Thursday, August 11, 2011

Last Laugh - Briton, SpyCam Capital of the World

Can you think of a worse place in the world to riot in the streets?
SHOP A MORON - Name and shame a rioter
Click to enlarge.
These are just some of the 2,000 suspects being hunted today over Britain's riot mayhem. Police issued the CCTV shots and appealed to witnesses to identify anyone they recognise. Sun readers are urged to name and shame any morons they saw looting or committing arson and wrecking property. (more)

FutureWatch: A flood of RFP's for High-Def SpyCams. Darwin Awards.
N.B. Not to be confused with Photoshoplooter... 
(more)


Quote of the Day: “If I get my hands on someone’s lost phone, it could take me ten minutes to find an account username and password.”

An uncomfortably large percentage of mobile applications are storing sensitive user account information unencrypted on owners’ smartphones, according to a new survey of 100 consumer smartphone apps.

Click to enlarge.
Some 76 percent of the apps tested stored cleartext usernames on the devices, and 10 percent of the tested applications, including popular apps LinkedIn and Netflix, were found storing passwords on the phone in cleartext.

Conducted by digital security firm ViaForensics, the testing occurred over a period of over eight months and spanned multiple categories, ranging from social networking applications to mobile banking software. The firm tested apps only for iOS and Android, the market’s leading mobile platforms.

If I get my hands on someone’s lost phone, it could take me ten minutes to find an account username and password,” said Ted Eull, techology services vice president at ViaForensics, in an interview. (The Bad App List.)

Read up on what to do about it, here.

Wednesday, August 10, 2011

FBI, Texas Rangers Search City Offices for Bugging Devices

TX - Tenaha Mayor George Bowers has confirmed that Texas Rangers and FBI agents searched city property for bugging devices this week.

Bowers said he was present on Monday as the state and federal agents scoured the workplace for bugging devices. The search was conducted after city work hours, according to Bowers...

There are rumors several bugging devices were found inside the police station. City Marshall Tom Reader acknowledged the searches, but would not confirm or deny that any were found in the police station. (more)

Security Directors: FREE Security White Paper - "Surreptitious Workplace Recording ...and what you can do about it."   

Security Flaws in Feds’ Radios Make for Easy Eavesdropping

via The Wall Street Journal...
The portable radios used by many federal law enforcement agents have major security flaws that allowed researchers to intercept hundreds of hours of sensitive traffic sent without encryption over the past two years, according to a new study being released today.

While studying the technology, researchers from the University of Pennsylvania overheard conversations that included descriptions of undercover agents and confidential informants, plans for forthcoming arrests and information on the technology used in surveillance operations...

Their research also shows that the radios can be effectively jammed using a pink electronic child’s toy and that the standard used by the radios “provides a convenient means for an attacker” to continuously track the location of a radio’s user.

The authors say they are extremely concerned about the security lapses found in the radios, which are used by the FBI and Homeland Security as well as state and local law enforcement. “We strongly urge that a high priority be placed” on a “substantial top-to-bottom redesign” of the system, dubbed P25, they write. (more) (study)

Tuesday, August 9, 2011

Today in Spy History

On Aug. 9, 1974, President Richard Nixon resigned following damaging revelations in the Watergate scandal. (more)

Faulty Towers, or The Young Ones strike back

Scarborough bed-and-breakfast owner Paul Williams has been jailed for 18 weeks for spying on his guests through secret peepholes and making audio recordings of their most intimate moments.

Paul Williams, 60, watched three couple from holes which he had drilled in the doors of the rooms at his bed-and-breakfast in Scarborough, North Yorkshire.

He was discovered when one of his victims, a 16-year-old student, spotted a poster placed over one of the holes begin to move. Her boyfriend investigated and found a hole which provided a view directly on to the bed. He then heard movement in the corridor outside and discovered Williams who was wearing just a dressing gown.

Audio recording equipment was then discovered at the Sandsea guest house. Guests were left feeling ''sick and horrified'' when they discovered what had happened.

Williams, of Devonshire Drive, Scarborough, pleaded guilty to charges of voyeurism and was sentenced at the town's magistrates' court today. (more)

Monday, August 8, 2011

Blackmail She Wrote - 'Explosive' Jackie O Tapes to Be Released

Jackie Onassis believed that Lyndon B Johnson and a cabal of Texas tycoons were involved in the assassination of her husband John F Kennedy, ‘explosive’ recordings are set to reveal.

The secret tapes will show that the former first lady felt that her husband’s successor was at the heart of the plot to murder him.

 She became convinced that the then vice president, along with businessmen in the South, had orchestrated the Dallas shooting, with gunman Lee Harvey Oswald – long claimed to have been a lone assassin – merely part of a much larger conspiracy...

The tapes were recorded with leading historian Arthur Schlesinger Jr. within months of the assassination on November 22, 1963, and had been sealed in a vault at the Kennedy Library in Boston.

Caroline Kennedy, has agreed to release them early and have them aired on a special program on ABC. It is believed she agreed to the release in exchange for the network dropping its $10 million series about the family. (more) (must-see TV)

Point & Shoot Android Hacker Toolkit - $10.

While iOS users can pretend to be hackers with games like Hack RUN and iHack, those who own Android gadgets will soon be able to break into networks and computers for real. That’s because Israeli security firm zImperium is about to launch an app that can search for vulnerable targets and infiltrate them, allowing users to eavesdrop or even “attack” the devices.



The app is called Anti, short for Android Network Toolkit. It was introduced by zImperium at last week’s Defcon hacking conference, and reportedly impressed several attendees for its ease of use and affordability. With Anti, a user can infiltrate Windows machines, devices running an unspecified older version of Android and yes, even iPhones. Anti will debut at the Android Market next week as a free app that can be upgraded for $10 (USD). (more)

Security Director Alert - Networked Copiers & Cameras

Millions of copiers and printers in thousands of companies worldwide are ripe targets for cyberthieves in the hunt for sensitive business documents. 

Researchers from Web security firm Zscaler ran a simple search and easily located 118,194 Hewlett-Packard printer-scanners, 9,431 Cannon photocopiers and 3,554 D-Link webcams equipped as Internet-connected Web servers.

Any intruder could do the same thing, then take over control of devices protected by weak passwords, says Michael Sutton, Zscaler's vice president of research. The intruder could then steal images of documents stored in a copier's memory or take control of webcams placed inside a work area.

"I'd be surprised if attackers weren't already taking advantage," says Sutton, who released the findings Thursday at the Black Hat cybersecurity conference here. "They'd be foolish not to. It's just too easy." (more)

This is old news for our our client family; we warned them about this years ago. The fact that the media is finally paying attention means this espionage trick is gaining exposure. Expect more people to take advantage of it. Double-check your defenses. Electrons move fast. I wish I could tell you this is the only information security vulnerability around your office. It isn't.

Today in Spy History

On Aug. 8, 1974, President Richard Nixon announced he would resign following damaging revelations in the Watergate scandal. (more)


Good evening.

This is the 37th time I have spoken to you from this office, where so many decisions have been made that shaped the history of this Nation. Each time I have done so to discuss with you some matter than I believe affected the national interest.

In all the decisions I have made in my public life, I have always tried to do what was best for the Nation. Throughout the long and difficult period of Watergate, I have felt it was my duty to persevere, to make every possible effort to complete the term of office to which you elected me.

In the past few days, however, it has become evident to me that I no longer have a strong enough political base in the Congress to justify continuing that effort. As long as there was such a base, I felt strongly that it was necessary to see the constitutional process through to its conclusion, that to do otherwise would be unfaithful to the spirit of that deliberately difficult process and a dangerously destabilizing precedent for the future.

But with the disappearance of that base, I now believe that the constitutional purpose has been served, and there is no longer a need for the process to be prolonged.

I would have preferred to carry through to the finish whatever the personal agony it would have involved, and my family unanimously urged me to do so. But the interest of the Nation must always come before any personal considerations.

From the discussions I have had with Congressional and other leaders, I have concluded that because of the Watergate matter I might not have the support of the Congress that I would consider necessary to back the very difficult decisions and carry out the duties of this office in the way the interests of the Nation would require.

I have never been a quitter. To leave office before my term is completed is abhorrent to every instinct in my body. But as President, I must put the interest of America first. America needs a full-time President and a full-time Congress, particularly at this time with problems we face at home and abroad.

To continue to fight through the months ahead for my personal vindication would almost totally absorb the time and attention of both the President and the Congress in a period when our entire focus should be on the great issues of peace abroad and prosperity without inflation at home.

Therefore, I shall resign the Presidency effective at noon tomorrow. Vice President Ford will be sworn in as President at that hour in this office.

As I recall the high hopes for America with which we began this second term, I feel a great sadness that I will not be here in this office working on your behalf to achieve those hopes in the next 2 1/2 years. But in turning over direction of the Government to Vice President Ford, I know, as I told the Nation when I nominated him for that office 10 months ago, that the leadership of America will be in good hands.

In passing this office to the Vice President, I also do so with the profound sense of the weight of responsibility that will fall on his shoulders tomorrow and, therefore, of the understanding, the patience, the cooperation he will need from all Americans.

As he assumes that responsibility, he will deserve the help and the support of all of us. As we look to the future, the first essential is to begin healing the wounds of this Nation, to put the bitterness and divisions of the recent past behind us, and to rediscover those shared ideals that lie at the heart of our strength and unity as a great and as a free people.

By taking this action, I hope that I will have hastened the start of that process of healing which is so desperately needed in America.

I regret deeply any injuries that may have been done in the course of the events that led to this decision. I would say only that if some of my judgments were wrong, and some were wrong, they were made in what I believed at the time to be the best interest of the Nation.

To those who have stood with me during these past difficult months, to my family, my friends, to many others who joined in supporting my cause because they believed it was right, I will be eternally grateful for your support.

And to those who have not felt able to give me your support, let me say I leave with no bitterness toward those who have opposed me, because all of us, in the final analysis, have been concerned with the good of the country, however our judgments might differ.

So, let us all now join together in affirming that common commitment and in helping our new President succeed for the benefit of all Americans.

I shall leave this office with regret at not completing my term, but with gratitude for the privilege of serving as your President for the past 5 1/2 years. These years have been a momentous time in the history of our Nation and the world. They have been a time of achievement in which we can all be proud, achievements that represent the shared efforts of the Administration, the Congress, and the people.

But the challenges ahead are equally great, and they, too, will require the support and the efforts of the Congress and the people working in cooperation with the new Administration.

We have ended America's longest war, but in the work of securing a lasting peace in the world, the goals ahead are even more far-reaching and more difficult. We must complete a structure of peace so that it will be said of this generation, our generation of Americans, by the people of all nations, not only that we ended one war but that we prevented future wars.

We have unlocked the doors that for a quarter of a century stood between the United States and the People's Republic of China.

We must now ensure that the one quarter of the world's people who live in the People's Republic of China will be and remain not our enemies but our friends.

In the Middle East, 100 million people in the Arab countries, many of whom have considered us their enemy for nearly 20 years, now look on us as their friends. We must continue to build on that friendship so that peace can settle at last over the Middle East and so that the cradle of civilization will not become its grave.

Together with the Soviet Union we have made the crucial breakthroughs that have begun the process of limiting nuclear arms. But we must set as our goal not just limiting but reducing and finally destroying these terrible weapons so that they cannot destroy civilization and so that the threat of nuclear war will no longer hang over the world and the people.

We have opened the new relation with the Soviet Union. We must continue to develop and expand that new relationship so that the two strongest nations of the world will live together in cooperation rather than confrontation.

Around the world, in Asia, in Africa, in Latin America, in the Middle East, there are millions of people who live in terrible poverty, even starvation. We must keep as our goal turning away from production for war and expanding production for peace so that people everywhere on this earth can at last look forward in their children's time, if not in our own time, to having the necessities for a decent life.

Here in America, we are fortunate that most of our people have not only the blessings of liberty but also the means to live full and good and, by the world's standards, even abundant lives. We must press on, however, toward a goal of not only more and better jobs but of full opportunity for every American and of what we are striving so hard right now to achieve, prosperity without inflation.

For more than a quarter of a century in public life I have shared in the turbulent history of this era. I have fought for what I believed in. I have tried to the best of my ability to discharge those duties and meet those responsibilities that were entrusted to me.

Sometimes I have succeeded and sometimes I have failed, but always I have taken heart from what Theodore Roosevelt once said about the man in the arena, "whose face is marred by dust and sweat and blood, who strives valiantly, who errs and comes short again and again because there is not effort without error and shortcoming, but who does actually strive to do the deed, who knows the great enthusiasms, the great devotions, who spends himself in a worthy cause, who at the best knows in the end the triumphs of high achievements and who at the worst, if he fails, at least fails while daring greatly."

I pledge to you tonight that as long as I have a breath of life in my body, I shall continue in that spirit. I shall continue to work for the great causes to which I have been dedicated throughout my years as a Congressman, a Senator, a Vice President, and President, the cause of peace not just for America but among all nations, prosperity, justice, and opportunity for all of our people.

There is one cause above all to which I have been devoted and to which I shall always be devoted for as long as I live.

When I first took the oath of office as President 5 1/2 years ago, I made this sacred commitment, to "consecrate my office, my energies, and all the wisdom I can summon to the cause of peace among nations."

I have done my very best in all the days since to be true to that pledge. As a result of these efforts, I am confident that the world is a safer place today, not only for the people of America but for the people of all nations, and that all of our children have a better chance than before of living in peace rather than dying in war.

This, more than anything, is what I hoped to achieve when I sought the Presidency. This, more than anything, is what I hope will be my legacy to you, to our country, as I leave the Presidency.

To have served in this office is to have felt a very personal sense of kinship with each and every American. In leaving it, I do so with this prayer: May God's grace be with you in all the days ahead.

Security Director Alert: Corporate Email Espionage

A cautionary tale...
The strange e-mails arrived in executives' inboxes around the same time that the Australian oil company was negotiating a deal with a Chinese energy company.

The e-mails had the same structure and format as those sent around the company and were baited with text that appeared to refer to a supposed continuing discussion between executives. The messages looked authentic from a nontechnical perspective, just part of normal electronic communication within a company.

But the corporate IT administrator felt something wasn't quite right. Upon closer examination, the administrator found the e-mails, while appearing to come from internal company servers, were actually coming from other domains not authorized to send e-mail for the company.

The e-mails contained a malicious link that would redirect the person who opened it to a website of another energy company whose Web pages had been hacked in order to deliver malicious software designed to steal data. Victims would have no indication they'd been attacked.

It became clear that hackers were on a campaign to find out more about the pending deal... (more)

Sunday, August 7, 2011

Awe right, which one of youz wise guys said, "They have phones?!?!"

 In August 2011, Special Operations Technology, Inc. in Annapolis Junction, MD receives a $79.5 million cost-plus-fixed-fee contract modification “to install, operate, and maintain the lawful intercept equipment and support equipment at various locations around Afghanistan.” 

Wiretaps can be used for a wide variety of purposes, of course, and there’s an especially pointed history tied to US wiretaps within combat zones... (more)

Where Are They Now: Anthony Pellicano Speaks

Long before the Murdoch empire’s phone-hacking scandal, Anthony Pellicano was the private eye that stars feared (and used) most. In his first interview since going to prison, he reveals new details on spying for Schwarzenegger, clearing Cruise's name—and why he dumped Michael Jackson. 

...the most explosive find in Pellicano’s office was a trove of thousands of transcripts and encrypted tapes of phone conversations he’d illegally tapped. Pellicano had designed a wiretapping program to intercept calls that he dubbed Telesleuth. Aided by several phone-company workers he employed, he installed taps in telephone junction boxes and at the main switchboard that were then connected via phone lines to the computers in Pellicano’s office and remote laptops...

The disgraced detective still insists that none of his clients knew anything about his wiretapping, in particular the high-powered lawyers, like Fields, who employed him. “I didn’t tell no one about the wiretapping,” he says. “I didn’t trust lawyers: they had an obligation to tell on me.” Still, he adds knowingly, “You can turn a blind eye, but 99 percent of the lawyers out there don’t care how the problem was solved.” (more)

UK Phone-Hacking Scandal Widens - Piers Morgan Under Pressure

Can Piers Morgan survive? It is a question his enemies and fans on both sides of the Atlantic are asking with increasing urgency. The position of the former tabloid editor turned CNN chat show host looks vulnerable as the phone-hacking scandal continues to unfold with fresh revelations almost daily.

But unlike other senior journalists caught up in the scandal, it is not Scotland Yard that has been responsible for turning up the heat on Morgan. Rather, in what his enemies might suggest is proof that there is such a thing as divine retribution, it is Morgan's unchecked vanity. Morgan, who edited the Daily Mirror for nearly a decade until 2004, faces questions over a series of boasts that suggest he was at the very least familiar with the practice of phone hacking.

Morgan admitted in a column for the Daily Mail in 2006 that he had heard a message left by Sir Paul McCartney on the phone of Heather Mills, then his wife, in which the former Beatle sounded "lonely, miserable and desperate". The disclosure has prompted Mills to claim the message could have been heard only by hacking into her phone. (more)

3 out of 10 Android Cell Phone Users Hit By Malware this Year

If... you thought your phone was safe, you, sir, were sorely mistaken. As we speak, your phone could be spying on you, getting access to all your secret passcodes, bank account information, and credit card numbers. The little bastard could even be pilfering money from you behind your back.

Now before you go thinking your phone has turned into Hal from “2001: A Space Odyssey,” it hasn’t. These attacks are the result of malware and spyware that you may have unintentionally invited into your phone when you downloaded an infected app. And a new report released Wednesday by Lookout Mobile Security finds that such malware and spyware is on the rise. One particularly troubling finding: Android users are now twice as likely to encounter malware today than they were six months ago, and three out of ten Android users are likely to encounter a Web-based threat on their device each year.

Interestingly, the report notes that while application-based threats affect both Android and iOS devices, malware and spyware have primarily targeted Android devices. iOS devices are more likely to be hit with commercial spyware apps developed specifically for jailbroken devices.

For Android phones, malware has been increasing at a faster rate than spyware, but spyware still remains the larger threat. In January 2011, 34% of all threats were malware and 66% were spyware. But as of June 2011, malware made up 48% of all threats, compared to spyware’s 52%. (more)

Spybuster Tip: Go iOS. Don't jailbreak.

Software Security Wins when Combating Phone Hacking

The recent events involving the mobile phone hacking actions of News of the World journalists – and quite possibly many others – have highlighted the fact that there are insecurities in the world of mobile telephony.

And with approaching five billion mobiles in circulation – almost at the level of one handset for every person over the age of 10, it is perhaps inevitable that some elements of the services available may be found wanting when it comes to certain aspects of security.

Against this backdrop, much has been made of the fact that cellular phones operate across open radio channels that – with the right equipment in place – they can be subverted.

But this isn’t actually true... (more)

"Yuki 7 and the Gadget Girls" (for your morning coffee break)

 WHO IS YUKI 7? 

"Fashionista and spy girl Yuki 7, along with her team of beautiful secret agents, the Gadget Girls, will excite the world with their gorgeous outfits, amazing gadgets, and fabulous escapades! From their glamorous headquarters outside of Tokyo, this team of spies can crack any case and look stunning while they do it!" (video) (fan club)

Book written by Elizabeth Ito. Includes DVD with "Looks That Kill" and "A Kiss From Tokyo" short films + Special Bonus Features! 72 Pages. Paperback with Acetate Dust Jacket.


ABOUT THE CREATOR
Artist Kevin Dart dreamed up the character of Yuki 7 while In London on a business trip in 2008. Yuki and her glamorous, jet-setting lifestyle provided an outlet for Kevin's fascination with the 1960s, retro spy flicks, and powerful female characters. Working in his spare time between freelance illustration gigs, he put together Yuki's first book, "Seductive Espionage: The World of Yuki 7", along with writer Ada Cole and a host of contributions from his close circle of friends around the animaton industry. The book debuted in Summer 2009 along with Yuki's first animated trailer, "A Kiss From Tokyo". Since then, Kevin has continued to expand Yuki's universe and is planning a new series of books and other exciting products.

Kevin currently lives in Pasadena, CA with his wife and works in the local animation industry.

Saturday, August 6, 2011

Child ID - A Must-Have App from the FBI

You're shopping at the mall with your children when one of them suddenly disappears. A quick search of the nearby area is unsuccessful. What do you do?

Now there's a free new tool from the FBI that can help.  

Child ID app—the first mobile application created by the FBI—provides a convenient place to electronically store photos and vital information about your children so that it’s literally right at hand if you need it. You can show the pictures and provide physical identifiers such as height and weight to security or police officers on the spot. Using a special tab on the app, you can also quickly and easily e-mail the information to authorities with a few clicks.

The app also includes tips on keeping children safe as well as specific guidance on what to do in those first few crucial hours after a child goes missing. (more)

Can't Touch This - A Tribute to Leon Theremin

Scarborough, UK - Hands Off 2011 is a musical festival featuring Theremin players.

Enthusiasts will congregate in the town for a long weekend of talks, workshops, masterclasses and performances, some of which are open to the public to attend.

The Theremin is an electronic instrument invented in 1919 by Leon Theremin and mastered by Clara Rockmore and is played by the likes of electronic guru Jean Michel Jarre, Led Zeppelin’s Jimmy Page and musical comedian Bill Bailey.

Film buffs will know the sound of the Theremin from movies such as The Day the Earth Stood Still (Hear the original studio recording session!), Spellbound and The Thing.

Recent films scores of note include Ed Wood and The Machinist, both of which feature virtuoso Thereminist Lydia Kavina who is just one of the many experts coming to Scarborough. (more) (video - Hands Off 2011 ) (Theremin's spy history)

I built my first theremin in the early 60's (engineered by Robert Moog) and today use a real Moog made model. This is a very difficult instrument to master. I'm still trying. The folks you see at Hands Off 2011 are incredibly talented.

Leon Theremin plays...

With ISP Taps, Typing "Apple" May Never Yield Fruit Again

Searches made by millions of internet users are being hijacked and redirected by some internet service providers in the US. Patents filed by Paxfire, the company involved in the hijacking, suggest that it may be part of a larger plan to allow ISPs to generate revenue by tracking the sites their customers visit. It may also be illegal.

Reese Richman, a New York law firm that specialises in consumer protection lawsuits, today filed a class action against one of the ISPs and Paxfire, which researchers believe provided the equipment used to hijack and redirect the searches. The suit, filed together with Milberg, another New York firm, alleges that the process violated numerous statutes, including wiretapping laws.

The hijacking seems to target searches for certain well-known brand names only. Users entering the term "apple" into their browser's search bar, for example, would normally get a page of results from their search engine of choice. The ISPs involved in the scheme intercept such requests before they reach a search engine, however. They pass the search to an online marketing company, which directs the user straight to Apple's online retail website. (more) (sing-a-long)

Darwin Nightclub Closed - Proving Man Has Not Evolved

Australia - The Northern Territory's biggest nightclub will be closed for two weeks later this month over what the Licensing Commission has described as "despicable behaviour".

The commission found Darwin's Discovery Nightclub had a security camera in an impromptu dressing room which women used to get changed for wet T-shirt contests.

It says the club breached rules by not placing a sign near the room warning women that they could be filmed.

The commission also found that in January, 40 shots were handed out to 10 women participating in the wet T-shirt competition. (more)
Unevolved women somewhere else on the planet.

Friday, August 5, 2011

ACLU Seeks to Uncover Government Spying on American Cell Phones

In a massive coordinated information-seeking campaign, 34 ACLU affiliates are filing over 375 requests in 31 states across the country with local law enforcement agencies large and small that seek to uncover when, why and how they are using cell phone location data to track Americans

"The public has a right to know how and under what circumstances their location information is being accessed by the government – and that is exactly what we hope our information requests will uncover." (more)

"Sometimes I sits and thinks, and sometimes I just sits."

Former Beatle Paul McCartney said after returning from his summer tour he will get in touch with police over his ex-wife’s claim that the couple had been spied on by a British newspaper, according to media reports. 

"I don't think it's great. I do think it is a horrendous violation of privacy, and I do think it's been going on a long time, and I do think more people than we know knew about it. But I think I should just listen and hear what the facts are before I comment," he said.

McCartney ex-wife, Heather Mills, made an allegation during an interview with the BBC that she had been spied on. The allegation implicates the Trinity Mirror PLC group of newspapers and Pier Morgan. She said she "looks forward to receiving Piers Morgan's answer as to how he knew the content of her private voicemail messages." (more) (sing-a-long)

...whereupon his mom spanked his calf.

Shaquille O'Neal has been accused of tracking his wife's car in a new lawsuit. (No, not the one he is wearing.)

The world-famous basketball player is accused of becoming so concerned that his wife Shaunie was meeting up with his mistress Vanessa Lopez that he began 'spying on her'. 

...lawsuit alleges that Shaquille O'Neal planted a tracking device on then-wife Shaunie's car...'On September 25, 2009 O'Neal purchased an Ultimate Bluetooth Mobile Phone Spy, and an Ultimate People Finder Software system...O'Neal had his wife's car wired and hired "Guidepoint," a company to place a GPS tracking system on her car to track her movements and her whereabouts...

The lawsuit continues: 'If the affair came to light, O'Neal knew his mother would be furious. (more)

Thursday, August 4, 2011

Hunk, a hunk of burning bucks... for Hackers

As the annual Black Hat hacker conference kicks off here, Microsoft is turning to the hacker community to help mitigate the Windows platform.

The world’s largest software vendor today announced Blue Hat Prize, an academic challenge aimed at generating new ideas for defensive approaches to support computer security. This year, Microsoft is offering $250,000 in cash and prizes to researchers who design a novel one-time mitigation for memory safety vulnerabilities. (more) (sing-a-long)

Hunk, a hunk of burning love... for Hackers

The National Security Agency has a challenge for hackers who think they're hot stuff: prove it by working on the "hardest problems on Earth."

Computer hacker skills are in great demand in the U.S. government to fight the cyber wars that pose a growing national security threat -- and they are in short supply.

For that very reason an alphabet soup of federal agencies

-- DOD, DHS, NASA, NSA -- are descending on Las Vegas this week for Defcon, an annual hacker convention where the $150 entrance fee is cash only -- no registration, no credit cards, no names taken. Attendance is expected to top 10,000. (more) (sing-a-long)

Quote of the Day = The Number One Ring Tone in Egypt

"I deny all these accusations completely."
HOSNI MUBARAK, the former president of Egypt, in court on charges of corruption and complicity in the killing of protesters. (more)

Tuesday, August 2, 2011

Wireless Cell Phone Recorder ...doubles as wiretap

The device puts the end user in complete control over when, where, and how calls are recorded. Recording telephone conversations has never been easier or more efficient.

This digital voice recorder comes packed with every feature imaginable. The user simply wirelessly pairs their existing mobile phone via Bluetooth and the Cell Corder handset is used in place of the mobile phone.

With 150 hours of standby time and 8 hours of talk time the Cell Corder handset can be used within 10 meters (30 feet) of the user’s mobile phone while recording every detail from both sides of the conversation to the Caller ID information along with time, date, and call duration. And with a huge recording capacity of up to 340 hours, the unit memory will take quite some time to fill up. (more) (sing-a-long)

Handy, but imagine this in an office setting where the boss (or any employee of interest) uses a mobile phone for confidential calls. If someone has a few seconds to pair this up with their phone. Instant wiretap.

Tips:
• Always password protect your phone.
• Never let it out of your possession.
• Check your Bluetooth settings periodically. Know what you are connected to.
• If the IT department supplies you with a new company phone, reinstall the software yourself before using it.

Fly Spy Sly - Hacks WiFi and Eavesdrops Cell Phones - Cry or Sigh?

How do one ex-Air Force official and one former airplane hobby shop owner, both of whom happen to have decades of experience as network security contractors for the military, spend their weekends? Building a flying, unmanned, automated password-cracking, Wi-Fi-sniffing, cell-phone eavesdropping spy drone, of course.

At the Black Hat and Defcon security conferences in Las Vegas next week, Mike Tassey and Richard Perkins plan to show the crowd of hackers a year’s worth of progress on their Wireless Aerial Surveillace Platform, or WASP, the second year Tassey and Perkins have displayed the 14-pound, six-foot long, six-foot wingspan unmanned aerial vehicle. The WASP, built from a retired Army target drone converted from a gasoline engine to electric batteries, is equipped with an HD camera, a cigarette-pack sized on-board Linux computer packed with network-hacking tools including the BackTrack testing toolset and a custom-built 340 million word dictionary for brute-force guessing of passwords, and eleven antennae.

“This is like Black Hat’s greatest hits,” Tassey says. “And it flies.”

On top of cracking wifi networks, the upgraded WASP now also performs a new trick: impersonating the GSM cell phone towers used by AT&T and T-Mobile to trick phones into connecting to the plane’s antenna rather than their carrier, allowing the drone to record conversations and text messages on a32 gigabytes of storage. A 4G T-mobile card routes the communications through voice-over-Internet or traditional phone connections to avoid dropping the call. “Ideally, the target won’t even know he’s being spied on,” says Tassey. (more) (specs) (sing-a-long)

Sunday, July 31, 2011

SpyCam Story #616 - Cam or Gun? Duh, both!

NC - A Knightdale man faces charges that he put a camera in a woman's home to spy on her, according to arrest warrants.

The warrants state that Decarlos Lajuan Upchurch, 34, also broke into the woman's home early Saturday and pointed a black handgun at her. (more)

Friday, July 29, 2011

Scared of SCADA? You will be now...

In news that will probably leave you tutting and muttering “I knew this would happen,” two hackers have found a way to unlock cars that use remote control and telemetry systems like BMW Assist, GM OnStar, Ford Sync, and Hyundai Blue Link. These systems communicate with the automaker’s remote servers via standard standard mobile networks like GSM and CDMA — and with a clever bit of reverse engineering, the hackers were able to pose as these servers and communicate directly with a car’s on-board computer via “war texting” — a riff on “war driving,” the act of finding open wireless networks. (more)

The real scary part...
It’s not just cars that use telephony as a control network: there are 3G security cameras, traffic control systems, home automation systems, and — most worryingly — SCADA systems. SCADA is an acronym that covers almost any industrial control system, from manufacturing to power generation, to water treatment and the management of oil and gas pipelines. To quote Don Bailey, one of the hackers: “What I got in two hours with the car alarm is pretty horrifying when you consider other devices like this, such as SCADA systems and traffic-control cameras. How quick and easy it is to re-engineer them is pretty scary.”

SpyCam Story #615 - An American Bugging

FL - Two female Bulgarian students visiting the United States for the summer found hidden cameras hidden in their Florida apartment this week and fear they may have been videotaped throughout their three-month stay.

Ratitsa Dzhambazova, 23, and Vanya Amokovareva, 22, discovered at least four cameras stashed throughout the apartment they were sub-leasing for the summer in both bedrooms, the bathroom and the living room area, according to police.

"This is unbelievable, but one night I had a dream that someone watch me when I was naked," said Dzhambazova.

The women's worst nightmare came true when a male roommate pulled one of the smoke detector-like devices off the wall that discovered a camera hidden inside. They later discovered more cameras stationed around the apartment.

Four other roommates moved out of the apartment after the cameras were found, according to Dzhambazova, a journalism student. (more)

Not quite Theodore Dreiser, but a sad tale nonetheless. Reminds me of another multiple spycam incident in Florida.

News of the World - Phone Fiasco - Yet Another Victim

UK - The mother of a murdered child who became the face of a News of the World campaign to change British sex-offender laws says she was on the list of a private investigator who hacked phones for the tabloid— a development that is likely to generate more scrutiny for Rebekah Brooks, the former News Corp. executive who edited the paper at the time.

The mother of a murdered child who became the face of a News of the World campaign to change British sex-offender laws said she may have had her voice mails hacked. Paul Sonne also reports that James Murdoch will remain Chairman of BSkyB.

Sara Payne, in a prepared statement, said Thursday that police had found her details on a list seized from Glenn Mulcaire, the private investigator who worked for the now-closed News of the World and intercepted mobile-phone voice mails. Ms. Payne is the mother of Sarah Payne, an eight-year-old British girl who was abducted and murdered in July 2000 by a man who had a previous conviction for abduction and sexual assault against a child. (more)

Thursday, July 28, 2011

FutureWatch - The Cone of Silence... without the cone!

The Walls of Silence!
Get Smart
When it comes to the sound-proofing of buildings, most people likely think of using materials that simply absorb the sound waves in a noisy room, so they can't proceed into a neighboring quiet room. 

Get Smarter
Researchers at the California Institute of Technology (Caltech), however, are taking a different approach. They have created something known as an acoustic diode, that only allows sound traveling through it to go in one direction. If incorporated into building materials, such diodes would let sound travel from the quiet room to the noisy one, but would simply block noise transmission in the opposite direction. (more) (much more)

Wednesday, July 27, 2011

Corrections Officer Pleads Guilty to Eavesdropping on Superiors


OH - The second of three corrections officers at the Trumbull County Jail has pleaded guilty to reduced charges in an eavesdropping case in which the jail employees were listening to their superiors.

Robert J. Rihel Jr., 46, of Leavittsburg, pleaded guilty to 13 misdemeanor counts of falsification in a bill of information and will undergo a pre-sentence investigation ordered Thursday by Judge John M. Stuard.

Rihel, who was placed on administrative leave without pay, had been indicted on 23 counts of ''interception of wire, oral or electronic communications - a fourth-degree felony.'' The various counts in the indictment say the eavesdropping occurred from July 7 to Nov. 1, 2010. (more) (sing-a-long)

Watergate: David Gergen - White House Files

Why is this man laughing?
87 pages of selected David Gergen White House files related to Watergate and the resignation of President Richard Nixon. These files were not available to the public until July 21, 2011. David Gergen worked as a presidential adviser for Presidents Richard Nixon, Gerald Ford, Ronald Reagan, and Bill Clinton. This set also includes four documents from the files of William Timmons, Assistant for Legislative Affairs, also released on July 2, 2011. This set contains correspondences to and/or from David Gergen, Richard Nixon, Gerald Ford, Allexander Haig, Pat Buchanan, Ron Ziegler, Ben Stein, Len Garment, Stephen Bull, and Ray Price. (download) (answer)

On Woot Today: 8 IR camera, 500 GB DVR Home Surveillance System - $279.99 - Amazing

or four cameras, only $189.99!

No, I'm not out to sell cameras or help Woot. In fact, buy the time you see this, they will probably be sold out.

It just strikes me that the cost of entry to spying/securing up the 'ol castle, small business or any location for that matter has dropped to $35.00 per recording eyeball. And, if that's not enough it will also transmit photos to your smartphone

It wasn't that long ago that a system like this would cost thousands. Granted, these may not be the highest quality cameras, but really, look at the features.
Warranty: 1 Year Zmodo
Condition: New

Features:
• Surveillance kit includes an 8-channel H.264 real-time standalone DVR, eight indoor/outdoor color IR security cameras, cabling and mounting hardware
• Everything you need to have your surveillance system up and running in your home or business quickly and easily
• The DVR is an 8-channel, fully integrated, real time, and hardware based standalone digital video recorder with 500GB SATA hard drive
• Supports up to 2TB 3.5" SATA hard drive and includes (2) hard drive mounting screws
• A hard drive is not needed when using cameras for surveillance, but is required when using DVR for recording camera images
• The DVR is based on an embedded Linux operating system and includes a remote control for easy setup and operation
• DVR functionality is easily controlled by using either the remote control or the front panel controls on the DVR
• DVR supports network access through Ethernet RJ45 interface
• Supports DVR backup via USB flash drive, removable drive, recorder and network
• The DVR also features the most updated 3G mobile live! Preview via mobile phone
• Use the 15-pin VGA output to connect a computer monitor (not included)
• Playback resolution 704x480
• The cameras included in the kit are weatherproof, day/night, security cameras with 30ft night vision
• Record Mode options include Continuous, Time Schedule, and Motion Detection
• Each camera comes with a 60-foot power and BNC video all-in-one cable
• All eight cameras are powered by one AC adapter using an 8-way power splitter
• Monitor is not included in the package

DVR Features:
• 8 CH H.264 Surveillance DVR
• 500GB Hard Drive Installed
• H.264 Hardware Compression
• Video Input / Output: BNC 8 / BNC 2
• Audio Input / Output: RCA 4 / RCA 2
• Two Type Video Out: TV Monitor BNC Output and PC Monitor VGA Output
• Signal System: NTSC / PAL
• Display: 240 fps
• Record: 240 fps
• Remote Access: Internet Explorer or Netviewer Software
• PTZ via RS485 Port (not with these cameras however)
• Support Remote View via Smart Phone & 3G Mobile with each of those systems below:
      a) iPhone™
      b) Google Android™
      c) Blackberry™ OS V4.7
      d) Windows Mobile™ Pro 5.0 & 6.1
      e) Symbian™ S60 3rd & S60 5th

Camera Features:
• 1/4” Color Image Sensor
• 420 TV Lines, Horizontal
• 3.6mm Lens
• Signal: NTSC
• IR Irradiation Distance: up to 30ft
• Weatherproof
• Video Connector: BNC
• Power Connector: RCA 12V DC
• Mount: Ceiling or Wall

Don't worry about missing the sale. They will even become less expensive in the future. (more)