Thursday, March 3, 2011

5 Ways to Tell if the Person on the Phone is Lying

via landlinephoneservice.net...
  1. Listen for the patterns in their speech. 
    Is their speech erratic sounding? Do they repeat what they’ve already said to cover up something else?  Do they pause for a second or two before answering you? Many liars if confronted with a potential lie they told or if they are about to lie, need a second to gather together their facts.
  2. Do they often try to change the subject?
    Feeling backed in a corner, they may even end the call. Many times a liar will do anything to avoid the topic or change topics manically if you keep bringing the conversation back to the topic they want to avoid.
  3. Liars often get defensive.
    Getting defensive is a common tactic for liars. By getting angry or emotional, it helps the accused liar diffuse the topic and an effective way to get them “off the hook.” When talking to someone you think may be lying, make sure to stay at ease and calmly keep the conversation going.
  4. A liar will often create confusion in their comments.
    Do they repeat information several times? Do they go back and forth with their answers, giving inconsistent comments to the questions you asked?
  5. Do they find a way to abruptly get off the phone?
    If they don’t redirect the conversation to another topic, a liar will classically tell you they have to go, or find any other excuse to leave. Try to keep them on the phone by offering conversation of another topic and before hanging up, you can readdress your question. See if you get a consistent answer from the last time they answered it.
    (more)

Tips for a Malware-Free Smartphone (Android)

via PCworld.com...
The number of free Android apps that may be infected with malware this week has increased to more than 50.

• Research the publisher of the app. 
• Read online reviews.
• Check app permissions. If it asks for more than what it needs, skip it.
• Avoid directly installing Android Package files (APKs). 
• Put a malware and antivirus scanner on your phone. (Many of them are free.)
(more)

Kevin's Security Scrapbook - The Fine Print

Kevin's Security Scrapbook is a component of Spybusters, LLC, written and edited by Kevin D. Murray. This blog does not accept any form of advertising, sponsorship, or paid insertions. Mr. Murray writes for his own purposes and may be influenced by his background, occupation and experience. 

The blog contains excerpts from other sources, the original of which is clearly linked by the word (more) at the end of each entry. Personal comments and opinions are usually indicated in red type for clarity.

The owner of this blog is not compensated to provide opinion on products, services, websites and various other topics. The views and opinions expressed on this blog are purely the blog owners. We will only endorse products or services that we believe, based on our expertise, are worthy of such endorsement, however, this may not be relied upon as paid professional advice. Any product claim, statistic, quote or other representation about a product or service should be verified with the manufacturer or provider.

This blog does not contain any content which might present a conflict of interest.

Wednesday, March 2, 2011

Business Espionage: The Devine Apple Caper

Former Apple Employee Pleads Guilty to Selling Company Secrets 
Last August a man by the name of Paul Devine, 37 years old, was arrested following an FBI and IRS investigation. Apparently Mr. Devine was taking information on "product forecasts, roadmaps, pricing targets, product specifications, and data obtained from Apple's business partners" and passing it along to Apple's suppliers.

Why would suppliers want this info? Well typically they compete for Apple contracts and this info could give them an edge in the process. It could also afford them an advantage in negotiations on price/etc. once they had won the contract. Additionally, the information could be passed along to rival firms as some suppliers, like China's Foxconn, work with many companies.

The sell-out netted Mr. Devine over $10,000 in cash transferred from banks in the U.S. and overseas. And it cost Apple, by the company's estimates, over $2.4M USD. (more)



Imagine what Apple would lose if they didn't have a corporate counterespionage strategy? Got a strategy? Get one here.
India’s government has reiterated to BlackBerry manufacturer Research in Motion, and other companies providing encryption in their products, that they will have to be open to internal security and intelligence services if they wish to continue operating in the region.

Under this premise, Google and Skype could also be forced to shut down in the country if it cannot provide keys to its services...

To explain the difficulty of allowing a government to access Skype’s communications, one of the worlds leading intelligence organizations, the US National Security Agency, is still offering ‘billions’ for a solution to their eavesdropping needs on the peer-to-peer voice network. (more)

FutureWatch "...corporate parent eBay, having had to write down $1.4bn already following its $2.6bn purchase of Skype back in the bubble-2.0 days of 2005, might see an opportunity here. A billion or two from the NSA for a backdoor into Skype might make the acquisition seem like a sensible idea." (more)

Business Espionage: Ex-NYPD Detective SciSpy?

John Cook, writing for The New York Observer, has a very interesting piece today that alleges John Connolly – a former NYPD detective turned journalist, who has written for Vanity Fair, Gawker, and The Daily Beast – is a paid informant for the Church of Scientology.

The claims come from two previously high ranking members (they both defected) of the church: Marty Rathbun and Mike Rinder. Supposedly Connolly has been using his reporter credentials to pump other media members for information on anything they were going to write regarding Scientology. (more)

"No one likes a tattletale, Danny... except of course, me."

"Caddyshack" producer Rusty Lemorande claims an A&E documentary about the making of the movie was a "heartless fiction" that portrayed him as a "drug snitch" against the cast and crew, "a 'spy' on the set who secretly informed on everyone to the person who helped him get the job." Lemorande sued Pangolin Pictures and A&E Television Networks, which broadcast the documentary "Caddyshack: the Inside Story" on its "Biography" channel. Pangolin produced the show. (more)

Earbud SpyCam - For the Proletariat Press in Emerging Democracies?

from the seller's website...
"Nothing like this has ever been offered before!

The smallest earphone camera in the world!

In one of the earphones is a hidden video camera can use to capture and record video. You will fit right into the crowd and no one will have any ides what you are actually doing." (more)

Did You Know Uncle (ant farm) Milton Died

He did die, we're sad, and nature abhors a vacuum... (digital ant farm)

Uncle Milton's (the company) is still alive and well, however... unlike the ants in your old ant farm

His new ant farms are now high tech; filled with green gel instead of sand, LED back-lighting, fancy frame, etc. In fact, these ant farms are no longer called farms. Too bucolic. They have been up-scaled. Call them colonies now. Fortunately, the gated community concept survives. But...

Some people worry about leaving ants too close to the microwave, radon in the soil or cosmic rays (from the ants being delivered via air mail). 

One can't be too careful. I saw some Milty Mutants at the Atlanta airport. 

What does this have to do with spying?
Nothing. Just keep your knees loose, your eyes open and take good care of your ants. ~Kevin

Tuesday, March 1, 2011

Business Espionage: GlobeRanger - Seduced and Mocked

TX - A lawsuit filed in state court Friday reads like a Hollywood script: It includes sex, deception and espionage in an alleged conspiracy to rob a Richardson company of its livelihood.

GlobeRanger Corp. makes radio-frequency tags that help track inventory, a technology often called RFID, short for radio frequency identification. It says it poured millions of dollars and 10 years into an effort to sell its technology to the U.S. Navy.

Then came a woman named Kim Gray, who works for an Alaska-based software company called Naniq Systems LLC. According to GlobeRanger, Gray had an affair with Robert Bacon, the program director for the Navy's RFID efforts. The suit also alleges that Gray was also in a relationship with German company Software AG.

That's the company that, despite not having any experience with RFID in the application GlobeRanger had been developing, swooped in and won a contract with the Navy to do what GlobeRanger had been trying to do for a decade...

The defendants' attitude towards stealing a decade of GlobeRanger's work was not just malicious, it was cavalier: their co-conspirator, on tape, not only admits that they misappropriated the technology, he laughs about it," reads the suit filed in state court in Dallas. (more) (GlobeRanger lawsuit)

Monday, February 28, 2011

GSM Bugs, Prohibited Hi-tech Goods - Cheap

Vietnam - The Dong Kinh Market, the biggest and most bustling market in the border province of Lang Son, is considered the “paradise” of prohibited hi-tech goods, where imitated products are dirt cheap. 

Typical electronics market.
The noteworthy thing in the market is that prohibited goods are displayed openly. The “black technology” products, such as cameras, or key hooks with eavesdropping devices, are available at all electronics kiosks.

GSM bug
Most of these products (GSM bugs) are as small as matchboxes. The products use 900, 1800 and 1900 MHz band of GSM network and they have installed the MiniSIM of mobile phone in order to be used as sound recorders.

In February 2011, according to Buu dien, as the supply is profuse, the devices are selling very cheaply, at 500-650,000 dong ($23.94 - $31.13). The products with more complicated functions which allow to automatically call those, who want to eavesdrop, would be 100,000 dong ($4.79) more expensive.

The currently valid Government’s Decree No. 59 stipulates that all eavesdropping equipments are listed as prohibited goods. However, at Dong Kinh Market and other markets in the border provinces, such as Tan Thanh, Dong Dang in Lang Son province, Coc Leu in Lao Cai, the laws have been “ignored”. In fact, the market management taskforce has turned a blind eye to the products. (more)

• The electronic eavesdropping market is global.
• Laws against illegal eavesdropping devices are not being enforced, globally.
• Electronic eavesdropping is easy and affordable.

Sunday, February 27, 2011

Web's Hot New Commodity: Privacy

As the surreptitious tracking of Internet users becomes more aggressive and widespread, tiny start-ups and technology giants alike are pushing a new product: privacy. (more)

NOC, NOC, Who's there? See I a...

Always look for the ring.
The history of Central Intelligence Agency (CIA) officers landing behind bars in foreign countries dates back to 1951, when an undercover agent Hugh Redmond was caught in the Chinese city of Shanghai and charged with espionage.

According to the TIME magazine of October 27, 2003, agent Redmond was posing as an employee of a British import-export company. The CIA spy had to spend 19 years in a Chinese prison before actually dying there. In an article shedding light on the shadowy world of Non-official Cover spies or the NOCs, the afore-quoted edition of the TIME magazine had also mentioned another incident where the French agencies had rolled up five CIA officers, including a woman, who had been working under business cover for about five years. This incident had taken place in 1995.

Although the NOCs caught in Paris were simply sent home, a former CIA official familiar with the matter had opined,” The NOCs have no diplomatic status, so they can end up in slammers.

Research reveals that a “Non-official Cover” is often contrasted with an official cover, where agents assume a position at a seemingly benign department of their government, such as the diplomatic service. Diplomatic service provides the secret service agents with official immunity, thus protecting them from the steep punishments normally meted out to captured spies...

A thorough peek into this subject shows that serving as NOCs, various CIA officers even pose as American businessmen in friendly countries, from Asia to Central America to Western Europe.
 
The revelations about the NOCs (pronounced “knock”) were made public a few years ago by the American media. (more) (more)

Chinese Biz to US Gov... Prove we spy.

Huawei, the Chinese networking giant, has challenged US authorities to investigate claims it has close ties to the People's Liberation Army, after spying fears blocked its takeover of a small firm.

In an extraordinary open letter, Huawei's deputy chairman Ken Hu attacked "falsehoods" and "unfounded" concerns that scuppered the acquisition of 3Leaf, a cloud computing technology firm based in California.
 
"We sincerely hope that the United States government will address this issue by carrying out a formal investigation of any doubts it may have about Huawei in an effort to reach a clear and accurate conclusion," he said. (more)

Activist Group Sues Over Corporate Espionage

Following the recent undercover police scandal in the UK, the world's largest eco-activist group is turning the tables on one of the world's biggest chemical companies.

"And then they dumpster dived me, officer."
Greenpeace has field a lawsuit accusing The Dow Chemical Company of using private investigators to spy on the group, stealing thousands of documents and intercepting phone call details between 1998-2000...

The corporate spying was uncovered in an investigation by a journalist from the magazine Mother Jones, after it was handed documents by a former insider with the private security firm, since dissolved. (more)

When you think of business espionage, think outside the doughnut hole. Here, one business hires another business to do their spying. Nothing unusual so far. All spies try to insulate themselves from the actual act. Fark... The usual victim in the corporate/activists tug-of-war, the corporation, is alleged to be the spy this time. Backfark... The spies get stung by one of their own, via an internal theft of information. 

And you thought you only had to worry about activists. ~Kevin

Trojan Horse Spyware Masquerades as a "News" Item

Is this a blatant commercial for cell phone spyware being pawned off as a 'news' item? You decide. This just in from MSNBC.com...

"If you suspected your spouse, child or employee was up to no good, would you want concrete proof? Would it help if you had access to every phone call, text and e-mail they sent?

If so, a new cell-phone spying application might be right up your alley.

Made by Retina Software and released this week, ePhoneTracker allows users to monitor every move made on a person’s mobile phone, from call info and text messages to websites visited, e-mails sent and received, new contacts added and even the GPS coordinates of the phone’s user. Even deleted e-mails and texts can be retrieved by ePhoneTracker...

The software sells for $49.97. It is available for Android, BlackBerry, iPhone, Windows Mobile 6 or Symbian OS 9." (more

Hope they give my book equal coverage.

Thursday, February 24, 2011

"Oh, yeah. Sesame Street is nifty keen. Wanna go?"

Isis Forensics is preparing to release new mobile phone software which it says will enable children to check that their friends really are who they say they are.
 
Called ChildDefence, it allows youngsters to scan webchats to check the ages of people they’re messaging, putting the process in the hands of the children themselves, rather than their parents.

“Our research shows that children find it very difficult to spot adults posing as children on social networks. This software improves children’s chances of working out that something isn’t right. Using state of the art language analysis software it gives children a powerful tool which can help them work out who they are really talking to online.

It's currently undergoing final testing before being made freely available as iPhone, Google and Nokia phone apps. (more)

Unintended Consequence: Undercover on-line honeypot cops will have to be younger because the predators will be using this app to out them. ~Kevin

Bugged Bear Bites Bugger

NE - First, Little Bear became Big Brother as an Omaha-area woman inserted an electronic device into her daughter's favorite stuffed animal to record her ex-husband.

Now, Little Bear has become Big Burden as a judge has ordered the woman and her father to pay a total of $120,000 to six people who were illegally recorded.

In a civil judgment, U.S. Magistrate Judge F.A. Gossett III has ruled that Dianna Divingnzzo unlawfully recorded ex-husband William “Duke” Lewton by inserting the device into her then-4-year-old daughter's toy bear.

He also found that Divingnzzo's father, Sam, improperly transcribed conversations from Little Bear — and that Divingnzzo's former attorney, William Bianco, improperly distributed copies of the recordings. (more)

The Trash, The Man and The Bird

Dude, just don't tell him about the hummingbird with the built-in camera. It would break his heart. 

India - An MTech student of Indian Institute of Technology-Kanpur has come up with an `ornithopter' (mechanical bird) made out of scrap that is not only capable of flapping its mechanical wings just like birds but can also be used for spying. The bird, if fitted with cameras, can take pictures of enemy terrains. 

The `ornithopter' is in the shape of an eagle and is one metre long.

Joydeep Bhowmik, MTech first year student of IIT-Kanpur, who has made the mechanical bird, said that a smaller version of the mechanical bird can be used for spying purposes. (more) (sing-a-long)

"What Will Anna Chapman do Next?"

How Capt. Kirk's wardrobe got its start.
Remember our Anna Chapman Spy Contest, where we detailed her star-studded path since her failed career in espionage? From our "What will Anna Chapman do next?" files, an update!

Two new reports this week...

One-time Russian secret agent Anna Chapman, globally famous for being the only one of the deep-cover spy ring unmasked by the US last year who is even mildly attractive, will now assist the Russian space agency in designing a stylish new uniform for its personnel. (This story is disputed by some media.) (more)

Anna Chapman, the sultry redhead who was kicked out of the United States in June for spying, will run for Parliament in her native Russia, The Telegraph reported, citing Russia's Nezavisimaya Gazeta newspaper. (more)

Wednesday, February 23, 2011

Cell Phone Spyware Found on 150,000 Phones

China - The National Computer Virus Emergency Response Center has found a mutated version of a spyware software that allows a third party to eavesdrop on a two-way cell phone conversation without the users knowledge, Beijing Times reported Wednesday.

More than 150,000 mobile phone users are victims of Xwodi, Beijing-based NetQin Technology Company, a mobile security services firm said Wednesday.

The firm did not say what phone company the customers mainly used, or whether the victims were concentrated in a particular city.

Once the virus gets into the mobile phone, Xwodi records the users' messages and voice calls, and then send the information to a dedicated receptor. (more)

Tuesday, February 22, 2011

Spy Hard - Korean Style

South Korea’s intelligence agency has made headlines in the country for several consecutive days, after its agents allegedly broke into an Indonesian delegation’s hotel room last week in Seoul, in an attempt to steal classified information on Indonesia’s planned arms trade with South Korea. 

Korean media and net users lambasted it as both a botched spying job and an ethically regrettable act. The intelligence agency has neither denied nor admitted the allegation...

Local media reported that two men and one woman broke into the suite room at the Lotte Hotel on February 16, 2011 and fled after a delegation member saw them copying computer files onto a USB memory stick. South Korea’s Chosun newspaper reported an exclusive story strongly suggesting that the three intruders were members of the National Intelligence Service (NIS), South Korea’s top intelligence agency.

The 50-member delegation of Indonesian President Yudhoyono stayed for three days in Korea from February 15-17, 2011, to discuss on expanding bilateral economic and military cooperation between South Korea and Indonesia.

The three spies, who had not even disguised themselves as hotel staff, were caught red-handed handling two laptops in the room. When an Indonesian delegate walked in and found them, one agent handed him a laptop right away, while the other agents walked out of the room carrying another laptop to the hallway, only to then hand it back to the delegate. (more)

SpyCam Story # 602 - Toilet Brush with Danger

PA - An Earl Township woman has filed a lawsuit in Berks County Court accusing officials at a Muhlenberg Township company of failing to prevent a former employee from sexually harassing her, including videotaping her in the restroom

Sylvia Spayd and her husband, Glenn, accuse Markus Lattner, a former vice president of operations at Reading Powder Coatings Inc., of having a romantic fixation on her and hiding a video camera disguised as a pen in the ladies room.

Kathleen Heimbach of Douglass Township has filed a separate suit accusing Lattner of hiding a video camera in the ladies room.

Both suits allege Lattner used chewing gum to attach the video camera to a toilet brush in a bathroom stall at the plant at 1100 Commonwealth Blvd. The video also showed Lattner putting the device on the brush and leaving the restroom. (Doh!) (more)

Business Espionage - A Wiretapping Gang ?!?!?

Turkey - A wiretapping gang the police cracked down on in the southern province of Antalya last week offered a price list to its clients for the kind of tapping services it provides while charging them TL 2,500 ($1,565.00) for the entire wiretapping package, depositions of the suspected gang members have revealed.  

A complaint was lodged with the Antalya Prosecutor’s Office last year claiming that an organized group was illegally wiretapping individuals’ phones. The prosecutor’s office discovered that it was active in 15 provinces. In an operation named “Third Ear,” simultaneous raids were carried out at the offices of the gang, resulting in the detention of 10 people, including gang leader Ercan Ö. and a retired noncommissioned officer on Feb. 17. The gang, which offered its services to people who suspected their spouses of cheating on them, wiretapped the phones of suspected lovers or spouses for a fee. Police have detailed information about the working methods of the gang thanks to the depositions of the suspected gang members who were referred to the court.

The gang charged TL 350 ($219.00) for text-message following, TL 600 ($375.00) for text-message following and bugging, TL 500 ($313.00) for bugging and wiretapping of telephones, TL 600 ($375.00) to follow individuals weekly, TL 500 ($313.00) to follow a vehicle via general packet radio service (GPRS), while it charged TL 2,500 ($1,565.00) for the all-inclusive package. Clients who purchased the all-inclusive package were also given a three-day free trial period.

In addition to wiretapping and bugging, the gang members also physically followed people while disguised as couriers. (more)

How Some Energy Firms Spy on Environmental Activists

UK - Three large energy companies have been carrying out covert intelligence-gathering operations on environmental activists, the Guardian can reveal. 

The energy giant E.ON, Britain's second-biggest coal producer Scottish Resources Group and Scottish Power, one of the UK's largest electricity-generators, have been paying for the services of a private security firm that has been secretly monitoring activists.

Leaked documents show how the security firm's owner, Rebecca Todd, tipped off company executives about environmentalists' plans after snooping on their emails. She is also shown instructing an agent to attend campaign meetings and coaching him on how to ingratiate himself with activists. The disclosures come as police chiefs, on the defensive over damaging revelations of undercover police officers in the protest movement, privately claim that there are more corporate spies in protest groups than undercover police officers.

Senior police officers complain that spies hired by commercial firms are – unlike their own agents – barely regulated. (more)

Sunday, February 20, 2011

Business Espionage: Phone-y Cleaner Upper

Spain - Industrial espionage in the telecom equipment sector appears to be alive and kicking if an incident reported by Nokia Siemens Networks is anything to go by.

The vendor's representatives say the security at its "experience center" (a large, closed "village" area in Hall 8 at the Mobile World Congress show) was breached at around 4 p.m. Monday when a Chinese male, disguised as a cleaner, got through its tight security checks by tagging along behind three genuine cleaners who were visiting the center to perform their daily tasks.

The unwelcome guest was spotted peeling away from the cleaning group and checking out the technology presentations. When challenged, the interloper fled the area and couldn't be caught.

NSN staff say they have no proof that he was a spy from another telecom systems vendor, but are convinced that this was a bungled spying incident, and believe a genuine cleaner was bribed to hand over his uniform. 

A NSN spokesman says the vendor's security team, which is on guard 24 hours a day, has thwarted two other attempts by unwelcome visitors to gain access to its exhibition space. In one incident, two Asian males with cameras arrived at NSN's center in the late evening (once the show is closed) saying they had been given permission to visit the stand "while it was quiet." They were turned away.(more)

Private Sector Spy Interviewed

UK - Ejector seats, super magnetic watches, guns you can make from a cigarette case and a cuff link - sadly none of these exist in the lives of real spies but Pocket-lint spoke to surveillance expert and ex-SAS member, Dave Thomas to find out what does.

“All the gadgets are mostly about collecting intelligence,” he tells us. “That’s the core of the job.

There are bugging devices like this one,” he says as he opens up his briefcase full of wires and connectors to clutch a microphone no bigger than a pin head between his thumb and forefinger.

“This little thing is sensitive enough to pick up all the audio from a whole room in all directions. All you need is a battery and transmitter and you can hide this thing just about anywhere - in the light, under the table, in the plant pot but then you might have to worry about someone watering it.”

Spotting a niche in the market, Thomas set up a business 17 years ago providing surveillance services for blue chip companies and has been using the same techniques as those he learned on the governmental side of the trade.

“We’ve followed everyone from terrorists to footballers to journalist, corporate fraudsters, movie stars and all to find out what they’re doing, what they’re up to, where they’re going, who they’re meeting, who they’re getting their drugs from, where they’re getting their weapons from and whatever else there is to know.” (more)

The Faceless at Facebook Who Spy

via pcworld.com...
The war between security firm HBGary and Anonymous reveals a new tactic: using fake social network profiles to gather information.
Is that new friend really your friend, or just someone pretending to be your friend so he can spy on you? No, I'm not just being more paranoid than usual. This really does happen - especially if you're a member of an anonymous collective determined to do battle with the forces of corporate evil (not to mention Tom Cruise, Soulja Boy, and your mom).

The ongoing battle between Anonymous and the security wonks who are trying to take it down has revealed a new weapon: Creating fake profiles on social networks to trace out the connections between you and your comrades. (more)

"Every step you take, I'll be watching you"

Applause also to American Express security department. The Amex Sting private event at Newark's Prudential Center last night was covered perfectly. Thanks, for the memories.

Friday, February 18, 2011

SpyCam Story # 601 - Janitor in a Tank

An Ottawa, Kansas, school employee is under arrest for allegedly trying to spy on a high school girl's lockerroom, police say. Marshall Dean Silve, 53, faces misdemeanor attempted eavesdropping charges after a camera was found in the girl's lockerroom at Ottawa High School... 

...it was discovered on Monday by two Ottawa High sophomores. The girls say that when they walked into their locker room, they saw something out of the ordinary.

"We saw a dust mop, and usually there's a janitor where there's a dustmop, so she lifted the dust mop and there was a camera underneath there," said Ottawa High student Erika Doty, who says at first they thought the camera was left there by accident. (more)

Baby Monitor as Eavesdropping Device

 In case you have just exited cryogenic suspension, this just in from KTVX-TV...
UT - Someone could be eavesdropping on you using something as simple as a $99 baby monitor.

In just three hours wandering the streets of Herriman, we picked up 15 video and audio signals. We used just two brands of monitors. (more)

"All right. Which one of you muttered, 'What about indirectly?'"

Canada - Montreal Mayor Gerald Tremblay is denying being directly involved in spying on the city's own financial watchdog, the auditor general.

Earlier this week, it was revealed that Pierre Reid, the city's controller-general, was spying on the auditor general's e-mails....

On Tuesday, Auditor General Jacques Bergeron sent to all city councillors, informing them city bureaucrats were snooping in his email account, and had been reading all correspondence, including private messages sent to and from his lawyers. (more)

FBI Seeks Ãœber Light Switch


Rapid advances in communications are eroding police departments' abilities to conduct wiretaps, and Congress needs to take steps to ensure that new telephone, computer and wireless systems are designed to allow lawful police access, FBI and police officials told Congress Thursday.

But other witnesses cautioned that any such move could stifle innovation, place U.S. technology companies at a competitive disadvantage and unintentionally create systems vulnerable to hackers, criminals and terrorists.

At issue is the diminished capability of law enforcement agencies to conduct quick wiretaps in an age of Twitter accounts, Facebook and MySpace pages, BlackBerrys, Androids, iPhones and iPads. The Justice Department calls the phenomenon "going dark." (more)

Thursday, February 17, 2011

Similar to Iceland's Recent 'Extra Computer' Find

A computer found hidden at Jönköping Airport in central Sweden in a case of suspected industrial espionage has been found to have been part of routine cooperation between the IT department and an airline.

The computer was discovered three weeks ago by a member of staff connected to the airport's intranet. Both the airport management and the police suspected a case of industrial espionage and launched an investigation.

The computer, which was connected to Jönköping Airport's internal network, was discovered by a member of staff a couple of weeks ago and it was feared that sensitive information had been transferred to a third party. (more)

Truth, or the public version of the story? You decide.

Hummingbirds Drone... and Spy

A pocket-size drone dubbed the Nano Hummingbird for the way it flaps its tiny robotic wings has been developed for the Pentagon by a Monrovia company as a mini-spy plane capable of maneuvering on the battlefield and in urban areas...

Equipped with a camera, the drone can fly at speeds of up to 11 miles per hour, AeroVironment said. It can hover and fly sideways, backward and forward, as well as go clockwise and counterclockwise, by remote control for about eight minutes.

The quick flight meets the goals set forth by the government to build a flying "hummingbird-like" aircraft. It also demonstrates the promise of fielding mini-spy planes. Industry insiders see the technology eventually being capable of flying through open windows or sitting on power lines, capturing audio and video while enemies would be none the wiser. (more)

Can Apple Make Security Sexy?

via pcworld.com...
Security has never been sexy. It just isn't. Unless you are fond of men in uniforms. Some people are. Most are not. Security is a shadowy world of white hats and black hats and Anonymous and known. Security is a fact of life that no one likes. Security, like back-up, is a problem everyone has and no one wants to understand.

Security must be sexy
Apple's next step will be to make security sexy. It must. Because the future connected-planet needs security to be over 100 percent before it is born. The company has already begun. Last month it appointed former National Security Agency analyst and author David Rice as its global director of security. Security is the biggest challenge Apple faces as it moves to define the future of technology in modern living. Security is the new frontier. (more)

Wednesday, February 16, 2011

Business Espionage: Quote of the Week

Kommersant, a leading financial newspaper in Russia, interviewed Raili Maripuu, WhiteRock’s Managing Director for this week’s major business trend analysis. The article is dedicated to the growing threat of industrial espionage from China and following the trade secrets theft scandal surrounding the French car producer Renault. 

Miss Maripuu explains that: "Any successful company with a value is a likely target to its competitors. Information gatherers do not necessarily choose a particular sector to attack - espionage happens across the board." (more)

Business Espionage: Ratan Tata Lashes Out Over Leaks

In an interview, Indian industrialist Ratan Tata lashed out at the government for allowing media outlets to get hold of wiretap recordings of his lobbyist's phone calls, and said strong privacy protection is needed to prevent similar episodes in the future. (more)

Sunday, February 13, 2011

Library PC Bugging Scam

In-line Keyboard Cable Logger
UK - Police are investigating the discovery of snooping devices attached to public computers in two Cheshire libraries. Staff found the keyloggers, USB devices which record keyboard activity, in the back of two PCs at Wilmslow Library and one at Handforth Library. (more)

Tip: Don't use public computers, but if you must, don't type in any confidential information, but if you must, don't use public computers. 

In-line USB Keystroke Logger
A physical search may turn up a keystroke logger, but cannot be relied upon to declare a computer is clean. Keystroke loggers are also sold embedded inside keyboards and as spyware (software), some of which instantly transmits the keystrokes to a remote location. 

Two types of physical hardware loggers are shown. ~Kevin

Business Espionage: Target - Global Energy Companies

A China-based man named Song Zhiyue has provided cheap U.S. computer servers for hackers who used everyday tools to infiltrate five multinational energy companies for as many as four years, according to a report issued by McAfee. Song, based in the Shandong Province's Heze City, in eastern China, is one of an undetermined number of other hacking specialists working normal business hours in Beijing to infiltrate the computer systems of energy companies in four countries -- the United States, Taiwan, Greece and Kazakhstan. McAfee did not identify the companies but said that Song's operation and that of the hackers has not been shut down.

Artist's conception.
The attacks are a sign of the increasing difficulty and high stakes involved in oil and gas exploration, and the extent to which some companies and countries are willing to go to get access to the fields. The purpose of the octopus-like hacking was a system that mined financial and exploration data on oil- and gas-fields that was critical to bidding for the fields, McAfee said. The attacks suggest that officials or companies in China were attempting to understand fields that were or going to be under bid; the financial and other plans of rivals that might bid on the same fields; and the equipment already at the fields or that might be used to explore or produce there. (more)

Tip: Computer hacking is supplemental to other espionage techniques, like electronic eavesdropping. Spies also want information before it gets put into the computer and the information which never gets put into a computer. Check your networks, but check your offices and phones first. ~Kevin

This week in Spy News

UK - An MP's assistant accused of spying for Russia is on course to follow in the footsteps of Anna Chapman after being offered a job at the Kremlin's English-language TV news propaganda channel.(more)

A Taiwanese general detained in what could be the island's worst espionage case in 50 years was lured by sex and money offered by a female Chinese agent, media reported Thursday. (more)

Alleged spying at French car maker Renault may have targeted the costs involved in making electric cars, its chief executive said in an interview published Friday. (more)

A court in Moldova's breakaway Transdniestria region has sentenced a Moldovan man to 14 years in jail after convicting him of espionage. (more)

India - A senior home ministry official accused of leaking sensitive information in return for sexual favours moved his bail application in a court here Friday. (more)

Italy's sex scandal mired prime minister Silvio Berlusconi has likened Italy's prosecutors, its left-leaning newspapers and TV talkshows to spies from the former communist East Germany. (more)

Pakistan - Militants killed three, including two Khasadar tribal force members, accusing them of spying, sources said. (more)

Iran - Two Americans accused of spying appeared in a closed-door Iranian court session Sunday to begin trial after an 18-month detention that has brought impassioned family appeals, a stunning bail deal to free their companion and backdoor diplomatic outreach by Washington through an Arab ally in the Gulf. (more)

German federal prosecutors have charged a 43-year-old Moroccan with spying on exiled opposition activists for his country's intelligence service. (more)

Pakistani authorities have decided to indict US diplomat Raymond Davis on espionage charge, saying he had been conducting surveillance of the Pakistan Army’s bunkers on the Eastern border with India. (more)

Two retired marines have been held captive for more than eight weeks in the Horn of Africa after a gun battle while they were escorting a merchant ship through waters threatened by pirates... they are accused of spying after being arrested by a naval vessel from Eritrea as they guarded the ship in the Indian Ocean. A dispute about their paperwork escalated and threats were followed by shots being exchanged. Two guards tried to escape in a skiff but were seized after a chase. They were, it is claimed, kept on an offshore island without food or water for more than a day before being taken back to a port city on the mainland for incarceration. (more)

OR - A student at St. Paul High School has been caught spying on the girls' basketball team by hiding his cell phone in their locker room. (more

Mark J. Hulkower, prosecutor in Aldrich Ames spy case, dies at 53. (more)

SpyCam Story #600 - Wildman on Good Behavior

Australia - A 29 year old Nelson Bay man who broke into his ex-girlfriend's home and installed a camera to spy on her has been placed on a good behavior bond.

Dane Wildman pleaded guilty in November last year to breaking into his ex-girlfriend's home to install the optical surveillance device.

He admitted to having a key cut so that he could install the small camouflage camera under the woman's bed to determine if she was seeing another man. A small child discovered the device.

The woman took it to police who downloaded nearly 400 images including one of Wildman as he installed it. (more)