Oracle still hasn't succeeded in dragging SAP's ex-chief executive into court to testify on what he knew about the subsidiary TomorrowNow's "industrial espionage."
On Monday, what Oracle got instead was an apology from the former CEO's replacement: co-CEO Bill McDermott.
It was another tech-sector captain deflated in the circus of Oracle's prosecution of its number-one business applications rival over money. (more)
Business espionage is costly. It is costly if you don't catch it. It is costly if you do catch it and ride the legal hamster wheel. While an apology is gentlemanly, it doesn't fill the loss.
Tip: Don't let it happen in the first place. Get your ounce of prevention, here.
Tuesday, November 16, 2010
Illegal Government Wiretapping Reported
Prime Minister Kamla Persad Bissessar says the state-owned Telecommunications Services of Trinidad and Tobago (TSTT), as well as the Irish-owned Digicel, were "commanded" to open their facilities so that the Security Intelligence Agency (SIA) could engage in the illegal wiretapping of citizens.
"Do you remember there was a time in Trinidad when people used to say use a Digicel phone, don't use a TSTT phone... they were right," she told reporters. (more)
State-controlled Telecommunications Services of Trinidad and Tobago (TSTT) would not comment in detail about the wiretapping of phones belonging to Members of Parliament, private citizens and President George Maxwell Richards by the Strategic Intelligence Agency (SIA) but the company is willing to co-operate in any investigation into the matter. (more)
"Do you remember there was a time in Trinidad when people used to say use a Digicel phone, don't use a TSTT phone... they were right," she told reporters. (more)
UPDATE - The country’s top telecommunications companies have both distanced themselves from any involvement in the illegal wiretapping of their customers’ phones.
Cell Phone Spying Apps Next Step...
Sell the app antidote!
Google may have "Don't be evil" as its motto, but DLP Mobile seems to be embracing the dark side in charging £1.86 for an app to remove its own spyware.
Companies that sell software for spying on partners are already on highly-dubious moral ground, but selling an application to remove your own spyware would be a step too far for most. But not DLP Mobile, who will sell you a copy of Reveal, an application designed to remove their own spying application... despite the fact that the former isn't available any more. (more)
Elaborate Eavesdropping System Discovered in Mayor's Office and Other Areas
Dominican Republic - The Santiago City Council dismantled an espionage system of several high tech miniature microphones which had been secretly installed in the office of mayor Gilberto Serrulle and other areas. The Mayor confirmed the finding, but downplayed the case, affirming that he has nothing to hide or fear. (more)
Monday, November 15, 2010
Everything you wanted to know about the legalities (USA law) of telephone wiretapping in your home.
ELECTRONIC EAVESDROPPING AND WIRETAPPING:
How 20th Century Technology Can Cause 21st Century Headaches for You and Your Client
by John H. Case, Gilbert B. Feibleman and Mark Gruber
"In a day and age where everyone can go to Radio Shack and purchase their own miniaturized microphone, recording device and spy camera it has become abundantly clear that every spouse is a potential James Bond. It is not uncommon to be asked by your client: “Can I record secretly conversations with my spouse?” Unfortunately it is more common that the family law practitioner is merely told about recordings long after they have been made or even after they have been republished. As a result, learning the answer to the question is only part of the lawyer’s job. Learning how to advise your clients and how to extricate your client from a potentially criminal quagmire is equally important - the answer is not as simple as the question." (more)
Russian Embassy Bugging Documents Released
via Bruce Schneier...
Old -- but recently released -- document discussing the bugging of the Russian embassy in 1940. The document also mentions bugging the embassies of France, Germany, Italy, and Japan.
Also...
A long list of declassified NSA documents. These items are not online; they're at the National Archives and Records Administration in College Park, MD. You can either ask for copies by mail under FOIA (at a 75 cents per page) or come in person. There, you can read and scan them for free, or photocopy them for about 20 cents a page.
Saturday, November 13, 2010
"Is my cell phone bugged?" Could be.
According to MWR InfoSecurity, at least two mobile phones that are being sold around the world are capable of being turned into Mobile bugging devices. The company says that most mobile phones are open to immediate cyber attack and network providers are doing little to help.
Recently MWR InfoSecurity alerted users worldwide that the Palm Pre mobile phone could be used as a bugging device without the user’s knowledge, and that phones using the Google Android system could be easily interrogated for passwords. They have now discovered that a HTC phone can be also be compromised and used as a remote bugging device. (more)
Recently MWR InfoSecurity alerted users worldwide that the Palm Pre mobile phone could be used as a bugging device without the user’s knowledge, and that phones using the Google Android system could be easily interrogated for passwords. They have now discovered that a HTC phone can be also be compromised and used as a remote bugging device. (more)
Dumb, de dumb, dumb...
PA - A member of a private Poconos homeowners association board has been charged with wiretapping for allegedly using his cellphone to record a board meeting that included a speaker-phone call with a lawyer.
Joseph O'Lall, 39, of 7030 Whitetail Lane, Long Pond, recorded the April 13, 2010, Emerald Lakes Association board meeting without the knowledge of the board members or the lawyer, and then played back the recording for others, Pocono Mountain Regional police said this week.
O'Lall was charged with intercepting, using and disclosing wire, electronic and oral communications, and with criminal use of a communication facility, which was his cellphone. (more)
Acting COO Fired for Eavesdropping
File photo. Not Charlotte. |
Charlotte Mampane, the South African Broadcasting Corporation's (SABC) acting chief operations officer, who was caught on security camera eavesdropping outside a board meeting earlier this year, has stepped down from the post...
At the meeting in question, Solly Mokoetle, the SABC's chief executive, was discussing Mampane's performance, as he apparently wanted to remove her from her acting position. Her eavesdropping was discovered after she sent a text message asking why certain allegations had been made about her in the meeting. The board requested security camera footage, which allegedly showed that she listened outside the boardroom door for about 20 minutes. (more)
At the meeting in question, Solly Mokoetle, the SABC's chief executive, was discussing Mampane's performance, as he apparently wanted to remove her from her acting position. Her eavesdropping was discovered after she sent a text message asking why certain allegations had been made about her in the meeting. The board requested security camera footage, which allegedly showed that she listened outside the boardroom door for about 20 minutes. (more)
Friday, November 12, 2010
Ãœber SpyCam - Sight, Sound and Smell
A Global Hawk robotic plane, hovering more than 11 miles above Afghanistan, can snap images of Taliban hide-outs so crystal clear that U.S. intelligence officials can make out the pickup trucks parked nearby — and how long they've been there.
Halfway around the globe in a underground laboratory in El Segundo, Raytheon Co. engineers who helped develop the cameras and sensors for the pilotless spy plane are now working on even more powerful devices that are revolutionizing the way the military gathers intelligence.
The new sensors enable flying drones to "listen in" on cellphone conversations and pinpoint the location of the caller on the ground. Some can even "smell" the air and sniff out chemical plumes emanating from a potential underground nuclear laboratory. (more) (sing-a-long)
The new sensors enable flying drones to "listen in" on cellphone conversations and pinpoint the location of the caller on the ground. Some can even "smell" the air and sniff out chemical plumes emanating from a potential underground nuclear laboratory. (more) (sing-a-long)
Wednesday, November 10, 2010
PI Spy vs. The Fecal People
UK - A private detective agency is using spy cameras to catch dog walkers who don't clean up after their pets. Investigator Mark Halstead, 35, uses all-weather infra-red cameras hidden in trees and hollowed-out stones... At the moment he is offering his services for free around Milton Keynes, but hopes to go nationwide. (more)
"Just throw in some scary words."
from a recent press release...
...is the world's leading provider of high attenuating radio frequency and infrared optically clear substrates for privacy and electronic eavesdropping protection i.e. RF flood attacks, "bugs", LASER attacks, thermal imaging, also known as Technical Surveillance Counter-Measures (TSCM). (more)
Dudes. Thermal imaging?!?!
1. Thermal imaging is not an electronic eavesdropping technique.
2. Thermal imaging is not even a visual privacy invading technique.
"What did you say your name was?"
CA - The former chief executive of the Sacramento area's largest independent real estate firm was arrested early Wednesday morning for secretly recording guests in his homes, says Sacramento County District Attorney Jan Scully... Investigators interviewed the three women, identified as Jane Doe #1, Jane Doe #2, and Jane Doe #3, who said they did not know or consent to the videotaping
Lyon, 54, was arrested by sheriff's deputies at his home in Carmichael and was booked into Sacramento County Jail. Jail records show Lyon was arrested on four felony counts of electronic eavesdropping on separate occasions, with bail set at $60,000.
After posting bail, the former CEO of Lyon Real Estate told reporters the charges are "all allegations." "I am intent on clearing my good name." (more)
When Suits Investigate
Pacific Gas and Electric announced that it placed an executive on paid suspension while it investigates his admitted efforts to surreptitiously infiltrate a community of activists. William Devereaux, senior director of PG&E's SmartMeter program, admitted to multiple news outlets that he used a fake name Thursday in an effort to join an online discussion group of SmartMeter opponents. (more)
Best Sites for Online Snooping
via Forbes.com...
A few simple tools can get you information once available only to private investigators and police.
In May Matthew Smith received a piece of junk e-mail from a marketer. The marketer chose the wrong guy to spam.
Smith, a pseudonym, is a former hacker and now works as a network security engineer. He runs a blog called Attack Vector devoted to online security issues. He decided to use the marketer, named Steve, as his guinea pig to show how easy it is to track down information about someone based solely on an e-mail address, and documented how he did it to serve as a warning to others who may not understand the power of what's available to anyone looking to dig into your background. (more)
Tuesday, November 9, 2010
How Your Boss Knows Your XBox Habits
via windowsitpro.com
Q. I'm a boss who tricked my workers into adding me as Xbox Live friends. How can I spy on them when they're "working" from home to make sure they're not playing Xbox? A. One of the great features of the Xbox and its online service is the integration with the xbox.com website. It lets you easily see all your Xbox friends. It can be abused by mean bosses to quickly, in table form, see the last time the friends were on XBOX and what they were doing.
Just perform the following:
Go to www.xbox.com and select "Sign In" in the top right of the xbox.com site.
• Sign in with the Live ID associated with your XBox Live ID.
• Click on your own profile.
• Select View All Friends under Friends.
You can see who's online, who's offline, when they were last online, and what everyone is or was doing. (more)
The Fine Line Between Listening and Eavesdropping
During the Middle Ages, eavesdropping was illegal in England, but overheard conversations could be used as evidence in court. Today, the internet, cell phones and reality TV make it difficult not to pry into the conversations and private lives of friends or strangers. In a new book, linguistics professor John Locke argues that eavesdropping is actually a good thing. Prying has helped humans stay away from danger, find food, identify mate mates, and assured us that we are not alone. (New Hampshire Public Radio audio report)
Monday, November 8, 2010
"If it wasn't the guards, it must be the cleaners."
Australia - A Tasmanian cleaner who stole State Government documents, and leaked them to the Opposition and the media, has been sentenced to 84 hours of community service... Outside court, Nigel John Jones maintained his innocence and said he will appeal against the conviction. (more)
Saturday, November 6, 2010
This Week in Spy News
Real Life
• The Georgian special services arrested 15 people today accused of spying for Russia. (more)
• The highest-ranking CIA officer ever convicted of espionage was expected to plead guilty to additional charges that he tried to collect money from old contacts in Russia while in prison, a newspaper reported Thursday. (more)
• Freed U.S. hiker Sarah Shourd says she doesn't know if she'll return to Iran to face espionage charges with her two companions still held in prison there. (more)
• Authorities in Norway have launched an investigation into whether the United States conducted illegal surveillance in the Nordic country, the Ministry of Justice told CNN Thursday. (more)
• Officials of the US embassy in Copenhagen may be illegally collecting data about Danish citizens, they find suspicious, the Politiken newspaper reports. (more)
• Taiwan got another spy shock recently when they arrested two men who were spying for China. The shock part came from the fact that one of the men, Lo Chi Cheng was an army colonel. The other was an unnamed Taiwanese businessman who had business in China and spied on China. Then came another shock. The other guy was really a double agent, who had recruited the colonel, who obtained classified information that was then delivered to China. (more)
• Northrop Grumman’s ginormous experimental spying blimp is progressing rapidly... The Army awarded Northrop a $517 million contract in June to develop a trio of unmanned, seven-story, football-field sized mega-blimps called Long Endurance Multi-Intelligence Vehicles. If successful, the blimp will stay in the air for up to three weeks at a time, using 2500 pounds’ worth of “sensors, antennas, data links and signals intelligence equipment” to capture still and video images of civilians and adversaries below and send the pictures to troops’ bases. (more)
Art Imitates Real Life
• Though based on a true story with a well-known outcome, Doug Liman's "Fair Game" is as suspenseful as any fictional thriller -- and considerably more tragic. Based-in-truth thriller about CIA spy Valerie Plame. With Naomi Watts, Sean Penn. Director: Doug Liman (1:44). PG-13: Language. At area theaters. (more) (trailer)
• NBC is scrapping J.J. Abrams' spy series "Undercovers..." ...middling reviews and declining ratings made the show increasingly destined for the chopping block. Wednesday night's airing delivered only 5.8 million viewers. Three more episodes will air in the coming weeks. (more)
• Like Aaron Eckhart? Spy dramas? Then perhaps you'll like THE EXPATRIATE. Former Bat villain Aaron Eckhart (THE RUM DIARY, RABBIT HOLE) has been cast as an ex-CIA agent in the spy drama from German director Philipp Stölzl (NORTH FACE, BABY) and newcomer scribe A.E. Amel. xists, his coworkers are gone, and his assistant is really a trained operative out to kill him. Production begins next year Belgium and Montreal. (more)
Sprint Excludes Chinese Companies From Contract Over Security Fears
Sprint Nextel is excluding Chinese telecommunications-equipment makers Huawei Technologies and ZTE from a contract worth billions of dollars largely because of national security concerns in Washington. The Defense Department and some U.S. lawmakers have been increasingly concerned about the two companies’ ties to the Chinese government and military, and the security implications of letting their equipment into critical U.S. infrastructure. Some officials argue China’s military could use Huawei or ZTE equipment to disrupt or intercept American communications. (more)
Wednesday, November 3, 2010
Personal Spying - Drones On
Here at Kevin's Security Scrapbook I have been watching the development of drones for years. These are my two personal favorites: Do It Yourself Sky Spies - The Draganflyer and "MAV" The Scariest SiFi Movie You'll See this Year.
If you followed the Scrapbook, you already knew where this is going.
Time for an official FutureWatch prediction... Private Investigators will start selling off all the old TSCM gadgets they bought which never turned a profit to invest in a drone. Although the applications will be limited (by practicality and law), drones will offer solutions to previously unsolvable problems.
Early adopters will easily recoup their investments and turn a profit via rental of the drone for special assignments, and/or selling the photos/video at a premium price. In fact, having a drone should bring in previously unattainable assignments.
P.S.
This is a window of opportunity. It may take up to ten years for new laws (and FAA regulations) protecting public safety and privacy to catch up.
...via The Wall Street Journal...
Personal drones aren't yet plying U.S. flyways. But an arms race is building among people looking to track celebrities, unfaithful lovers or even wildlife. Some organizations would like them for emergency operations in areas hit by natural disasters. Several efforts to develop personal drones are scheduled for completion in the next year.
"If the Israelis can use them to find terrorists, certainly a husband is going to be able to track a wife who goes out at 11 o'clock at night and follow her," said New York divorce lawyer Raoul Felder. (more)
AERYON Labs (specs) (video)
And many more.
If you followed the Scrapbook, you already knew where this is going.
Time for an official FutureWatch prediction... Private Investigators will start selling off all the old TSCM gadgets they bought which never turned a profit to invest in a drone. Although the applications will be limited (by practicality and law), drones will offer solutions to previously unsolvable problems.
Early adopters will easily recoup their investments and turn a profit via rental of the drone for special assignments, and/or selling the photos/video at a premium price. In fact, having a drone should bring in previously unattainable assignments.
P.S.
This is a window of opportunity. It may take up to ten years for new laws (and FAA regulations) protecting public safety and privacy to catch up.
...via The Wall Street Journal...
Personal drones aren't yet plying U.S. flyways. But an arms race is building among people looking to track celebrities, unfaithful lovers or even wildlife. Some organizations would like them for emergency operations in areas hit by natural disasters. Several efforts to develop personal drones are scheduled for completion in the next year.
"If the Israelis can use them to find terrorists, certainly a husband is going to be able to track a wife who goes out at 11 o'clock at night and follow her," said New York divorce lawyer Raoul Felder. (more)
The AR.Drone, an iPhone-controlled helicopter powered by four separate blades |
Can't wait?
Check out what's available now!
A.R. Drone (specs) (video)AERYON Labs (specs) (video)
And many more.
SpyCam Tee Shirt
"Even Mr. Bond has to have an off day when all his fancy duds are at the $1.50 Dry Cleaners and he's down to his last pair of underpants. But just because his suit jackets are gone doesn't mean he can't hide fancy spy gadgets on his person. Before he drags out the t-shirts he wore while canvassing for decade-old political campaigns or his favorite band that broke up when he was in college, he goes for his old standby, the From Tokyo With Love Electronic Spy Camera Shirt.
It's so deliciously obvious. Centered in the artwork on the shirt is the man himself, holding a camera to his face. But not just a picture of a camera. Hidden behind the soft cotton exterior is a fully-functioning spy camera. That's right. Whatever your chest can see, the camera can see. A cable connects the camera to a small black box that fits discreetly in your pocket. Just reach in, press the button, and your shirt will capture the evidence before you." (more)
It's so deliciously obvious. Centered in the artwork on the shirt is the man himself, holding a camera to his face. But not just a picture of a camera. Hidden behind the soft cotton exterior is a fully-functioning spy camera. That's right. Whatever your chest can see, the camera can see. A cable connects the camera to a small black box that fits discreetly in your pocket. Just reach in, press the button, and your shirt will capture the evidence before you." (more)
Tuesday, November 2, 2010
Open Season on Marital Bugging and Tapping in the United States Court of Appeals for the Fifth Circuit
A Texas court has ruled that a husband accused of monitoring his wife's computer through a keystroke logger did not violate federal wiretapping laws.
Larry Bagley was sued in June by his wife Rhea Bagley, who accused him of surreptitiously placing audio recording devices in their house as well as a software keystroke logger. The Bagleys are in the process of divorcing.
The complaint in this civil case says that during the divorce proceedings, the husband revealed the existence of the surveillance tech and acknowledged that the "software recorded screenshots of activity on this computer." The husband replied in court documents that "in all conversations, the defendants' children were present and defendant was able to consent to recordation by way of vicarious consent."
U.S. District Judge Lee Rosenthal ruled on October 18 in favor of the husband, saying that the court was required to follow a Fifth Circuit decision saying that the federal wiretap law known as Title III does not apply to marital relationships.
Here are some excerpts from the court's opinion:
Whether Title III provides a remedy for interspousal wiretapping within the marital home is a question that has divided the federal courts of appeal. The Fourth, Sixth, Eighth, Tenth, and Eleventh Circuits have held that such wiretapping is actionable under Title III. The Second and Fifth Circuits have held that Title III does not apply to interspousal wiretaps. (more)
P.S. The United States Court of Appeals for the Fifth Circuit includes:
Larry Bagley was sued in June by his wife Rhea Bagley, who accused him of surreptitiously placing audio recording devices in their house as well as a software keystroke logger. The Bagleys are in the process of divorcing.
U.S. District Judge Lee Rosenthal ruled on October 18 in favor of the husband, saying that the court was required to follow a Fifth Circuit decision saying that the federal wiretap law known as Title III does not apply to marital relationships.
Here are some excerpts from the court's opinion:
Whether Title III provides a remedy for interspousal wiretapping within the marital home is a question that has divided the federal courts of appeal. The Fourth, Sixth, Eighth, Tenth, and Eleventh Circuits have held that such wiretapping is actionable under Title III. The Second and Fifth Circuits have held that Title III does not apply to interspousal wiretaps. (more)
P.S. The United States Court of Appeals for the Fifth Circuit includes:
Eastern District of Louisiana
Middle District of Louisiana
Western District of Louisiana
Northern District of Mississippi
Southern District of Mississippi
Eastern District of Texas
Northern District of Texas
Southern District of Texas
Western District of Texas
The United States Court of Appeals for the Second Circuit includes:
District of Connecticut
Eastern District of New York
Northern District of New York
Southern District of New York
Western District of New York
District of Vermont
Middle District of Louisiana
Western District of Louisiana
Northern District of Mississippi
Southern District of Mississippi
Eastern District of Texas
Northern District of Texas
Southern District of Texas
Western District of Texas
The United States Court of Appeals for the Second Circuit includes:
District of Connecticut
Eastern District of New York
Northern District of New York
Southern District of New York
Western District of New York
District of Vermont
Industrial Espionage Case Expands
Silicon Valley is bracing itself for fireworks as a long-running intellectual property and industrial espionage dispute between two of the most powerful names in technology finally reaches court.
Oracle is suing its arch-rival SAP for exploiting what it says were illegal downloads of Oracle software code three years ago, and the case has now dragged in another technology titan, Hewlett-Packard, which hired the former SAP boss Leo Apotheker to be its chief executive a month ago. (more)
“A few weeks ago I accused HP’s new CEO, Leo Apotheker, of overseeing an industrial espionage scheme centring on the repeated theft of massive amounts of Oracle’s software,” Mr Ellison said in a statement released this week. (more)
“A few weeks ago I accused HP’s new CEO, Leo Apotheker, of overseeing an industrial espionage scheme centring on the repeated theft of massive amounts of Oracle’s software,” Mr Ellison said in a statement released this week. (more)
Book Banning Over Industrial Espionage Fears
Many of Germany's top companies are blocking access to Facebook and other social networking sites over fears of industrial espionage and other security concerns, according to a new report. Business weekly Wirtschaftswoche said that many companies on the Dax-30 blue-chip index saw an unacceptable risk posed by employees using such sites at work. (more) ...not to mention the financial drain of social notworking.
Monday, November 1, 2010
"Crito, we owe a rooster to Asclepius. Please, don't forget to pay the debt."
Greece is having a Patriot Act moment, drafting legislation that would break down privacy laws and significantly increase police power. But their catalyst is debt, not terrorism.
Draft legislation obtained by The Katimerini would create government agencies to regulate tax evasion, entitlement issues and use of public property. Police officers in these departments would have unprecedented power to eavesdrop on suspects' conversations and communications and to disguise their identity in pursuit of a suspect.
This would be a major change for a country known for strict privacy laws, according to The Katimerini. (more) (sing-a-long) (Socratic drink)
Draft legislation obtained by The Katimerini would create government agencies to regulate tax evasion, entitlement issues and use of public property. Police officers in these departments would have unprecedented power to eavesdrop on suspects' conversations and communications and to disguise their identity in pursuit of a suspect.
This would be a major change for a country known for strict privacy laws, according to The Katimerini. (more) (sing-a-long) (Socratic drink)
Are whack jobs bugging our Hollywood Actors?
Actor Randy Quaid (aka General George S. Merlin, "Bug Buster") and his wife, Evi... were in Canada seeking political asylum over their stated fears they would be "whacked'' if they returned to Hollywood... they fled to Canada to escape the so-called "star whackers" - a cult that is bugging their phones and hacking their computers.
"They're absolute businessmen. It's the mafia; it's organized crime," said Mrs. Quaid... The couple has said this "mafia" is behind eight celebrity, including Heath Ledger, deaths in the last 5 years. (more) (trailer)
"They're absolute businessmen. It's the mafia; it's organized crime," said Mrs. Quaid... The couple has said this "mafia" is behind eight celebrity, including Heath Ledger, deaths in the last 5 years. (more) (trailer)
Don't tell Mrs. Quaid. It will just upset her.
John McTiernan, director of the movie “Die Hard,” was sentenced to one year in prison for lying about his association with a private investigator, Anthony Pellicano, to illegally wiretap a movie producer. (more)
Hoist by a Voicemail Petard
Employees at a CBS affiliate in Anchorage left an accidental voicemail for an aide to GOP Senate candidate Joe Miller in which they discussed and laughed about the possibility of reporting on the appearance of sex offenders at a Miller rally. And they chatted about responding with a Twitter alert to “any sort of chaos whatsoever” including the candidate being “punched.”
Jerry Bever, general manager for KTVA, said in a statement that a call to Miller spokesman Randy DeSoto to discuss the candidate’s planned appearance on a newscast wasn’t disconnected after the conversation ended. The call took place during a KTVA staff meeting to plan coverage of that evening’s Miller rally in downtown Anchorage. (more)
Sunday, October 31, 2010
Hamas warns against buying cars imported from Israel
The Hamas government in the Gaza Strip is warning local politicians, government officials and faction leaders against buying cars imported from Israel for fear they may contain eavesdropping equipment or even remote-activated bombs planted by Israeli security agencies. (more)
Test your car...
If you own a late model General Motors car with OnStar, try this test. Tune your radio to 770 AM, turn up the volume and tap on the OnStar microphone near the rear view mirror. Do you hear yourself coming through the radio? No? Maybe they only bugged my car. ~Kevin
Google Bans SMS Spy App Tap
A controversial mobile phone application, which helps a cell phone user read the text messages of others secretly, has been removed from sale by Internet search engine Google.
Google said the application, called SMS Secret Replicator, violated its terms.
Once installed on a mobile phone, the Android phone application automatically creates carbon copies of incoming text messages and forwards them to a selected number - prompting fears it could be used by jealous lovers and even work colleagues to snoop on private messages. (more) (video)
Once installed on a mobile phone, the Android phone application automatically creates carbon copies of incoming text messages and forwards them to a selected number - prompting fears it could be used by jealous lovers and even work colleagues to snoop on private messages. (more) (video)
Google may have dropped it from their marketplace, but doesn't mean this $9.99 app is not available elsewhere. (more)
Coming soon, a way you can detect if your phone is infected with spyware. (more)
Thursday, October 28, 2010
Security Alert: iCracked
A security flaw in the iPhone allows strangers to bypass the handset’s lock screen with a few button presses.
...the quick method to circumvent an iPhone’s passcode-protected lock screen:
• tap the “Emergency Call” button,
• then enter three pound signs,
• hit the green Call button
• and immediately press the Lock button.
That simple procedure gives a snoop full access to the Phone app on the iPhone, which contains the address book, voicemail and call history. (more)
Apple:
...the quick method to circumvent an iPhone’s passcode-protected lock screen:
• tap the “Emergency Call” button,
• then enter three pound signs,
• hit the green Call button
• and immediately press the Lock button.
That simple procedure gives a snoop full access to the Phone app on the iPhone, which contains the address book, voicemail and call history. (more)
Apple:
“We’re aware of this issue and we will deliver a fix to customers as part of the iOS 4.2 software update in November."
"Why is this important?”
Not having password protection on a smart phone leaves you open to information theft, jail-breaking and injection of spyware.
"Why does this trick exist?"
• It is a software loophole.
• It is a programmer's shortcut they forgot to patch.
• It is a programmer's Easter egg.
• It is a law enforcement backdoor never meant to become public knowledge.
Interesting question. You decide.
FutureWatch: The ability to create passwords longer than four measly digits... which is only a pool of only 10,000 passwords. ~Kevin
"Why does this trick exist?"
• It is a software loophole.
• It is a programmer's shortcut they forgot to patch.
• It is a programmer's Easter egg.
• It is a law enforcement backdoor never meant to become public knowledge.
Interesting question. You decide.
FutureWatch: The ability to create passwords longer than four measly digits... which is only a pool of only 10,000 passwords. ~Kevin
Wednesday, October 27, 2010
Firesheep Makes Stealing Your Wi-Fi Secrets Easy
via Steven J. Vaughan-Nichols
From all the yammering, you’d actually think there was something new about Firesheep, the Firefox extension that lets you grab login IDs, passwords, and other important information. What a joke. I, and any hacker or network administrator worth his salt, have been able to do this kind of stuff for years.
The only thing “new” about Firesheep is that how it easy makes it to do. I’m unimpressed. Anyone who was serious about grabbing your personal information has already been doing it for years. Trust me, if someone really wanted your data and you’ve been using open Wi-Fi networks, they already grabbed it.
No, the real worry isn’t about some jerk grabbing your Twitter password in a coffee house. The real worry has always been that your office Wi-Fi is easy to compromise and then someone can use a packet-sniffer to get something that really matters like your your Accounts Payable password. (more)
Need a Wi-Fi Security Audit and Compliance Inspection? (you do) Please call me. (more)
11/4/10 - UPDATE: IBM researchers are proposing an approach to WiFi security they call Secure Open Wireless in light of the release of the Firesheep tool. (more)
11/5/10 - UPDATE: 10 Ways to Protect Yourself from Firesheep Attacks (more)
Our Spy Coin Receives the Ultimate Compliment
I give spy coins to my clients.
It is a reminder that information loss is mostly a people problem, not an electronic problem. Filing cabinets of information can walk out the door in pocket change!
Careless people often blab information, forget to secure it, toss it in the garbage can, or otherwise lose it—hundreds of laptops are lost every day. People also steal it when they become greedy, spiteful, conned, blackmailed, or caught up in a “cause.”
Investigating an information loss, however, begins with an electronic surveillance detection audit.
Here’s why...
• Serious espionage will include electronic surveillance.
• The possibility must be resolved before accusing people.
• Bugging is the easiest spy technique to discover.
• Electronic surveillance evidence helps prove your case.
Best advice... Conduct audits on a regular basis. Uncover signs of espionage during the intelligence collection stage, before your information can be abused. (more)
It is a reminder that information loss is mostly a people problem, not an electronic problem. Filing cabinets of information can walk out the door in pocket change!
Careless people often blab information, forget to secure it, toss it in the garbage can, or otherwise lose it—hundreds of laptops are lost every day. People also steal it when they become greedy, spiteful, conned, blackmailed, or caught up in a “cause.”
Investigating an information loss, however, begins with an electronic surveillance detection audit.
Here’s why...
• Serious espionage will include electronic surveillance.
• The possibility must be resolved before accusing people.
• Bugging is the easiest spy technique to discover.
• Electronic surveillance evidence helps prove your case.
Best advice... Conduct audits on a regular basis. Uncover signs of espionage during the intelligence collection stage, before your information can be abused. (more)
A client reports back...
"I think of all of the trinket type things we’ve accumulated over the years, the spy coin is *by far* the coolest, and is made even cooler with the background story provided on the chip!!
I took mine with me to the FBI building today and had the guards there X-ray it along-side of a normal quarter to see if its secret contents could be seen on an “airport quality” X ray machine. They printed out a copy of the scan image, I’ve attached it to this email for your amusement as well.
Several agents commented on how well it was made, and how hard it would be to detect such a thing."
Several agents commented on how well it was made, and how hard it would be to detect such a thing."
Tuesday, October 26, 2010
Sunday, October 24, 2010
Why Wiretap When You Can buy the Phone Company?
A proposed deal between Sprint Nextel, Cricket and two Chinese telecom companies has raised a few eyebrows, with some U.S. senators concerned about security.
The Hill reports a bipartisan group of legislators wrote a letter seeking reassurance about the deal from Federal Communications Commission Chairman Julius Genachowski.
The letter, signed by Susan Collins (R-Maine), Jon Kyl (R-Ariz.) and Joe Lieberman (I-Conn.), contends the two Chinese companies, ZTE Corporation and Huawei, have ties to the Chinese military and are financed by the Chinese government.
The letter raised the specter of the Chinese government or military using the companies to spy on American communications. (more)
How to Solve a TSCM vs, CCTV Mystery
Chicago, IL - It may sound like cloak and dagger fiction, but FOX Chicago News has learned something very odd happened Wednesday night on the fifth floor of the Cook County building. The latest bizarre twist in the ongoing corruption scandal in Stroger's office involves high-tech surveillance experts caught leaving the office of Cook County Board President's office.
A deputy sheriff patrolling the building stopped a group of five men leaving Todd Stroger's office around 9:30 p.m. Wednesday.
One of the men identified himself as the county's Homeland Security Director David Ramos. The other four men were asked to provide identification.
They did, and at least three of them have experience in surveillance and counter-surveillance... (One of the men) would not comment on what they were doing in Stroger's office, but there is rampant speculation at the County building they were sweeping the offices for electronic bugs.
One of the men identified himself as the county's Homeland Security Director David Ramos. The other four men were asked to provide identification.
They did, and at least three of them have experience in surveillance and counter-surveillance... (One of the men) would not comment on what they were doing in Stroger's office, but there is rampant speculation at the County building they were sweeping the offices for electronic bugs.
Cook County Inspector General Pat Blanchard said his staff visited Stroger's office Thursday afternoon and removed some evidence related to the ongoing investigation into sham contracts...
David Ramos, the county's Homeland Security Director who escorted the men into the office, said through a spokesman they were simply scouting locations for placement of security cameras in the President's office. (more)
Solution: Ask the Deputy if the "visitors" were leaving empty-handed. A sweep requires several cases of instrumentation. Conducting a CCTV design layout does not.
Friday, October 22, 2010
CSI - Who Poo'ed
What can property managers do when dog owners don’t pick up after their dogs? Under normal circumstances, not much, because there is no way of knowing who the violators might be. But now, with a new program called PooPrints that uses DNA to identify the dog in question, managers can catch the culprit (dog owner) in a matter of days.
PooPrints is a dog DNA identification program from BioPet Vet Lab built on a scientific foundation, providing communities with a means to enforce community regulations for pet waste clean-up. “The problem of pet owners not picking up after their pets is tearing apart communities,” says BioPet Vet Lab CEO Tom Boyd. Consumer Reports lists ‘dog poop’ as one of the nation’s top ten personal gripes. So BioPet Vet Lab used its research in animal DNA identification systems to help provide community leaders with a tool to bring peace back to the neighborhood. (more)
Thursday, October 21, 2010
Ex-Chief Legal Counsel Pleads Guilty
OH - The former state lawyer behind an electronic eavesdropping scheme agreed yesterday to plead guilty to three misdemeanor charges and cooperate in other investigations, including one into an aborted operation at the Governor's Residence.
Joshua Engel, the former chief legal counsel for the Ohio Department of Public Safety, faces three misdemeanor counts of intercepting and disclosing sensitive, confidential information from investigations by the state inspector general, the Ohio Ethics Commission and federal authorities. (more)
Wednesday, October 20, 2010
Weird Wiretap Story of the Week
How does watching a football game land you in court facing wiretapping charges?
You're a former police detective. Your accuser is a former judge.
Care to judge this one yourself?
If you have the time... (more)
P.S. Wiretapping is a McGuffin.
In the Land of the Lords, no tenant skips
Australia - Tenants' groups say they are outraged by a service that enables real estate agents to find out when a tenant is considering moving house. The service is offered by the database company TICA and involves the company sending an email alert to an agent if a tenant submits an application for another property. (more)
Tuesday, October 19, 2010
U.S. Pushes to Ease Technical Obstacles to Wiretapping
Law enforcement and counterterrorism officials, citing lapses in compliance with surveillance orders, are pushing to overhaul a federal law that requires phone and broadband carriers to ensure that their networks can be wiretapped, federal officials say.
The officials say tougher legislation is needed because some telecommunications companies in recent years have begun new services and made system upgrades that create technical obstacles to surveillance. They want to increase legal incentives and penalties aimed at pushing carriers like Verizon, AT&T, and Comcast to ensure that any network changes will not disrupt their ability to conduct wiretaps. (more) (sing-a-long)
Monday, October 18, 2010
Business Espionage - The Feds are Warning You
via The New York Times...
Huang Kexue, federal authorities say, is a new kind of spy. For five years, Mr. Huang was a scientist at a Dow Chemical lab in Indiana, studying ways to improve insecticides. But before he was fired in 2008, Mr. Huang began sharing Dow’s secrets with Chinese researchers, authorities say, then obtained grants from a state-run foundation in China with the goal of starting a rival business there...
Law enforcement officials say the kind of spying Mr. Huang is accused of represents a new front in the battle for a global economic edge. As China and other countries broaden their efforts to obtain Western technology, American industries beyond the traditional military and high-tech targets risk having valuable secrets exposed by their own employees, court records show.
Rather than relying on dead drops and secret directions from government handlers, the new trade in business secrets seems much more opportunistic, federal prosecutors say, and occurs in loose, underground markets throughout the world.
Prosecutors say it is difficult to prove links to a foreign government, but intelligence officials say China, Russia and Iran are among the countries pushing hardest to obtain the latest technologies.
“In the new global economy, our businesses are increasingly targets for theft,” said Lanny A. Breuer, the assistant attorney general in charge of the Justice Department’s criminal division. “In order to stay a leader in innovation, we’ve got to protect these trade secrets.” (more)
WSJ Finds Sheep Are Easy to Track
The down side of social not-working...
Many of the most popular applications, or "apps," on the social-networking site Facebook Inc. have been transmitting identifying information—in effect, providing access to people's names and, in some cases, their friends' names—to dozens of advertising and Internet tracking companies, a Wall Street Journal investigation has found.
The issue affects tens of millions of Facebook app users, including people who set their profiles to Facebook's strictest privacy settings. (more)
The issue affects tens of millions of Facebook app users, including people who set their profiles to Facebook's strictest privacy settings. (more)
Labels:
business,
computer,
FutureWatch,
Hack,
mores,
privacy,
Ra-parents,
spyware,
tracking
Sunday, October 17, 2010
Turk Taps Top 70,000 Drops
More than 70,000 telephones in Turkey are currently officially under electronic surveillance, daily Radikal reported Sunday.
Radikal said it was the first media institution to have visited the Telecommunications Directorate, or TÄ°B, in Ankara, the institution responsible for installing and maintaining telephone surveillance by court order.
Exactly 71,538 telephones have been tapped by TÄ°B through court orders, among which 65 percent have ostensibly been tapped to gather intelligence on terrorism and organized crime, Radikal reported.
Wiretaps for the purpose of gathering intelligence can be requested by intelligence institutions to prevent crimes from being committed.
The remaining 35 percent of surveillance is being carried out because of strong suspicions that a crime has been committed and no other way to obtain evidence. (more)
RED - A spies-in-action comedy
A spies-in-action comedy (based on a graphic novel), populated by terrific actors and blessed with a consistently funny and occasionally hilarious script, however implausible. The acronym RED stands for “Retired, Extremely Dangerous” and refers to Frank Moses (Bruce Willis).
A retired CIA “black ops” agent, Frank is so bored in his suburban home that he keeps calling a Social Security clerk, Sarah (Mary-Louise Parker) in Kansas City, pretending his check didn’t come, just to chat. When masked Ninja-like assassins break into his home, Frank demolishes them, then heads to Kansas City to protect Sarah, knowing their calls have been tapped. (more) (trailer)
A retired CIA “black ops” agent, Frank is so bored in his suburban home that he keeps calling a Social Security clerk, Sarah (Mary-Louise Parker) in Kansas City, pretending his check didn’t come, just to chat. When masked Ninja-like assassins break into his home, Frank demolishes them, then heads to Kansas City to protect Sarah, knowing their calls have been tapped. (more) (trailer)
Local Politics - Wiretapping II
The Allegheny County Jail Oversight Board has no plans to investigate how fired Capt. Thomas R. Leicht Jr. kept his job for years despite failed internal investigations, allegations of bid rigging and a controversial wiretapping program, the board's chair said...
He also used county equipment to wiretap jail telephones from his home and sent recordings of at least six attorney-client calls to prosecutors, according to the American Civil Liberties Union. (more)
Local Politics - Wiretapping I
Editorial from local paper...
NC - Even before anyone knew for sure what was on the digital flash drive that mysteriously appeared in Hope Mills Mayor Eddie Dees' mailbox, town residents had plenty of reason for concern about their leaders.
The "thumb drive" contained recordings of conversations between Town Manager Randy Beeman and Police Chief Robert Hassell. They were all or part of five calls recorded between Feb. 25 and May 17...
It appears that the wiretap originated in the town's Police Department. The mayor says the drive contains calls made into and out of the department. If that's true, it also raises serious questions about the department and its internal security. It fairly screams for a full-blown criminal investigation.
But instead, the commissioners have chosen to wait for the town attorney to investigate, which he's been doing for months now. (more)
Friday, October 15, 2010
iLied, iSnapped.
via Cult of Mac...
"There’s no other way of saying this: Camera Camouflage is sneaky. It’s a camera app that goes out of its way to avoid looking like a camera. It disguises itself as an incoming phone call. You can even instruct it to activate your phone’s ringtone, so you can pretend to take the call and hold the phone to your ear. At which point, things get even sneakier. Camera Camouflage is activated by your voice. When you start speaking, it takes a photo. To onlookers, you’re just answering a phone call. You can keep talking, and keep snapping, for as long as you want." (more)
Thursday, October 14, 2010
Do You Know How to Protect Your Cell Phone Calls?
via SC Magazine and Cellcrypt
...So, the problem of cell phone interception is real, growing and unlikely to be eliminated in the foreseeable future.
For an organization, knowing that phone calls have been intercepted at all is difficult. There is rarely a test that can be done, other than looking at the consequences of a lost deal or secret information in the public domain. In fact, in 2010, the Ponemon Institute found that 80 percent of CIOs admitted they would not find out directly if they had been intercepted.
The problem shows a wide geographical variation, both in the number of instances and in the public perception of risk.
In the United States and mainland Europe, the perception of risk is relatively low. However, travel to Latin America or some parts of Asia, and the perception of an issue has reached the consumer with advertisements on mainstream television for protection equipment.
Yet few executives traveling around the world have taken special measures to secure their cell phone conversations.
Research from ABI shows that 79 percent of companies' cell phones were routinely used to discuss information that, if intercepted, would lead to material loss to the business. Yet less than one in five had in place adequate measures to address this risk. (more)
New book coming soon...
Stay tuned for details.
Subscribe to:
Posts (Atom)