence of federal regulations that require cellphone makers to install GPS chips or other location technology in nearly all phones. The Federal Communications Commission required U.S. cellular providers to make at least 95% of the phones in their networks traceable by satellite or other technologies by the end of 2005. The agency's intention was to make it easier for people in emergencies to get help. GPS chips send signals to satellites that enable police and rescue workers to locate a person.
Craig Thompson, Retina-X's operations director, says the software (cell phone spyware) is meant to allow parents to track their kids and companies to keep tabs on phones their employees use. He says the company has sold 60,000 copies of MobileSpy. The company sometimes gets calls from people who complain they are being improperly tracked, he says, but it hasn't been able to verify any of the complaints. (Think they tried very hard?)
GPS-tracking systems provided by cellular carriers such as AT&T and Verizon Communications Inc. are activated remotely, by the carriers. (more)
Thursday, August 5, 2010
iAppalling
Several versions of Apple's iPhone, iPad, and iPod Touch have potentially serious security problems, a German government agency said in an official warning Wednesday.
Apple's iOS operating system has "two critical weak points for which no patch exists," the Federal Office for Information Security said.
Opening a manipulated website or a PDF file could allow criminals to spy on passwords, planners, photos, text messages, e-mails and even listen in to phone conversations, the agency said in a statement. "This allows potential attackers access to the complete system, including administrator rights," it added, urging users not to open PDF files on their mobile devices and only use trustworthy websites until Apple Inc. publishes a software update.
"It has to be expected that hackers will soon use the weak spots for attacks," it said, noting that the devices' popularity could lead to attacks within the corporate world — possibly facilitating industrial espionage. (more)
Wednesday, August 4, 2010
BlackBerry Squeezing Season
Indonesia considers joining a growing list of countries, including India, Saudi Arabia and the UAE in banning BlackBerry devices; Research in Motion is receiving increasing pressure to allow government access to data generated by the hand-held devices. (more)
Treat it Like a Social Disease - Don't Trust
Social engineering hackers -- people who trick employees into doing and saying things that they shouldn't -- took their best shot at the Fortune 500 during a contest at Defcon Friday and showed how easy it is to get people to talk, if only you tell the right lie.
Contestants got IT staffers at major corporations, including Microsoft, Cisco Systems, Apple and Shell, to give up all sorts of information that could be used in a computer attack... The first two contestants made it look easy.
Wayne, a security consultant from Australia who wouldn't give his last name, was first up Friday morning. His mission: Get data from a major U.S. company.
Wayne, a security consultant from Australia who wouldn't give his last name, was first up Friday morning. His mission: Get data from a major U.S. company.
Sitting behind a sound-proof booth before an audience, he connected with an IT call center and got an employee named Ledoi talking. Pretending to be a KPMG consultant doing an audit under deadline pressure, Wayne got Ledoi to spill details, big time... (more)
Security DIrector's Tip: This topic should be part of every employee's security briefing. (instant education)
Tuesday, August 3, 2010
The $1,500.00 Cell Phone Call Interceptor Demo'ed
Researcher Chris Paget pulled off a stunt at the Defcon security conference Saturday that required as much legal maneuvering as technical wizardry: eavesdropping on the cell phone calls of AT&T subscribers in front of thousands of admiring hackers.
With about $1,500 worth of hardware and open source software, Paget turned two on-stage antennas into a setup capable of spoofing the base stations that connect the GSM cell phone signals used by AT&T and T-Mobile. Paget set his hardware to impersonate an AT&T signal, and dozens of phones in the room connected to his fake base station. "As far as your cell phones are concerned, I'm now indistinguishable from AT&T," he told the crowd.
Paget invited anyone with an AT&T phone to make a call, and using his GSM hijacking trick, routed their calls through a voice-over-Internet system that connected their calls even while recording the audio to a USB stick--which he promptly destroyed with a pair of scissors to make sure he hadn't violated any privacy laws. The hack, after all, was intended to show the fundamental insecurity of GSM cell signals--not spy on callers. (more)
P.S. This works on G2 protocol systems, not G3.
The GSM Association responded in a statement that lists the limitations to Paget's method: the eavesdropper would have difficulties identifying or targeting any specific user, the interception only works within a certain range, in some cases, the call's encryption could prevent eavesdropping, and GSM phones are designed to alert users when encryption is removed by a base station. (Paget said in his talk that no device he's tested--including iPhone and Android phones--has had this option enabled.)
In summary, the GSM Association spokeswoman writes, "The overall advice for GSM calls and fixed line calls is the same. Neither has ever offered a guarantee of secure communications. The great majority of users will make calls with no reason to fear that anyone might be listening. However users with especially high security requirements should consider adding extra, end to end security features over the top of both their fixed line calls and their mobile calls."
Free CIA / Google App Tells Future
Google and the CIA are both investing in a company that monitors the web in real time.
The company is called Recorded Future, and it scours tens of thousands of websites, blogs and Twitter accounts to find the relationships between people, organizations, actions and incidents — both present and still-to-come. In a white paper, the company says its temporal analytics engine "goes beyond search" by "looking at the 'invisible links' between documents that talk about the same, or related, entities and events."
The idea is to figure out for each incident who was involved, where it happened and when it might go down. Recorded Future then plots that chatter, showing online "momentum" for any given event.
"The cool thing is, you can actually predict the curve, in many cases," says company CEO Christopher Ahlberg, a former Swedish Army Ranger with a PhD in computer science. (more)
Want to see the future? Recorded Future will let you sign up for a free account ...but they already knew you would.
The company is called Recorded Future, and it scours tens of thousands of websites, blogs and Twitter accounts to find the relationships between people, organizations, actions and incidents — both present and still-to-come. In a white paper, the company says its temporal analytics engine "goes beyond search" by "looking at the 'invisible links' between documents that talk about the same, or related, entities and events."
The idea is to figure out for each incident who was involved, where it happened and when it might go down. Recorded Future then plots that chatter, showing online "momentum" for any given event.
"The cool thing is, you can actually predict the curve, in many cases," says company CEO Christopher Ahlberg, a former Swedish Army Ranger with a PhD in computer science. (more)
"Berry discriminating."
The BlackBerry -- renown for the security of its messaging -- doesn't offer 100 percent protection from eavesdropping. At least not in the United States.
U.S. law enforcement officials said they can tap into emails and other conversations made using the device, made by Research in Motion, as long as they have proper court orders.
RIM's willingness to grant authorities access to the messages of its clients is a hot-button issue. The United Arab Emirates claims it does not have the same kind of surveillance rights to BlackBerry messages as officials in the United States. It has threatened to clamp down on some services unless they get more access.
The exact details of the dispute remain unclear, but security experts say that many governments around the world enjoy the ability to monitor BlackBerry conversations as they do communications involving most types of mobile devices. (more)
U.S. law enforcement officials said they can tap into emails and other conversations made using the device, made by Research in Motion, as long as they have proper court orders.
RIM's willingness to grant authorities access to the messages of its clients is a hot-button issue. The United Arab Emirates claims it does not have the same kind of surveillance rights to BlackBerry messages as officials in the United States. It has threatened to clamp down on some services unless they get more access.
The exact details of the dispute remain unclear, but security experts say that many governments around the world enjoy the ability to monitor BlackBerry conversations as they do communications involving most types of mobile devices. (more)
Monday, August 2, 2010
...and the mouse was turned over to the ASPCA
MS — Two Mississippi men are facing charges after allegedly wrapping blocks of wood in duct tape and bubble wrap, attaching Toshiba labels to them and trying to pass them off as laptops. No one actually bought the fakes, but authorities in Hinds County have charged the men with trademark infringement and selling goods with counterfeit labels. (more)
Bugging, spy scandal rocks Safa leadership
South Africa - World Cup kingpin Danny Jordaan and three other soccer bosses have been having their movements tracked over the last few months without their knowledge.
Oliphant revealed to City Press that his phone had been bugged while he was still the Safa president. (more)
Jordaan, who is the Local Organising Committee’s CEO; former SA Football Association (Safa) president Molefi Oliphant; vice-president Mandla Mazibuko; and CEO Leslie Sedibe discovered this month that monitoring devices had been secretly fitted to their cars...
Sedibe has commissioned an investigation to be conducted by an independent security expert...
Sunday, August 1, 2010
Night of the living CrackBerry's
The United Arab Emirates said Sunday it will suspend some BlackBerry smartphone services from Oct. 11 amid an ongoing dispute with Canada's Research In Motion Ltd., the maker of the device, over the monitoring of data.
"With no solution available and in the public interest, in order to affect resolution of this issue, as of October 11, 2010, BlackBerry Messenger, BlackBerry Email and BlackBerry Web-browsing services will be suspended until an acceptable solution can be developed and applied," said Telecommunications Regulatory Authority Chief Mohamed Al Ghanim, according the emirates news agency, or WAM.
The U.A.E. government last week said Research in Motion's BlackBerry was a potential threat to national security, while an Indian government official said Indian security agencies have raised unspecified concerns about BlackBerry services.
Messages sent to and from a BlackBerry are processed at RIM's network operating center in Canada. They are encrypted on the device before being sent and remain encrypted until they reach their destination.
A person familiar with the matter said a key problem is that the messenger service on BlackBerry is untraceable. (more)
"With no solution available and in the public interest, in order to affect resolution of this issue, as of October 11, 2010, BlackBerry Messenger, BlackBerry Email and BlackBerry Web-browsing services will be suspended until an acceptable solution can be developed and applied," said Telecommunications Regulatory Authority Chief Mohamed Al Ghanim, according the emirates news agency, or WAM.
The U.A.E. government last week said Research in Motion's BlackBerry was a potential threat to national security, while an Indian government official said Indian security agencies have raised unspecified concerns about BlackBerry services.
Messages sent to and from a BlackBerry are processed at RIM's network operating center in Canada. They are encrypted on the device before being sent and remain encrypted until they reach their destination.
A person familiar with the matter said a key problem is that the messenger service on BlackBerry is untraceable. (more)
Friday, July 30, 2010
How Does Business Espionage Work?
By Remy Melina, Life's Little Mysteries Staff Writer, livescience.com
Companies hire corporate spies, also known as industrial spies, to get valuable information from their competitors. Industrial espionage can also include former employees who go on to work for competitors and reveal their previous employer's secrets. Company secrets can include information regarding flavor formulas (for example, the recipe for Coca-Cola), the kinds of equipment used, the amount of product being made, projected profit estimates and plans for future advertising campaigns.
For example, in 1965, Abbott Laboratories of North Chicago, Ill., filed a lawsuit against two of its former employees, claiming they memorized the formula for its highly successful artificial sweetener, Sucaryl, and duplicated it for a product belonging to Abbott's competition.
While corporate subterfuge is immoral, it's not exactly illegal. The Economic Espionage Act, which passed in 1996 and provides a way to deal with foreign agents stealing trade secrets from American companies, requires that companies prove that the stolen information was, in fact, a secret. For example, the source code for Microsoft Windows is a trade secret, but public filings, patents and annual reports technically are not.
This loophole allows employees to quietly collect information while working for a company and then secretly offer their business rivals corporate secrets for a hefty price. Others may flat out quit and take a better-paying job for the competition, using their prior knowledge as leverage when negotiating a salary.
Some companies even have special "competitive intelligence" (or C.I.) employees on staff. These workers' sole focus is on attaining information about their competitors' projects so that their company can always stay one step ahead of the competition. While not quite conducting C.I.A.-level espionage, these spies still do their fair share of snooping. (more)
Key phrase: "... requires that companies prove that the stolen information was, in fact, a secret."
The courts are tough. Companies must prove they took extra steps to protect their trade secrets before legal protection will be afforded to them.
"So, how do I prove it?" I hear you say.
By segregating the really important stuff and giving it extra security protection.
This extra protection comes in many forms. One primary protection are regularly scheduled TSCM inspections, with counterespionage security surveys.
A well documented history of this elevated security is key evidence of due diligence. Continuity is also very important. Periodic inspection schedules (quarterly is most widely recognized) carry considerable weight in court; occasional sweeps do not.
Whatever you do, don't start a TSCM program and then cut it for economic reasons. This false economy is viewed by the court that the information you were protecting is no longer a valuable business secret... by your own admission!
Last on the list, is the non-inspection. If you don't think your business secrets are valuable enough to afford some counterespionage security measures, why should the court?
"So, uh, what does TSCM cost?"
It is the cheapest insurance you can buy. The company programs I run cost them less than $7.50 per hour when amortized annually, usually much less. ~Kevin
This Week in Business Espionage
Plano, TX - There are plenty of questions involving the Plano woman accused of trying to smuggle military grade equipment to Russia...
What was the west Plano "girl next door", who happens to be a Latvian expatriate, doing with the high-tech scopes? Immigration and customs agents seized Fermanova's luggage, and found at least one Raptor Night Vision 4x Scope. The scopes, which are on the federal no-export munitions list, cost about $13,000 each.
Catherine Smit is a security expert with 20 years experience and she agrees that Fermanova's story doesn't add up. "Anyone who has been asked to carry something with removed serial numbers you know that you're not supposed to have them in your possession," she explained. "She [Fermanova] was more likely a patsy for someone who's involved in industrial espionage." (more)
---
MI - Former General Motors (GM) employee Shanshan Du and her husband Yu Qin have been indicted in Michigan for allegedly stealing hybrid car technology information from GM. They have both been charged with conspiracy to possess trade secrets without authorization, unauthorized possession of trade secrets and wire fraud; one of them has also been charged with obstruction of justice. (more)
---
Huawei has denied being involved in a plan by former Motorola staff to steal confidential information and use it to set up their own company in competition with Motorola. Last week, a modified lawsuit by Motorola alleged that former employee Shaowei Pan secretly reported to Ren Zhengfei, Huawei's founder and chairman, while he was working at the US company. Motorola claims that the defendants were developing a microcell base station, and later passed technical details over to Huawei. (more)
---
Toyota is said to be planning a U.S. production date for the fourth-generation Prius, but it won't arrive here until 2016. And would you be curious to know that the first Prius lost $28,000 per copy? That's what you learn through industrial espionage, says Kinder Essington over on PoliticsAndCars. (more)
Mission Impossible Data Destruction for Computers
from the press release...
UK - From 1st August, Stone http://www.stonegroup.co.uk/, the UK's largest privately-owned computer hardware manufacturer, will only provide its public sector customers with PCs and laptops that include the famous "Mission: Impossible" option to self-destruct the data on the system prior to disposal... These products will include - at no extra cost - a pre-configured executable programme which will allow the customer to perform a data erasure process in-house, without the presence of an engineer or the need to remove hardware to an off-site facility.
James Bird, CEO at Stone, explains, "It sounds like that great opening sequence in Mission: Impossible when the data self-destructs after 30 seconds! It is, of course, very carefully controlled and managed and there isn't the excitement of flames and smoke, just a simple electronic signal! But with the penalty for data protection breaches now reaching up to 500,000 pounds for organisations which do not properly manage the deletion of their records... (more)
Thursday, July 29, 2010
The Time Has Come for a Transition
The Jetsons predicted that we'd have flying cars by at least 2062, and Back to the Future promised them to us by 2015. It turns out that reality may, for once, outpace fiction.
A small, privately held company called Terrafugia has recently gained FAA approval for its roadable aircraft (i.e., flying car), and new improvements to the vehicle's design bring it only about a year away from being available to customers, according to MSNBC.
A small, privately held company called Terrafugia has recently gained FAA approval for its roadable aircraft (i.e., flying car), and new improvements to the vehicle's design bring it only about a year away from being available to customers, according to MSNBC.
A company called Terrafugia is expected to start selling ''The Transition'' late next year. Price: $194,000. (more)
iStole iPhone iTracked iCaught iDumb
CA - In perhaps what was one of the unluckiest moves of his career as a petty thief, Horatio Toure stole an iPhone on Monday afternoon. The irony? The iPhone Toure stole was being used to demonstrate a program that tracks GPS location in real-time--it took the police all of ten minutes to pin down his exact location and arrest him. (more)
Wednesday, July 28, 2010
Is your Blackberry a National Security Threat?
Perhaps, if you live in these countries...
According to the BBC, the United Arab Emirates (UAE) has described RIM’s device as a threat posing “serious social, judicial and national security repercussions” due to the country’s inability to successfully eavesdrop on users, and the fact that transmitted data is stored offshore.
The same concerns have also been expressed by India, Kuwait and Saudi Arabia, with market analysts contributing the timing of these comments to yesterday’s decline in RIMM shares...
When discussing UAE’s obsession with RIM’s device, it’s worth emphasizing on the fact that the country unsuccessfully attempted to install spyware application on the devices of Etisalat users in 2009, pitching it as a “performance-enhancement patch”. Instead, the SS8 Interceptor drained the batteries of the users who installed to the point where they became suspicious about its true nature...
The bottom line - are BlackBerries a threat to the national security of any country? They are, but only to the country that’s attempting to decrypt the data itself, instead of targeting the weakest link - in this case the user who now more than ever has to be aware that he’s become the primary target, not the encryption protocol itself. (more)
"The bottom line" is worth noting. The more you protect one info-conduit, the more your adversary will be forced into attacking your lesser protected conduits. Hence, businesses need a counterespionage consultant on-board who has a holistic view of the espionage possibilities. The days of "they swept, they left" TSCM teams are long gone.
If you have read this far, you the foresight to see why this story is a valuable cautionary tale. Good consultants are only as far away as the websites which bring you Kevin's Security Scrapbook.
GSM Cell Phone Eavesdropping Alert
US - A security expert said he has devised a simple and relatively inexpensive way to snoop on cellphone conversations, claiming that most wireless networks are incapable of guaranteeing calls won't be intercepted.
Law enforcement has long had access to expensive cell-phone tapping equipment known as IMSI catchers that each cost hundreds of thousands of dollars.
But Chris Paget, who does technology security consulting work, says he has figured out how to build an IMSI catcher using a US$1,500 piece of hardware and free, open-source software. 'It's really not hard to build these things,' he said.
Sunday, July 25, 2010
Got a stick? You can spy!
According to Mugil all you need is a USB stick and a FREE program called “USBThief_Modified_by_NEO”.
USB Thief is a simple program which makes your standard USB stick into a spying USB stick, if you plug it into someone’s PC, it will extract all the passwords from it.
This improved version also steals ALL of the following:
• Visited Links List
• Internet Explorer Cache List
• Internet Explorer Passwords List
• Instant Messengers Accounts List
• Installed Windows Updates List
• Mozilla Cache List
• Cookies List
• Mozilla History List
• Instant Messengers Accounts List
• Search Queries List
• Adapters Report
• Network Passwords List
• TCP/UDP Ports List
• Product Key List
• Protected Storage Passwords List
• PST Passwords List
• Startup Programs List
• Video Cache List
This improved version also steals ALL of the following:
• Visited Links List
• Internet Explorer Cache List
• Internet Explorer Passwords List
• Instant Messengers Accounts List
• Installed Windows Updates List
• Mozilla Cache List
• Cookies List
• Mozilla History List
• Instant Messengers Accounts List
• Search Queries List
• Adapters Report
• Network Passwords List
• TCP/UDP Ports List
• Product Key List
• Protected Storage Passwords List
• PST Passwords List
• Startup Programs List
• Video Cache List
The question is, "Do you trust him?"
Feeling lucky?
His program is here.
As always...
Why do I mention it?
So you will know what you are up against.
• Never let someone else stick you with their stick.
• Never stick yourself with a dirty stick.
Satellite Spy Photos Reveal History
“Spying on the Past: Declassified Satellite Images and Archaeology,’’ runs at Harvard’s Peabody Museum through Jan. 2.
Using declassified U.S. government spy satellite and aerial images, Harvard student archaeologists explore sites in Northern Mesopotamia and South America. These images are both visually arresting and potent archaeological tools. Four case studies in Syria, Iraq, Iran and Peru reveal complex early cities, extensive trackways, intricate irrigation canals and even traces of nomadic journeys. (more)
History's Spy Mysteries - The Profumo Keeler Affair
The KGB planted bugs to eavesdrop on John Profumo’s pillow talk with Christine Keeler, according to newly released top-secret files.
The topless showgirl and model’s KGB lover also persuaded her to question Profumo, Britain’s Minister of War, about Britain’s nuclear arsenal, the files reveal.
The reports claim that the Russians obtained ‘a lot of information’ which threatened to undermine Western security, contradicting the long-term view that the affair did not damage UK security and that no secrets were leaked to Russia. ... The papers also reveal how Hollywood star Douglas Fairbanks Jr. (a former US Naval Intelligence officer) knew many of those involved and gave regular reports to Washington about the scandal.
The affair’s exposure in 1963 led to Profumo’s resignation and rocked Prime Minister Harold Macmillan’s Government. (more)
Thursday, July 22, 2010
Ireland - Louis Walsh has had his phone hacked by an employee of his service provider.
The X Factor judge was shocked to discover that much of his personal information had been accessed and speaking to The Irish Star newspaper he confirmed that gardai have been informed.
“I knew nothing about it at all until the boss of the company contacted me.” Walsh said.
The X Factor judge was shocked to discover that much of his personal information had been accessed and speaking to The Irish Star newspaper he confirmed that gardai have been informed.
“I knew nothing about it at all until the boss of the company contacted me.” Walsh said.
Revealing that Irish TV presenter and model Glenda Gilson had also been the victim of the same person Louis added: “It just makes me wonder how much of this is going on all the time.”
“I don’t know how much personal information he managed to gather or how long it was going on. It makes me wary of exchanging confidential information by phone and yet its hard to avoid given the nature of this business.” (more)
NSA Insights
Thursday, 5 August; 12 noon – 1 pm
Washington, DC
Book signing!
In The Secret Sentry, Matthew M. Aid traces the growth of the National Security Agency from 1945 through critical moments in its history, including the Cold War and its ongoing involvement in Afghanistan and Iraq.
Aid, a visiting fellow at the National Security Archives, explores the agency’s connection to the intelligence failure that occurred when evidence that NSA officials called “ambiguous” was used as proof of Iraqi WMD capability. He also details the intense debate within the NSA over its growing role under the Bush administration to spy on U.S. citizens. Don’t miss this overview of the dramatic evolution of this far-reaching spy agency.
Free! No registration required!
Join the author for an informal chat and book signing.
Can't make it? Buy the book here!
Aid, a visiting fellow at the National Security Archives, explores the agency’s connection to the intelligence failure that occurred when evidence that NSA officials called “ambiguous” was used as proof of Iraqi WMD capability. He also details the intense debate within the NSA over its growing role under the Bush administration to spy on U.S. citizens. Don’t miss this overview of the dramatic evolution of this far-reaching spy agency.
Free! No registration required!
Join the author for an informal chat and book signing.
Can't make it? Buy the book here!
CIA applicant's arrest tops wave of China spy cases
A young Michigan man was quietly arrested last month and charged with lying on a CIA job application about his connection with Chinese intelligence, a case that drew virtually no attention outside his home state.
Glenn Duffie Shriver, 28, of Georgetown Township, Mich., tried to conceal $70,000 in payments from the Beijing government and denied his “numerous” meetings with Chinese intelligence officials, according to the government’s indictment.
Shriver’s arrest on June 22 is just the latest in a virtual tsunami of prosecutions against suspected Chinese agents in the past two years. Many cases are hidden and ongoing... more than 40 Chinese and American citizens have been quietly prosecuted -- most of them successfully -- on espionage-related charges in just a little over two years... a compendium of successful federal prosecutions involving espionage and espionage-related charges against Chinese agents... The list revealed that the Justice Department had convicted 44 individuals in 26 cases since March 2008, almost all of whom are now serving time in federal prisons. (more) (music to applaud by)
Glenn Duffie Shriver, 28, of Georgetown Township, Mich., tried to conceal $70,000 in payments from the Beijing government and denied his “numerous” meetings with Chinese intelligence officials, according to the government’s indictment.
Shriver’s arrest on June 22 is just the latest in a virtual tsunami of prosecutions against suspected Chinese agents in the past two years. Many cases are hidden and ongoing... more than 40 Chinese and American citizens have been quietly prosecuted -- most of them successfully -- on espionage-related charges in just a little over two years... a compendium of successful federal prosecutions involving espionage and espionage-related charges against Chinese agents... The list revealed that the Justice Department had convicted 44 individuals in 26 cases since March 2008, almost all of whom are now serving time in federal prisons. (more) (music to applaud by)
Subscribe to:
Posts (Atom)