Thursday, October 20, 2011

Fun Stuff: Release Your Inner Muse, with Animoog

Alert: This app is available at 99 cents for about 25 more days. Then it goes to $29.99... and it's still a bargain.
This week work took me from New York to San Diego and back; about 10 hours on a plane. Animoog kept me captivated for most of my time in the air. The depth of musical creativity that I pulled from this was astounding. Not musically inclined? No problem, neither am I. I barely know a quarter note from a quarterhorse, yet after the first ten minutes I was making music. Beautiful sounds. Hey, the thing even records your songs for you. 

Bonus... The trips seemed like minutes instead of hours.

Have some fun this weekend. Relax. Make music. Regain your soul. You'll be surprised how good you'll feel afterward.

"Animoog is the first professional synthesizer designed for the iPad. Powered by Moog's new Anisotropic Synthesis Engine, Animoog captures the vast sonic vocabulary of Moog synthesizers and applies it to the modern touch surface paradigm, enabling any user to quickly sculpt incredibly fluid and dynamic sounds that live, breathe, and evolve as you play them." (more)

A Survey of Mobile Malware in the Wild

via Michael Kassner, techrepublic.com
A group of Berkeley researchers take a long, hard look at mobile malware. What they found should interest you...

William Francis — fellow TechRepublic writer/Android investigative partner — and I research Android permissions and Android malware. Every step of the way, we have the support and guidance of experts — one being Adrienne Porter Felt.

I just learned that Adrienne and fellow U.C. Berkeley researchers Matthew Finifter, Erika Chin, Steven Hanna, and David Wagner coauthored “A Survey of Mobile Malware in the Wild“. Their point: Mobile malware is a clear and present danger.

I normally avoid the dramatic, but a lot of good people are trying to raise awareness about the increased presence of mobile malware, and I want to help. (more)

Wednesday, October 19, 2011

MIT researchers have developed a new radar technology that gives real-time video of what’s going on behind solid walls from up to 60 feet away.

While existing through-wall systems have delivered images at a snail's pace, the new device offers video at 10.8 frames per second. (more)

Just don't put your phone on your girlfriend's nightstand...

People sit down, turn on their computers, set their mobile phones on their desks and begin to work. What if a hacker could use that phone to track what the person was typing on the keyboard just inches away?

A research team at Georgia Tech has discovered how to do exactly that, using a smartphone accelerometer ­the internal device that detects when and how the phone is tilted ­to sense keyboard vibrations and decipher complete sentences with up to 80 percent accuracy. The procedure is not easy, they say, but is definitely possible with the latest generations of smartphones. 

“We first tried our experiments with an iPhone 3GS, and the results were difficult to read,” said Patrick Traynor, assistant professor in Georgia Tech’s School of Computer Science. “But then we tried an iPhone 4, which has an added gyroscope to clean up the accelerometer noise, and the results were much better. We believe that most smartphones made in the past two years are sophisticated enough to launch this attack.” (more)

Sunday, October 16, 2011

Security Director Tip: Show & Tell with a Smile

Make this button part of your executive information security briefings.
Click to enlarge.
When you get to the part of your spiel about how business espionage surveillance gear is so effective, covert and easily available, take the button off, plug the SD card into your laptop and show them the movies of themselves. They will get the idea. And, you will get funding for eavesdropping detection sweeps (TSCM) of their offices, conference rooms and boardroom more easily. (Of course, abide by your state law if you record video and audio.)

Features

  • Ease of use
  • Clip on style pin
  • Looks just like the iconic smile face pin
  • Record modes include: audio and video, still images, and audio only



Technical Specs

  • Resolution: 720 x 480 @ 29FPS
  • Still image resolution: 2048 x 1536
  • Storage: Micro SD Cards up to 16GB  (eBay)

Security Tip: Verizon will soon begin spying on your web habits, here's how to opt out...

If you're a Verizon wireless customer, your online identity is about to take another privacy hit.  
The company just revealed that its new service agreement will include language that allows the monitoring of your web habits, including websites you visit and even the location data of when and where you use your wireless browser...

Simply head to Verizon's privacy center, sign into your account using your phone number and password, and review the new policy. On this page there are two places where you can specify that your information not be used for marketing or any other purposes. Simply check these boxes and save your changes. This simple step will prevent your wireless carrier from tracking your location and web habits, and while it might not help advertisers present the best deals on items or services that interest you, your online identity will remain as secure as possible. (more)

Hollywood hacker apologises for spying on stars


FL - A computer hacker accused of infiltrating the email accounts of Hollywood stars including Scarlett Johansson has apologized, and says he plans to plead guilty to all charges.

Christopher Chaney, 35, faces up to 121 years in jail after being arrested in Florida on Wednesday. He faces 26 indictments, including accessing and damaging computers, wire tapping and identity theft.

Chaney's arrest, following an 11-month probe into the hacking of more than 50 victims, including actress Mila Kunis and singer Christina Aguilera. (more)

Saturday, October 15, 2011

"Hakim, if caught, you ditch the bug, eat the notes. Got it?"

The Lebanese Army Intelligence arrested a man after doctors at a Beirut hospital found a spying device planted in his belly, As Safir daily reported on Wednesday.

As Safir said that H.M. was admitted to hospital after falling ill. When the doctors ran a check-up on him, they found the electric device.

After inspecting the device, the Army discovered that it is a highly developed spying equipment, the newspaper said. It added that the Army Intelligence is questioning the man in full secrecy. (more)

This Week in World Spy News

Cuba - Rene Gonzalez, freed from a US prison last week after serving 13 years on spy charges, pledged to "keep fighting" for the release of his jailed comrades. (more)

An Iranian Furgetaboutit
Iran - The alleged Iranian plot to assassinate a Saudi ambassador to the United States may have revealed the biggest secret of all -- intelligence agencies mess up and do not always live up to the James Bond ideal. (more)

USA - A detention hearing for a Virginia man accused of spying on protesters in the U.S. for Syria has been postponed until next week. (more)

Germany - Germany's Bundeswehr introduced the latest addition too the fleet of its Luftwaffe air force: the "Euro Hawk," a massive reconnaissance plane that can zero in on targets from altitudes of up to 20 kilometers (12.4 miles). The unmanned drone is the product of a joint venture between the American defense contractor Northrop Grumman and the European aerospace company EADS. (more)

USA - According to a new Harris Interactive survey conducted with over 2,300 people, 50 percent of American adults have no problem whipping out the smartphone to take secret videos of unsuspecting people. While this doesn’t mean that all respondents have come across an opportunity to spy on someone, they did list several scenarios that would cause them to hit the record button. The most popular response at 23 percent was recording people in embarrassing outfits, perhaps to upload a silly compilation on YouTube. Fifteen percent of mean-spirited survey takers would use the video function to record someone tripping and falling. (more)

USA - The NanoEye program is a research and development effort to support future theater operations. The Technical Center is developing NanoEye as a low cost, maneuvering, electro-optical, microsatellite-class imagery satellite that will be tasked directly by the tactical ground component Warfighter, who will then receive the desired images minutes later. The on-board propulsion system can take the satellite to lower altitudes finer ground resolution imagery necessary to support the mission. (more)

USA - A retired Springfield police officer is accused of recording video from hidden cameras in the bathroom and bedroom of a teenage girl. Jack Van Matre, 54, is charged with first-degree invasion of privacy, for which he could get a prison sentence up to four years if he’s convicted.  (more)

Give 'em a liter and take a hose'n...

Germany - A group that calls itself the Chaos Computer Club prompted a public outcry here recently when it discovered that German state investigators were using spying software capable of turning a computer’s webcam and microphone into a sophisticated surveillance device.

The club, a German hacking organization, announced last Saturday it had analyzed the hard drives of people who had been investigated and discovered that they were infected with a Trojan horse program that gave the police the ability to log keystrokes, capture screenshots and activate cameras and microphones. The software exceeded the powers prescribed to the police by Germany’s Federal Constitutional Court. The public condemnation was swift and strong, renewing a national debate into how far the government can intrude into digital privacy. (more)

Tuesday, October 11, 2011

Why Do Business Spies Spy?

In this week's issue of Chemical and Engineering News, Marc Reisch authors a rather interesting look at the multitude of US-based multinational employees who have taken company trade secrets and intellectual property and gone east with them. After talking about Michael David Mitchell, a DuPont employee who gave his company's IP to a South Korean competitor:
Nobody has a clear fix on just how often employees steal vital confidential information from their employers. What is clear is that over the past five years six former chemical company employees have admitted to or been convicted of stealing trade secrets from their employers. In five of the cases, the employee involved was of Asian descent. And in all of the cases, the intended recipient of the proprietary information was an Asian company or university.
The reasons for the IP (Intellectual Property) theft aren’t clear either. “Those who engage in a major scam are likely to have complex motivations,” says Chris MacDonald, author of the Business Ethics Blog and a visiting scholar at the Clarkson Centre for Business Ethics & Board Effectiveness at the University of Toronto. “It’s hard to boil it down to a single factor.”
MacDonald points out that “when people do the wrong thing, it’s generally not because they lack the relevant values.” Instead, wrongdoers find ways to rationalize their behavior. For instance, employees who steal IP may believe they serve a higher purpose in committing the act, such as helping fellow countrymen or bringing the benefits of technology advances to underprivileged people.
Although the motives of those who steal corporate secrets may be complex, monetary gain was involved in most of the chemical industry cases, according to a review of court documents by C&EN. After Mitchell stopped working for DuPont in 2006, he began to work as a paid consultant for Kolon and e-mailed proprietary DuPont documents to Kolon employees. Court documents ascribe the crimes of former Dow Chemical researcher Kexue Huang mostly to greed but also to feelings of patriotism and paternalism. (more)
Why do people betray their country? MICE, of course: Money, Ideology, Compromise, Ego.

SpyCam Story #625 - Angry Bird Brains

The California Public Utilities Commission has ordered Muni to install video cameras in the cabs of Muni metro trains to surveil operators and discourage cell phone use while operating trains. We all know that many of the drivers just like to kick it in there, up in the front of the trains, while the trains are on auto-pilot in tunnels and being controlled by computer. But now they must stop playing Angry Birds and remain ever vigilant while on the job, or else face possible disciplinary action. (more)

Business Espionage: Hooters v. Twin Peeks - Battle of the...

(stop snickering)
The AP is reporting the Hooters of America restaurant chain filed a federal lawsuit in Atlanta this week claiming that a former executive swiped mounds of documents to help an upstart competitor that plans to expand the Twin Peaks franchise.

The lawsuit filed in U.S. District Court in Atlanta on Wednesday said former Hooters vice president Joseph Hummel downloaded reams of “sensitive and highly confidential business information” to help La Cima Restaurants, an Atlanta-based firm that plans to help build 35 Twin Peaks stores across the Southeast.

Both chains are known for scantily clad women serving casual food... “The casual dining industry operates on extremely thin profit margins,” it said. “As a result, every operational advantage … is a jealously guarded business secret.”

...Even after his last day, Hummel was still able to download documents from company servers and transmit them through his personal email account because the company forgot to block his access, it said.

All told, the lawsuit said, Hummel took “well over 500 pages of highly sensitive business information and trade secrets” from Hooters. (more)

Is that runny nose a cold, or just a new message coming in?

via our West Coast ghost... 
Espionage just got a little more sophisticated and scientific. Invisible ink? Decoder rings? Lemon juice? Puh-lease -- that's mere child's play compared to what double agents scientists at Tufts University just created.

Now secret messages can be hidden in genetically engineered bacteria, thanks to a new method called steganography by printed arrays of microbes, or SPAM. Developed by chemistry professor David Walt and his cloak-and-dagger team of researchers, this new method uses an assortment of E. coli strains modified with fluorescent proteins that glow in seven colors.

Multiply that number by the two colors each message character is encoded with, and spies like us have more than 49 possible code combinations. That's enough for the alphabet, plus digits 0 to 9, with room left over for a few extra symbols...

It is also possible to develop bacteria that lose their fluorescent properties over time, creating a message that self-destructs in the style of Mission Impossible. (more)

Sunday, October 9, 2011

Business Espionage: Bus Staff Bus'ted

Australia - Two senior staff members admitted downloading sensitive company information from Torrens Transit before taking management roles at new bus operator Transfield, their former employer claims.

The two men were accused of downloading confidential documents including suppliers' names, contact details, rosters and costings, resulting in the men being banned from Torrens Transit sites for life.

There have been claims that the life bans on the men exacerbated the chaos that ensued for passengers after this week's handover of services to Transfield. (more)

SpyCam Story #624 - A Bad Aim

CO - A jury on Thursday convicted a Durango man of felony stalking for secretly videotaping his housesitter and her boyfriend.

Mark “Steve” Brown, 57, showed no emotion as the guilty verdicts were announced. Wearing a suit and tie, he dabbed his eyes with a tissue shortly after the courtroom emptied. He remains free on $5,000 bail.

Brown, also known by his nickname Downtown Steve Brown, was found guilty on two counts of felony stalking, two counts of unlawful sexual conduct and two counts of invasion of privacy...

Brown set up covert cameras to record his housesitter while he worked as a civilian military contractor in South Korea... The cameras, which resembled motion detectors, recorded the housesitter and her boyfriend in various states of undress, including having sexual intercourse... Brown argued the cameras were for security...

Deputy District Attorney Justin Fay said Brown knowingly videotaped his housesitter for personal gratification without her consent. He asked jurors to consider the camera angles, especially the one in the bedroom that was pointed directly at the bed. (more)

Man Admitted Installing Spying Program

PA - A Pottstown man accused of illegally intercepting his father’s emails prior to his 2008 murder told investigators he had installed a program on two family computers that relayed keystrokes and other information on a daily basis, according to testimony given Thursday.

Pennsylvania State Police Trooper Robert Levan said Parth Ingle, 25, had told him in 2008 that he had installed a keystroke-logging program called eBlaster on the family computer in 2004 and on a subsequent family computer sometime in 2007.

According to Levan, Parth Ingle said his mother, Bhavnaben Ingle, told him in 2003 or 2004 that her husband had been unfaithful, but did not say his mother had directed him to install the software.

Parth and his sister, Avnee Ingle, 28, also of Pottstown, are accused of intercepting 15 emails between their father and women with whom he was believed to be having affairs.

No one has ever been charged with killing Arunkumar Ingle, whose beating and stabbing death at his Middletown home in January 2008 remains unsolved. (more)

Saturday, October 8, 2011

Russia Accuses China of Spying (we're shocked)

Russia’s spy service has announced that it had arrested a Chinese citizen for allegedly attempting to steal secrets about the country’s missile system.  

The Russian statement came after a top American lawmaker accused China of exercising "an intolerable level" of espionage against the US, ABC News reports.

The Federal Security Service (FSB) said a Chinese citizen, Tong Shenyun, who pretended to be an official delegations’ translator, was working under the Chinese Government to buy "technical and repair documentation” about Russia''s S-300 missile system. 

China has so far not given response to the report, but officials have repeatedly condemned the hacking accusations against their country as "groundless."  (more)

Thus Clinching the Less Exciting than Watching Grass Grow Prize

Click to enlarge
Research scientists focused on the impact of climate change on the Himalaya have installed a new webcam to keep an eye on Mt. Everest. 

The high-definition camera is part of a larger initiative called SHARE, or "Stations at High Altitude for Research on the Environment," which hopes to track the retreating glaciers on the world's tallest peak – something that is already having a profound effect on the region. (more) (spycam)

EU restricts export of eavesdropping technology

The European Parliament has revised EU rules on the export of so-called dual-use technologies with an aim of restricting those that can be used to violate human rights.

Until now the export of products that had both civilian and military applications was not subjected to any EU authorization system, leaving the decision on the export of potentially dangerous technologies up to the member states.

The legislative resolution by Jrg Leichtfried, Austrian member of parliament for the Socialists and Democrats (S&D) party, prohibits a general EU approval for the export of telecommunications technologies that can be used to violate human rights, democratic principles or freedom of speech. The revision was made for "interception technologies and digital data transfer devices for monitoring mobile phones and text messages and targeted surveillance of internet use," the European Parliament (EP) said in a press release. (more)

Friday, October 7, 2011

5 Google Privacy Settings You Should Check

In our recent story on the privacy risks of using technology, we called out some of Google's products as potential privacy leaks. But Google also has some excellent tools you might not be familiar with that help preserve your privacy. Here are five tools you should be using... (more)

Thursday, October 6, 2011

Too Much Hacking - Based on Too Few Discoveries

The chairman of the House intelligence committee on Tuesday launched a broadside against the Chinese government and its efforts to steal commercial data and other intellectual property online, saying that Beijing's cyber-espionage campaign has “reached an intolerable level” and that the United States and its allies have an “obligation to confront Beijing and demand that they put a stop to this piracy.” Rep. Mike Rogers (R-Mich.) noted that it might seem odd that a lawmaker charged with overseeing the U.S. intelligence community should lament spying by another government. But he said that China's espionage activities now extend beyond the U.S. government and military to include scores of private American companies. (more

Unfortunately, it's never this obvious.
Out of the last 50 forensic investigations that information security company Mandiant has conducted, 48 of the businesses involved didn't know they'd been breached until informed by law enforcement agencies, Mandiant CEO Kevin Mandia told the House Intelligence Committee on Tuesday. (more)

Wednesday, October 5, 2011

We'll miss you Steve

Steve Jobs, the visionary in the black turtleneck who co-founded Apple in a Silicon Valley garage, built it into the world's leading tech company and led a mobile-computing revolution with wildly popular devices such as the iPhone, died Wednesday. He was 56. (more)

"Steve Jobs has been called the Edison of our time." Derek Thompson, Senior Editor - The Atlantic (August 25, 2011)

Autumn in New York city, when the spies bloom...

Even before President Mahmoud Ahmadinejad finished his incendiary rant (last year), U.S. diplomats marched out of the cavernous U.N. hall in protest and were ready with a written statement condemning his comments.

It was as if the U.S. knew exactly what Ahmadinejad intended to say.

The walkout hinted at one of the well-known but seldom spoken truths about the United Nations: The international organization, which was founded in the name of peace and security, is also a hotbed of spying and clandestine operations, where someone might very well be listening to your conversations and monitoring your emails — or perhaps reading your speeches in advance.

The start of the General Assembly each year is the Super Bowl of the U.N. spy games. (more)

Confessions of a domestic spy victim...

"Throughout my 9 year marriage my husband has spied on me using various techniques i.e. putting spyware on my iphone, hiding audio recording devices in my car, putting software on my computers to find out my passwords so that he could read my email. I need to say that I have never cheated on him, never. Every time I find out that he's spied on me we get in a huge fight which results in him promising that he'll never violate my privacy again. But what he does each time is only tell me part of the truth i.e. he says he figured out my iphone password which let him see my texts but in actuality he jailbroke my phone and purchased a spyware package to be able to track my gps, read all my texts, etc. I recently found out, yet again, about more lies and spying. He promises, yet again, to never do this again. What should/can I do? I love him and can definitely understand some of his insecurities (we both suffer from insecurity-I just don't get into his stuff) but I can't handle being lied to and violated. Plus-this type of behavior makes me think that HE'S cheating...you know (and I did also just find out that he has been secretly looking at internet porn and paying for it)? Any advice would be greatly appreciated. I posted this thread here because I DO think that he has a type of "spying addiction". Thanks." (more)

It is easy to believe that spying is an exciting and glamorous business. It is not. For every spy there is a victim, be it a business that loses money and marketplace, or a real person who is crushed by having their privacy and trust abused.

Playground Wiretapping Showdown - No Contest

PA - A Bucks County man who was facing wiretapping charges has made a plea. Nick Scott of Richland Township has pleaded no contest to intercepting communication, and was sentenced to a year of probation. He also can't have any contact with Joe Murgia, the man he was accused of recording a conversation with. Murgia is the Quakertown Public Works Manager. Scott complained to him about conditions at Panther Playground. (more)

Security Director Briefing: Inspecting Aircraft to Detect Electronic Eavesdropping Devices

More and more of our clients are asking me to inspect their corporate aircraft for eavesdropping devices. Trips to closed countries top the list of concerns for many of them.

There has also been a rise in general questions coming from other organizations. They are just beginning to realize the seriousness of this privacy vulnerability.

Their questions range from:
• "How is an inspection performed?"
• "Is scheduling and doing an inspection a difficult process?"
• "I am preparing a presentation for management and need a few more specific reasons to inspect. What do you suggest?"
to
• "We sometimes park in a semi-public hanger [or an untrusted foreign airport]. Do you have any suggestions?"

Sometimes I am out traveling and unavailable to answer questions. This prompted me to create a general briefing sheet for security directors who call me. It provides some instant answers my staff can send via email. 

If you have corporate jets or helicopters to protect, please feel free to help yourself to a copy of my briefing. No sign-in required. Just download the pdf file. When you decide to conduct your inspections, please give me a call (908-832-7900). ~Kevin


Monday, October 3, 2011

Kenya Intelligence Service Wants What Everyone Else Has

Here's a quaint notion... 

Tourist testing indigenous eavesdropping device.
Kenya - Imagine living in a country where Government operatives eavesdrop into your telephone calls at will. (Hard to imagine a country where they can't.) They listen to your intimate chat with a friend and snoop into a briefing with your boss.

Intelligence officers raid your home without a warrant, perform searches, cart away items and plant eavesdropping devices.

Scary as it may seem, this could become reality if the National Security Intelligence Service (NSIS) has its way. (more)

Movie Review - The Man Nobody Knew

William Colby was, frankly, a nerd—but a nerd with a mission. He was a lifelong spy, or, perhaps more properly, a spymaster, who rose through the ranks of the CIA to become its director and something of a martyr to the cause of not letting the right hand know what the left hand was doing. 

His son, Carl Colby, has now made a fascinating documentary that seeks to unravel the mysteries of, as his title would have it, “The Man Nobody Knew.” Good luck with that. You leave the film knowing next to nothing about the man, but with the suspicion that he was a psychopath of secrecy, a man devoted to his job, of course, but essentially friendless and utterly detached from normal human feelings. (more) (trailer)

Rowan Atkinson back as spoof spy Johnny English

Rowan Atkinson is back as bumbling spy Johnny English in the sequel to his 2003 hit... In Johnny English Reborn, "the improbable secret agent" is called back into action when his superiors learn the Chinese premier's life is in danger... Early reviews have been mixed to poor, according to critic tracker rottentomatoes.com. (more)

Hiker's Lawyer Now Barred from Leaving Iran

The defence lawyer for two Americans released by Iran after more than two years in jail on spying charges has been barred from leaving the country, a judiciary official told the ISNA news agency on Monday.

Masoud Shafie represented Josh Fattal and Shane Bauer who were arrested on the Iraqi border in 2009 where they said they were hiking. Convicted of espionage in August and sentenced to eight years in prison, they were released two weeks ago and went home after Oman paid bail of $1 million. (more)

Security Alert: HTC - Heartbreaking Technical Compromise

In news that will no doubt be of great concern to owners of HTC smartphones, a security team is claiming to have uncovered a "massive security vulnerability" in HTC Android devices that allows any application with Internet access to gain access to private data, including user accounts, email addresses, GPS location, text message data and phone numbers. 

The vulnerability is said to affect HTC smartphones running the latest version of HTC's software, including the EVO 3D, EVO 4G, Thunderbolt, and others. (more)

Sunday, October 2, 2011

Cyber Spying on Estranged Wife

PA - Jay Anthony Ciccarone, 39, was charged Monday night with unlawful use of a computer and related offenses for allegedly installing "Web Watcher," a spyware package, on the victim's computer, said Tredyffrin Township police.

Police said the investigation began a year ago when the woman, who was in the midst of divorce proceedings with Ciccarone, contacted police because he appeared to be monitoring her daily activities.

A forensic examination of the computer revealed the presence of the spying program, which "works by recording all manner of activity on the computer, including keystroke logging, capturing email and internet activity," the criminal complaint said. (more)

This Week in World Spy News

Egypt - A Jordanian telecommunications engineer, who is on trial in Egypt on charges of spying for Israel, pleaded not guilty on Sunday. (more)

Pakistan - A blindfolded man stands on explosives, trembling as he confesses to spying for the CIA in Pakistan. Armed men in black balaclavas slowly back away. Then he is blown up. One of his executioners -- members of an elite militant hit squad -- zooms a camera in on his severed head and body parts for a video later distributed in street markets as a warning. (more)

Taiwan - Allegations of spying against National Police University associate professor Wu Chang-yu are only the tip of the iceberg, members of the Falun Gong movement said on Saturday. Wu, who teaches Chinese political history, was arraigned for questioning on Thursday on charges of allegedly spying for China and passing information to Chinese officials about Chinese dissidents, pro-Tibetan activists and the Falun Gong movement in Taiwan. (more)

UK - New Home Office rules asking academic staff at British universities to keep a tab on students from India and other non-EU countries have sparked off concern that lecturers have been turned into "spies and spooks". (more)

USA - A Greenville, NY man faces two to six years in state prison when sentenced in Orange County Court next month for videotaping neighbors without their knowledge. Angelo DeMaria, 24, pled guilty Friday to 24 counts of felony second-degree unlawful surveillance. He was arrested last April after a neighbor spotted him on the roof of her garage. She called state police, who caught him with a video camera. (more)

USA - U.S. prosecutors are charging a former guard at a U.S. consulate in China with attempting to communicate national defense information to Chinese officials. Bryan Underwood has been indicted for trying to pass on photographs and other sensitive information to representatives of the Chinese government between March and August of this year. The Associated Press reports Justice Department officials say during that period Underwood was a contract guard at a consulate under construction in Guangzhou in southern China. (more)

Hezbollah has detained four of its own members on charges of spying for Israel while a fifth has fled, the London-based daily Asharq Alawsat reported last weekend. (more)

Lebanon has arrested three people suspected of spying for Israel and trespassing, the London-based al-Hayat newspaper reported Tuesday. (more)

Saturday, October 1, 2011

Police Lose GPS in Ohio

Although the US Supreme Court is expected to settle the issue of GPS tracking of motorists soon, a three-judge panel of the Ohio Court of Appeals, Fifth District ruled 2-1 earlier this month against the warrantless use of the technology. 

The majority's decision was likely designed to influence the deliberations of the higher courts. On November 8, the US Supreme Court will hear oral arguments in the GPS case US v. Jones. The Ohio Supreme Court is also considering Ohio v. Johnson in which the Twelfth District appellate court upheld warrantless spying.

The present case began on January 14, 2010, when Franklin County Sheriff's Department Corporal Richard Minerd's investigation of a burglary brought him to a white Honda Civic in an apartment complex. Minerd slapped a battery-powered GPS tracking unit under the bumper that allowed real-time tracking of the vehicle's location, speed and direction of travel. Minerd did not seek a search warrant before acting.

Nine days later, the Civic appeared at the location of a robbery, and Minerd was able to follow the car back to the home of David L. White, who was caught with the stolen property. The Fifth District considered the question of whether it is ever acceptable for government agents to attach such devices to privately owned vehicles without a warrant. (more)


Note: This case affects law enforcement use, not use by private citizens.

Friday, September 30, 2011

When Brain Sucking Smartphone Spiders Meet Badges

You may have heard about the Cellebrite cell phone extraction device (UFED) in the news lately. It gives law enforcement officials the ability to access all the information on your cell phone within a few short minutes.

When it became known that Michigan State Police had been using the tool to access cell phones during traffic stops, it raised concern with the ACLU... You'd be surprised to see just how much data today's smartphones can store -- and police can access...

What's up for grabs?

"...all of our contacts, call logs, voicemails, text messages (deleted ones too), all our notes, recent map searches, Facebook contacts, all locations (WiFi and Cellular), and current and deleted photos." (more)

Tip: You can give up your phone voluntarily, or hold out for a search warrant.

Insanely Great Battery Volt Jolt

Researchers from the National University of Singapore's Nanoscience and Nanotechnology Initiative (NUSNNI) have created what they claim is the world's first energy-storage membrane. Not only is the material soft and foldable, but it doesn't incorporate liquid electrolytes that can spill out if it's damaged, it's more cost-effective than capacitors or traditional batteries, and it's reportedly capable of storing more energy.

The membrane is made from a polystyrene-based polymer, which is sandwiched between two metal plates. When charged by those plates, it can store the energy at a rate of 0.2 farads per square centimeter - standard capacitors, by contrast, can typically only manage an upper limit of 1 microfarad per square centimeter.

Due in part to the membrane's low fabrication costs, the cost of storing energy in it reportedly works out to 72 cents US per farad. According to the researchers, the cost for standard liquid electrolyte-based batteries is more like US$7 per farad. This in turn translates to an energy cost of 2.5 watt-hours per US dollar for lithium-ion batteries, whereas the membrane comes in at 10-20 watt-hours per dollar. (more) (sing-a-long)

FutureWatch: If this is true, our world is going to take an interesting twist.

Thursday, September 29, 2011

6 Real World Spy Gadgets Straight Out of the Movies

#1. Hidden Guns
It's the most obvious spy gadget of them all: A gun that doesn't look like a gun. But while you've probably seen the odd shotgun cane or rifle umbrella (hopefully before it was too late), the sheer depth and breadth of tiny guns hidden in mundane objects might surprise you...

#2. U.S. Embassy Seal
Presented to the U.S. Ambassador by Soviet schoolchildren, this Great Seal of the United States hung proudly in the man's office in Spaso House from 1946 to 1952. Well, after a good bug scan, of course, which turned up nothing. The ambassador wasn't a fool: He knew the Soviets were desperately trying to bug everything they could get their hands on...

#3. Compass Buttons
If one of your soldiers is captured and placed in a POW camp, you want to make sure he's as well-prepared for escape as possible. After all, breaking out of prison is just the first step...

#4. Martini Olive
Budding mad scientist Hal Lipset specialized in inserting audio devices into seriously inappropriate places...

#5. Poop
In the Vietnam War, it was common for U.S. soldiers to litter the Vietnamese countryside with mounds of fake tiger shit. Why? To demoralize the enemy? To attract other tigers to their position? Just because it was funny? Nope: Because they had...

#6. Umbrella Dart Gun
Georgi Markov was a pair of freedom-loving bohemian testicles resting gently on the forehead of communist Bulgaria. His writing was winning all sorts of awards and stirring anti-communist movements all across Europe. Clearly, they had to get those balls off their face, and stat. So... 

You would have to be mad not to love how of cracked.com wrote this up! Thanks for including us, Eric! (more)

Beware the Cell Sucking Spiders

...a gray hat app developer has released into the wild five tools purportedly for "study purposes" that can clean out all the data on an Android smartphone in less than a minute.

Based on information from virus researchers at BitDefender, here's how the tools work.

When any of the apps is loaded on a victim's phone, they can be activated remotely by a cyber thief. Once activated, it sends a five digit pass code to the phone's intruder and secretly uploads the device's contacts, messages, recent calls, and browser history into the developer's space in the Android Cloud. After copying the data from the phone, the apps uninstall themselves so a target won't know they were even on their mobile...

This latest attack on Android phones is just one of many this year. In fact, the phones are seen as a ripe target for mobile miscreants. According to a report released by a cybersecurity software maker in August, attacks on Android by malware writers jumped 76 percent over the previous three months, making it the most assaulted mobile operating system on the planet.

Some of that malware has been devilishly clever. For example, a bad app called Soundminer listens to conversations on an Android phone and is able to recognize when a credit card is spoken. After identifying such a number, it snips it from the conversation it has been recording and sends it to a Web baddie. (more) (further advice)

Trumped by KickButtTakeNames.com...

A web proxy service has come under fire after a federal indictment revealed that the company cooperated with U.S. authorities in their investigation into the hacking of SonyPictures.com.

HideMyAss.com, a VPN service that encrypts one's traffic to enable users to surf the web anonymously, was ordered by a U.K. judge, at the request of FBI agents, to release log information about an Arizona man (Cody Kretsinger) who was arrested Thursday for his role in the Sony intrusion...

But now, as Kretsinger awaits prosecution, HideMyAss.com faces criticism from privacy advocates and users who believe the service went back on its promise. (more)

Circuit Court Judge David Frankland - Privacy Hero

2009 - Michael Allison brought a digital recorder to the Crawford County Courthouse in Downstate Robinson (Illinois), where he was contesting a citation, because he had been told there would be no official transcript of the proceedings. He was immediately confronted by Circuit Judge Kimbara Harrell, who accused him of violating her privacy and charged him with eavesdropping, a felony punishable by up to 15 years in prison.

Because Allison had recorded conversations about his legal situation with police and other local officials, he soon faced four more eavesdropping charges, raising his possible sentence to 75 years. The case against Allison vividly shows how the Illinois Eavesdropping Act, the target of a constitutional challenge that was recently heard by a federal appeals court, undermines transparency, civil liberties and legal equality. (more)


2011 - Michael Allison, an Illinois man who faced a potential sentence of 75 years in prison for recording police officers and attempting to tape his own trial, caught a break last week when a state judge declared the charges unconstitutional. "A statute intended to prevent unwarranted intrusions into a citizen’s privacy cannot be used as a shield for public officials who cannot assert a comparable right of privacy in their public duties," wrote Circuit Court Judge David Frankland. "Such action impedes the free flow of information concerning public officials and violates the First Amendment right to gather such information." (more)

How Long are Your Cell Phone Records Kept?

Find out here.

The nation’s major mobile-phone providers are keeping a treasure trove of sensitive data on their customers, according to newly-released Justice Department internal memo that for the first time reveals the data retention policies of America’s largest telecoms.

The biggest difference in retention surrounds so-called cell-site data. That is information detailing a phone’s movement history via its connections to mobile phone towers while its traveling.

Verizon keeps that data on a one-year rolling basis; T-Mobile for “a year or more;” Sprint up to two years, and AT&T indefinitely, from July 2008.
(more)