A lawyer for the International Criminal Court has been detained in Libya after she was found to be carrying suspicious letters for Muammar Gaddafi’s captured son Saif al-Islam, a Libyan lawyer said on Saturday...
“During a visit (to Saif al-Islam), the lawyer tried to deliver documents to him, letters that represent a danger to the security of Libya,” said Ahmed al-Jehani, the Libyan lawyer in charge of the Saif al-Islam case on behalf of Libya, and who liaises between the government and the Hague-based ICC...
Jehani said the ICC team...had been searched before the meeting.
Without giving details, he said a pen with a camera as well as a watch with a recorder were found during the search. (more)
Sunday, June 10, 2012
The Tech Spy Agencies are Buying
Amir Abolfathi, CEO of Sonitus Medical of San Mateo, revealed that the company is developing a tiny, wireless, two-way communications device for "the U.S. intelligence community." Noting that it covertly sits in a person's mouth, he said one of its chief attributes is that "nobody knows you are wearing anything." (more)
Overlooking the PR effect that male mobs molesting women in Tahrir Square has on tourism...
Egyptian state TV stopped airing controversial anti-spying ads Friday
night.
The ads have been widely condemned as being xenophobic and
painting all foreigners in the country as spies.
Many have voiced fears that the ads would negatively affect tourism. (more)
Friday, June 8, 2012
“Ag-gag” Laws and The Jungle
“Ag-gag” laws threaten journalists’ reliance on whistleblowers
A recent spate of nationwide legislative measures designed to curb
undercover recording at farms and other agricultural facilities may
potentially restrict reporters’ ability to gather and publish important
information about the food industry.
Some of the measures would directly prohibit journalists from
photographing or recording farm animals and other items and activities
involved in food production in a manner not likely to pass
constitutional scrutiny.
Others, however, seek to cut off the dissemination of this
information at its source, by criminalizing the actions of
whistleblowers. (more)
The Jungle is a 1906 novel written by American journalist, socialist, politician, and muckracker Upton Sinclair (1878-1968). The novel was first published in serial form in 1905... It was based on undercover work done in 1904: Sinclair spent seven weeks gathering information while working incognito in the meatpacking plants of the Chicago stockyards at the behest of the magazine's publishers.
2006 - The Police RIP / 2012 - Listening to The Police RIP
Police departments across the country have been steadily switching to encrypted radio communications for more than a decade.
The trend has accelerated recently as cell phone apps like Scanner 911 have made public access to traditional unencrypted police radio communications easier than ever...
No legal right
There is no federal law that requires public access to police radio, and unless a state’s Freedom of Information law builds a strong case for disclosure of all police records, there is little legal action that can be taken. (more) (sing-a-long)
First Portable Police Radio Thomas Dwyer and Dispatcher Marvin Gray http://www.pennsville.org |
No legal right
There is no federal law that requires public access to police radio, and unless a state’s Freedom of Information law builds a strong case for disclosure of all police records, there is little legal action that can be taken. (more) (sing-a-long)
Thursday, June 7, 2012
China - Visiting Officials Leave Gadgets Behind & The Car Bugs
Australia - The Defence Minister, Stephen Smith, took extraordinary precautions against Chinese espionage before arriving in Beijing yesterday, revealing the degree of distrust lingering beneath the surface of his goodwill visit...
The Herald has learnt Mr Smith and his entourage left mobile phones and laptops in Hong Kong before proceeding to mainland China, after such devices were reportedly compromised during previous ministerial visits. His staff, including media advisers, were given fresh phones, with different numbers, for the duration. (more)
(more)
The Herald has learnt Mr Smith and his entourage left mobile phones and laptops in Hong Kong before proceeding to mainland China, after such devices were reportedly compromised during previous ministerial visits. His staff, including media advisers, were given fresh phones, with different numbers, for the duration. (more)
Spybusters Tip #502 - Act like a smart Defense Minister. Go sterile.
(Engage Murray Associates, the information security analysts, for more tips.)
(Engage Murray Associates, the information security analysts, for more tips.)
In related news...
Click to enlarge. |
Cautionary Tales of Laptops and Thumb Drives
Laptop Cautionary Tale
UK - The former Director-General of UK's internal security service MI5 has had her laptop stolen at London's Heathrow airport on Tuesday.
Dame Stella Rimington, who headed the agency from 1992 to 1996, has since then become a well-known spy thriller author. According to the report, he laptop contained research for her next book, but it could have also contained sensitive information such as contact details of her former colleagues.
"Dame Stella seems to have forgotten the tricks of her tradecraft since leaving MI5," commented a source... (more)
"Dame Stella seems to have forgotten the tricks of her tradecraft since leaving MI5," commented a source... (more)
Tip: Password protect your laptop. Encrypt confidential files. Carry only essential information. Install track and remote erase security software.
---
Memory Stick / Thumb Drive Cautionary Tale
The U.S. and Israel were responsible for creating the Stuxnet computer worm that wreaked havoc with Iranian nuclear facilities... And the first salvos in the massive cyberattack were launched via an unassuming piece of technology: a thumb drive... Thumb drives were “critical” in the initial Stuxnet attacks — which began in 2008 — although unspecified “more sophisticated” means were later used... “It turns out there is always an idiot around who doesn’t think much about the thumb drive in their hand,” one of the program’s architects said. (more)
Tip: You know that thumb drive you "found" in the parking lot?
Don't plug it in.
Smash it.
Companies Urged to Security Classify their Information
Australia - Private companies must institute a classification system similar to the one used by spies and the military, assigning confidential, secret or top-secret status to information rather than assuming computer networks can be defended from increasingly sophisticated cyber attacks.
The former head of the Defence Signals Directorate's highly secretive Cyber Security Operations Centre, Tim Scully, has called for a reorganisation of cyber security, saying the present approach focuses too much on protecting networks and not the information in them.
He said the private sector must begin to think like government and create a classification system that reflects the value and sensitivity of the information in its possession.
From there, risk assessments can be performed about how, if at all, the most sensitive information is conveyed across the internet. Under the new national security classification system information is marked protected, confidential, secret or top-secret.
The most sensitive information is then "air-gapped" - or stored on a closed network not accessible via the internet. (more) (see also) (see also)
The former head of the Defence Signals Directorate's highly secretive Cyber Security Operations Centre, Tim Scully, has called for a reorganisation of cyber security, saying the present approach focuses too much on protecting networks and not the information in them.
He said the private sector must begin to think like government and create a classification system that reflects the value and sensitivity of the information in its possession.
From there, risk assessments can be performed about how, if at all, the most sensitive information is conveyed across the internet. Under the new national security classification system information is marked protected, confidential, secret or top-secret.
The most sensitive information is then "air-gapped" - or stored on a closed network not accessible via the internet. (more) (see also) (see also)
Russian Wiretaps Double
Russia - Legal wiretaps have almost doubled in Russia over the past five years due to lack of external control over the secret services, according to official and publicly available statistics unearthed by a leading Russian security analyst.
“This is both a political and a bureaucratic story,” said Andrei Soldatov, editor-in-chief of Agentura.ru, an online secret services think-tank. He added that the services often abuse their powers, including for illegal monitoring of political opposition.
The courts issued 466,152 sanctions for telephone wiretaps and inspection of regular and electronic mail in 2011, according to the website of the Judicial Department at the Russian Supreme Court.
The figure stood at 265,937 in 2007, the department said.
Only 3,554 wiretap requests, or under 1 percent of the total, were rejected in 2011, compared to 4,246 in 2007. (more)
“This is both a political and a bureaucratic story,” said Andrei Soldatov, editor-in-chief of Agentura.ru, an online secret services think-tank. He added that the services often abuse their powers, including for illegal monitoring of political opposition.
The courts issued 466,152 sanctions for telephone wiretaps and inspection of regular and electronic mail in 2011, according to the website of the Judicial Department at the Russian Supreme Court.
The figure stood at 265,937 in 2007, the department said.
Only 3,554 wiretap requests, or under 1 percent of the total, were rejected in 2011, compared to 4,246 in 2007. (more)
Sunday, June 3, 2012
More Than A Feeling - Boston Rocked by SpyCam Death
Boston singer Brad Delp installed a hidden camera in his fiancee’s sister’s bedroom – and killed himself nine days after he was caught.
Evidence given in the court case between Boston mainman Tom Scholz and a newspaper revealed how Delp, who committed suicide in 2007, was ashamed and apologetic after his spy device was found.
Events came to light as part of Scholz’s claim that the Boston Herald defamed him by suggesting he was to blame for his bandmate’s death. (more)
Evidence given in the court case between Boston mainman Tom Scholz and a newspaper revealed how Delp, who committed suicide in 2007, was ashamed and apologetic after his spy device was found.
Events came to light as part of Scholz’s claim that the Boston Herald defamed him by suggesting he was to blame for his bandmate’s death. (more)
Saturday, June 2, 2012
One Day - Two Headlines - A Salute to US Spies
Friday, June 1, 2012
"Be Sociable"
Banners signed by a cult-like Mexican drug gang say that cartel members
launched firebombing attacks on a PepsiCo. subsidiary because they
believe the snack company let law-enforcement agents use its trucks for
surveillance. (more)
Thursday, May 31, 2012
$71 million divorce - Electronic Bugging Allegations
The extraordinarily bitter break up of Silicon Valley
power player Susan Decker, 49, and Michael Dovey, 52, led to the couple
hurling allegations of infidelity, drug use and electronic bugging at each other.
Miss
Decker was accused of extramarital affairs, drug use, and bugging the Laguna
Beach home to spy on him.
Mr Dovey's lawyers also issued subpoenas to Yahoo demanding emails and
records, and the company's head of corporate security was among witnesses
due to give evidence in court over the bugging claims. (more)
Wednesday, May 30, 2012
Security Quote of the Month
"We're going to double down on secrecy..."
Tim Cook, Apple, CEO (more)
Meanwhile...
“Before, criminals used to steal money to become rich, but now they have realized that they can be rich by stealing corporate information.”
These words from a U.S. Treasury Department official send a chilling reminder to industry about the growing threat – and cost – of trade secret misappropriation...
Today, trade secret theft costs multinational corporations billions of dollars each year – and no company is immune. Any company with valuable commercial information, processes or intellectual property is at risk; and global companies from all sectors continue to experience significant economic losses not only from trade secret theft, but also from piracy, counterfeit products and corruption. (more)
What's your policy?
Sunday, May 27, 2012
Could this mean that you will never again hear a cellphone go off at a concert?
French researchers have developed wallpaper that would block cellular and wi-fi signals while letting through AM/FM radio waves and emergency transmissions.
Developed by engineers at the Grenoble Institute of Technology and the Centre Technique du Papier—and making use of a conductive ink containing silver particles (it’s a passive block, not a jamming system)—the wallpaper will be marketed to people concerned about outsiders’ snooping on their private networks as well as those who, for health reasons, simply want to shield themselves from as many electromagnetic waves as possible. Researchers say the cost of the product will be in line with what people pay for mid-priced purely decorative wallpaper.
Windows remain a challenge, but even without covering them (and transparent filters do exist), users will enjoy substantial increases in privacy, the researchers say. (more)
Tip: Need a compact VHF/UHF TV antenna? Check out Mohu Leaf, another invention which incorporates fractals into antenna design. We're not entirely sure why, but fractal antennas work. Trust nature's designs.
Click to enlarge. |
Windows remain a challenge, but even without covering them (and transparent filters do exist), users will enjoy substantial increases in privacy, the researchers say. (more)
The Cold War Has Veterans Too, Remember. A Spy Talks.
IL - Blindfolded, Richard Rogala didn’t know what was going on when the USS Pueblo was captured by the North Koreans in 1968.
The former Niles resident along with Werner Juretzko, of the Northwest suburbs, shared their experiences with an attentive audience May 20 at Niles Public Library.
Rogala was a storekeeper aboard the USS Pueblo and remained a prisoner for 11 months. Juretzko was imprisoned in East Germany for six years.
The Cold War was a state of military and political tension between the United States and the Soviet Union in the decades following World War II. The war never blossomed into full-scale military action, but was marked by espionage, lasting from 1945 to 1991...
Juretzko worked as a G-2 undercover U.S. Army political operative. In 1955, he was captured by the East German secret police, called the Stasi.
Juretzko is the author of “Years Without Hope,” which tells the stories of his espionage work during the Cold War. He showed audience members images of a prison cell and Guillotine that was used to kill Western prisoners. He said everyone left prison either in a horizontal or vertical position.
“I was fortunate I left in a vertical position,” Juretzko said. (more) Thank you, Sirs.
The former Niles resident along with Werner Juretzko, of the Northwest suburbs, shared their experiences with an attentive audience May 20 at Niles Public Library.
Rogala was a storekeeper aboard the USS Pueblo and remained a prisoner for 11 months. Juretzko was imprisoned in East Germany for six years.
The Cold War was a state of military and political tension between the United States and the Soviet Union in the decades following World War II. The war never blossomed into full-scale military action, but was marked by espionage, lasting from 1945 to 1991...
Juretzko worked as a G-2 undercover U.S. Army political operative. In 1955, he was captured by the East German secret police, called the Stasi.
Juretzko is the author of “Years Without Hope,” which tells the stories of his espionage work during the Cold War. He showed audience members images of a prison cell and Guillotine that was used to kill Western prisoners. He said everyone left prison either in a horizontal or vertical position.
“I was fortunate I left in a vertical position,” Juretzko said. (more) Thank you, Sirs.
Saturday, May 26, 2012
Holy Info Leak. Pope's Batman Arrested.
Vatican magistrates
formally charged Pope Benedict's butler with illegal possession of
secret documents on Saturday and said a wider investigation would take
place to see if he had any accomplices who helped him leak them.
Paolo Gabriele is suspected of
leaking highly sensitive documents, some alleging cronyism and
corruption in Vatican contracts, in a scandal which has come to be known
as "Vatileaks"...
Vatican
magistrates formally charged Pope Benedict's butler with illegal
possession of secret documents on Saturday and said a wider
investigation would take place to see if he had any accomplices who
helped him leak them.
Because the Vatican has no jail, Gabriele was
being held in one of the three so-called "secure rooms" in the offices
of the Vatican's tiny police force inside the walled city-state. (more) (sing-a-long)
SpyCam Story #660 - This Week in SpyCam News
SpyCam stories have become commonplace and the techniques used, repetitive. We
continue to keep lose track of the subject for statistical purposes,
but won't bore you with too many details. Only links to the stories will be
supplied unless there is something useful to be learned.
OH - Woman catches spycam'er, takes his phone, calls police, punches and detains him.
Read more here: http://www.thenewstribune.com/2012/05/04/2131140/capital-playhouse-employee-charged.html#storylink=cpy
OH - Woman catches spycam'er, takes his phone, calls police, punches and detains him.
Read more here: http://www.thenewstribune.com/2012/05/04/2131140/capital-playhouse-employee-charged.html#storylink=cpy
Thursday, May 24, 2012
FutureWatch: Canada's CALEA
Canada - As authorities in the United States and United Kingdom push for greater Internet surveillance powers, the Canadian government is locked in its own controversial struggle to wiretap the Web.
Canada’s C-30 surveillance bill is much like the FBI’s recently revealed effort to force Internet communications providers such as Skype and Facebook to provide “back doors” for eavesdropping. In some cases, the Canadian legislation would allow police to obtain user data without a warrant. C-30 had appeared dead following a Supreme Court ruling in April that deemed warrantless wiretaps unconstitutional, plus a storm of opposition from privacy groups. But the government said last week it is still moving forward with the plan.
Now, new documents obtained under Access to Information laws have revealed Canada’s largest telecoms providers held secret meetings with government officials about the wiretapping proposals. The documents show that after forming a behind-closed-doors working group, the companies and government officials discussed the technical reality of introducing new mass eavesdropping capabilities in fascinating detail. (more)
Canada’s C-30 surveillance bill is much like the FBI’s recently revealed effort to force Internet communications providers such as Skype and Facebook to provide “back doors” for eavesdropping. In some cases, the Canadian legislation would allow police to obtain user data without a warrant. C-30 had appeared dead following a Supreme Court ruling in April that deemed warrantless wiretaps unconstitutional, plus a storm of opposition from privacy groups. But the government said last week it is still moving forward with the plan.
Now, new documents obtained under Access to Information laws have revealed Canada’s largest telecoms providers held secret meetings with government officials about the wiretapping proposals. The documents show that after forming a behind-closed-doors working group, the companies and government officials discussed the technical reality of introducing new mass eavesdropping capabilities in fascinating detail. (more)
Bugs found at Russian cultural center in Estonia
Estonia - A wiretapping device has been found in a cultural center for Russian-speaking Estonian citizens in Tallinn. The NGO is run by the mother of the city’s vice mayor, who is suspected of lobbying for Russian interests in the Baltic country.
The wiretap, discovered Tuesday, is the second such device found in the Lira cultural and sports center, after a thorough inspection carried out by center’s security.
The first eavesdropping device, which was clumsily wired into the facility’s alarm system, was found on May 15. Inspectors believe the bugs were installed between September and December 2011. The police opened an investigation but so far no official statements have been made on the issue. (more)
The wiretap, discovered Tuesday, is the second such device found in the Lira cultural and sports center, after a thorough inspection carried out by center’s security.
The first eavesdropping device, which was clumsily wired into the facility’s alarm system, was found on May 15. Inspectors believe the bugs were installed between September and December 2011. The police opened an investigation but so far no official statements have been made on the issue. (more)
Wednesday, May 23, 2012
No Sir'ee. No Siri here. Seri-ously!
If you work for IBM, you can bring your iPhone to work, but forget about using the phone’s voice-activated digital assistant. Siri isn’t welcome on Big Blue’s networks.
The reason? Siri ships everything you say to her to a big data center in Maiden, North Carolina. And the story of what really happens to all of your Siri-launched searches, e-mail messages and inappropriate jokes is a bit of a black box.
IBM CIO Jeanette Horan told MIT’s Technology Review this week that her company has banned Siri outright because, according to the magazine, “The company worries that the spoken queries might be stored somewhere.”
It turns out that Horan is right to worry. In fact, Apple’s iPhone Software License Agreement spells this out: “When you use Siri or Dictation, the things you say will be recorded and sent to Apple in order to convert what you say into text,” Apple says. Siri collects a bunch of other information — names of people from your address book and other unspecified user data, all to help Siri do a better job.
How long does Apple store all of this stuff, and who gets a look at it? Well, the company doesn’t actually say. (ask Siri!) (more)
The reason? Siri ships everything you say to her to a big data center in Maiden, North Carolina. And the story of what really happens to all of your Siri-launched searches, e-mail messages and inappropriate jokes is a bit of a black box.
IBM CIO Jeanette Horan told MIT’s Technology Review this week that her company has banned Siri outright because, according to the magazine, “The company worries that the spoken queries might be stored somewhere.”
It turns out that Horan is right to worry. In fact, Apple’s iPhone Software License Agreement spells this out: “When you use Siri or Dictation, the things you say will be recorded and sent to Apple in order to convert what you say into text,” Apple says. Siri collects a bunch of other information — names of people from your address book and other unspecified user data, all to help Siri do a better job.
How long does Apple store all of this stuff, and who gets a look at it? Well, the company doesn’t actually say. (ask Siri!) (more)
Cell Phone Door Key App?!?!
via Gizmodo.com...
"The UniKey app transmits a Bluetooth signal from the user’s iPhone, Android or BlackBerry smartphone, which is picked up by a paired UniKey deadbolt lock as it is approached by the user.
All the user has to do when they subsequently reach the door is simply touch the outer surface of the lock, at which point the bolt will electronically withdraw. A touch of the lock can likewise be used to engage it when the user is leaving.
While not having to dig out a key and stick it in the lock may be somewhat convenient, what’s more intriguing is the system’s ability to send, revoke, and limit access to virtual “copies” of the key." (more)
While not having to dig out a key and stick it in the lock may be somewhat convenient, what’s more intriguing is the system’s ability to send, revoke, and limit access to virtual “copies” of the key." (more)
Cell Phone Tracking Trick Explained
Stingrays locate a mobile phone even when it's not being used to make a call.
The Federal Bureau of Investigation considers the devices to be so critical that it has a policy of deleting the data gathered in their use, mainly to keep suspects in the dark about their capabilities, an FBI official told The Wall Street Journal in response to inquiries. (more)
The Federal Bureau of Investigation considers the devices to be so critical that it has a policy of deleting the data gathered in their use, mainly to keep suspects in the dark about their capabilities, an FBI official told The Wall Street Journal in response to inquiries. (more)
Out of Bond - Spy Movie Web Site Just Launched
via spymaniac.com...
"Spymaniac.com, the ultimate online guide to all your favorite spy flicks.
What’s fact, what’s fiction? History or fantasy? Which are the best spy films and why? The outrageous duds? Did the James Bond movies have any impact on real life? And would Angelina Jolie’s Evelyn Salt have learned all those stunts at the Farm?
Get answers to these and other questions here. Share your faves and reviews on Spymaniac.com, and discover great films you may never have heard about. Spymaniac is your community for exploring and sharing spy films, which are rated from zero daggers (worst) to five daggers (best)." (more)
"Spymaniac.com, the ultimate online guide to all your favorite spy flicks.
What’s fact, what’s fiction? History or fantasy? Which are the best spy films and why? The outrageous duds? Did the James Bond movies have any impact on real life? And would Angelina Jolie’s Evelyn Salt have learned all those stunts at the Farm?
Get answers to these and other questions here. Share your faves and reviews on Spymaniac.com, and discover great films you may never have heard about. Spymaniac is your community for exploring and sharing spy films, which are rated from zero daggers (worst) to five daggers (best)." (more)
Turkey Bird Spy Found Dead
Turkey - In the latest bizarre espionage claim leveled at Israeli intelligence services, Turkish authorities claimed that a dead bird found by a Turkish farmer in a field may have been conducting covert surveillance for Israel.
The dead Merops apiaster bird -- commonly known as the European Bee-Eater -- was discovered by the Turkish farmer wearing a band on its leg with the word "Israel" written on it.
The bird also had "unusually large nostrils," leading to speculation that it was implanted with a surveillance device and sent to Turkey on an aerial espionage mission. (more)
Merops apiaster |
The bird also had "unusually large nostrils," leading to speculation that it was implanted with a surveillance device and sent to Turkey on an aerial espionage mission. (more)
Labels:
aerial,
drone,
espionage,
government,
Hack,
humor,
nature,
spybot,
spycam,
weird,
X-Ray Vision
Tuesday, May 22, 2012
"How Much Is Your Privacy Worth?"
"How Much Is Your Privacy Worth?" just opened at The Dutch Museum of Communications located in The Hague, Netherlands.
Illustrator and graphic designer Noma Bar designed this and other posters for the museum, which conducted research into the theme of privacy for its latest exhibition.
...the museum conducted an official survey, the results of which are now displayed in the museum and on its website. They also conducted a series of street interviews. Bar used some of the findings to create the posters.
The following is a little cryptic due to Google's translation abilities, but you'll get the idea...
"The Museum for Communication pays special attention to the issue of privacy. Ruigrok research was commissioned by the museum research into the value of privacy among the Dutch public. Following this study, street interviews. The street interviews are presented in the museum, including exhibitions in the WE Blog, the Empire of back and forth Letter Secrets is the theme.
Labels:
art,
business,
data,
FutureWatch,
miscellaneous,
mores,
privacy,
survey
Private Investigator Blogs Worth Checking Out
I came across a blog by Sheer Investigations. It is worth checking out. Don't know how they scooped me with this photo. Well done! Many more interesting posts there, too.
Other well respected investigations blogs. (As compiled by PInow.com; and a great blog in and of itself.) and many more. Explore!
Monday, May 21, 2012
Security Tip: On Keeping Your Perscriptions Private
via a Security Scrapbook Blue Blaze Irregular... (Thanks!)
"To get the label off the bottle just fill the empty pill bottle with boiling hot water. The glue will soften and you can then pull it off the bottle easy. You can then apply the label to a piece of scrap paper and shred it.
What one does with the now empty and very clean pill bottle is up to the person."
Breaking Spy Cam News - Rutgers Student Sentenced
11:27 AM - Dharun Ravi could face 10 years in prison and be deported to his native India when he is sentenced Monday for spying on and intimidating his gay Rutgers University roommate, who then killed himself by jumping off New York's George Washington Bridge.
12:49 PM - Ex-Rutgers student Dharun Ravi gets 30 days in jail for using webcam to spy on roommate who later killed himself. (more)
12:49 PM - Ex-Rutgers student Dharun Ravi gets 30 days in jail for using webcam to spy on roommate who later killed himself. (more)
Android Malware ...using real apps as disguise 'wrappers'
The ominous trend is that quarter-on-quarter malware is not only getting more common but more sophisticated.
An important technique is the use app ‘wrappers’ to allay the suspicion of users that rogue software might have been installed. These work by bundling legitimate apps with malware in order to gain permissions without the user understanding what it is being granted for. (more) (sing-a-long)
An important technique is the use app ‘wrappers’ to allay the suspicion of users that rogue software might have been installed. These work by bundling legitimate apps with malware in order to gain permissions without the user understanding what it is being granted for. (more) (sing-a-long)
Trend Spotting - Chief Spies Become Political Leaders
Croatia's main opposition party HDZ elected former spy chief Tomislav Karamarko as its leader on Monday... (more)
George H.W. Bush, ex-CIA; former American President
Heydar Aliyev, Former head of Azerbaijan SSR KGB; former Azerbaijani President
George H.W. Bush, ex-CIA; former American President
Heydar Aliyev, Former head of Azerbaijan SSR KGB; former Azerbaijani President
Vladimir Putin, Lieutenant colonel KGB, FSB director; Russian President (again)
Industrial Espionage Charges - A Public Relations Nightmare
John Donovan says, "Shell is notorious for its predatory appetite for the intellectual property of other organizations, its business partners, contractors, etc. Industrial espionage is a way of life at Shell. Shell management has apparently even targeted the US defense establishment," and then he goes on to post: Another alleged case of IP theft hits Royal Dutch Shell
How can you protect your organization against accusations of industrial espionage?
Step 1. Start by writing business ethics into your corporate Credo. This codifies your standards for all the world to see. It is an especially good anchor for employees.
Step 1. Start by writing business ethics into your corporate Credo. This codifies your standards for all the world to see. It is an especially good anchor for employees.
Don't have a Credo?
Don't know where it fits into the picture?
"The Credo ties the company’s Vision to the company’s Mission and Values Statements. The Vision could be seen as the way the entrepreneur sees his company in the future general business environment. The Mission is what he intends to create to secure his place in the Vision. The Values statement indicates what the parameters of operation look like while attempting to achieve these goals. The Credo tells the reader how the company intends to execute these goals. It could be seen as the way the objectives can be reached to realize the Mission inside of the Vision while adhering to certain Values."
Step 2. Post your Credo where it can be see and read by all employees, often. Johnson & Johnson is one company which does this very well.
Step 3. Aggressively investigate all alleged deviations. Make corrections swiftly if the allegations are true.
Step 4. Institute a regular schedule of intellectual property (IP) security surveys, coupled with Technical Surveillance Countermeasures (TSCM) audits.
Don't be covert about it. The benefits are many...
• The impression that IP theft is bad, as opposed to being an unspoken business practice, is reinforced.
• Employees see you caring about their privacy. They appreciate that.
• They see that you value the IP assets which makes your company strong, and assures their continued employment.
• Caring is contagious. If you care, employees will care, and they will assist and support your security initiatives with more enthusiasm. Apple is an excellent example of Step 4.
• You create a safe environment where ideas and strategies can be discussed and developed without fear or compromise.
• And, maybe most important of all, you will thwart IP theft, thus making your company more profitable. Stockholders love that.
Cell Phone SpyWare App is Vulnerable to... being spied upon!
The irony is too significant to ignore: A smartphone app that enables customers to spy on others' phones may itself be vulnerable to attackers looking to spy on them.
The surveillance app, called "Mobile Spy," is designed to let its customers monitor the information, including text messages, GPS location and call logs, of other phones installed with the app. That private info is then uploaded to the app user's account and can be viewed in any Web browser, either on a computer or phone.
Unfortunately for those doing the watching, Mobile Spy contains several security vulnerabilities that allow an attacker to inject malicious code into the target's phone, via SMS message, and hijack their spy session, according to researchers at Vulnerability Lab, who disclosed the flaws. (more)
The surveillance app, called "Mobile Spy," is designed to let its customers monitor the information, including text messages, GPS location and call logs, of other phones installed with the app. That private info is then uploaded to the app user's account and can be viewed in any Web browser, either on a computer or phone.
Unfortunately for those doing the watching, Mobile Spy contains several security vulnerabilities that allow an attacker to inject malicious code into the target's phone, via SMS message, and hijack their spy session, according to researchers at Vulnerability Lab, who disclosed the flaws. (more)
Sunday, May 20, 2012
UK - A recording device that looks like a small piece of cardboard was planted at the home of a Premiership footballer to record details about his private life, MPs were told yesterday during an inquiry into the murky world of private investigators.
The transmitter was picked up during a security sweep of the player's house after he became suspicious about stories in the media, said Gerry Hall, managing director of security company IPS. He declined to name the footballer, who is still playing in the league.
RFID tags look similar and are often mistaken for bugs. |
Mr Hall said the small square of cardboard had a transmitter embedded in it that worked at a range of up to 100 yards. "It could easily be dropped into a wastepaper basket and transmit for 30 hours," he told MPs on the Home Affairs Select Committee...
Mr Hall said an investigator could easily persuade a company receptionist to let them in and would need just seconds to plant the device. He said his company had just found one in a chairman's office. (more)
Mr Hall said an investigator could easily persuade a company receptionist to let them in and would need just seconds to plant the device. He said his company had just found one in a chairman's office. (more)
Meet Your New Back Door Friend...
Will Congress require social networks, online voice over IP (VoIP) services, and Webmail providers to build in backdoors that could be used for electronic surveillance purposes by the FBI?
According to one news report, FBI officials have been meeting with Facebook, Google, Microsoft (which owns Skype and Hotmail), and Yahoo, among other companies. The goal apparently isn't to promote the bureau's push for expanded wiretapping capabilities, but rather to ask how that be implemented while causing minimal disruption for the companies with networks that would be directly accessed...
Six Key Points to Consider
1. Bureau Warns About Going Dark. The bureau has already been asking Congress for broader surveillance powers to help it keep up with new technologies....
Six Key Points to Consider
1. Bureau Warns About Going Dark. The bureau has already been asking Congress for broader surveillance powers to help it keep up with new technologies....
2. Proposed CALEA Revisions Would Update 1994 Law. Accordingly, the FBI wants Congress to expand the Communications Assistance for Law Enforcement Act (CALEA)...
3. Questions Remain Over Wiretapping Scope. Just how often does the FBI need to use wiretapping during an investigation? That's not clear. According to an FBI website about CALEA, wiretapping "is used infrequently and then only to combat the most serious crimes and terrorism."...
4. Civil Liberties Groups See Slippery Slope. Civil rights groups have warned that granting law enforcement agencies new surveillance powers could lead to a decrease in the privacy protections that people currently enjoy...
5. Will Technology Companies Back CALEA Expansion?...
6. Backdoors May Facilitate Unauthorized Access. Wiretapping backdoors could also make online services more vulnerable to attackers.... (more)
Bustin' A Move Could Get One Busted
TX - Galveston police are on the lookout for the “dancing burglar” who was captured on video busting some moves during the break-in of a Duck Tours amphibious vehicle.
The 38-second video released by Galveston police Capt. Jeff Heyse on Wednesday shows a man apparently chatting with someone before he busts the dance moves.
The dancer (later identified as a juvenile) is one of three people sought in connection with the March 27 burglary of a Duck Tours amphibious automobile, which takes sightseers along Galveston streets and the bay. (more)
The 38-second video released by Galveston police Capt. Jeff Heyse on Wednesday shows a man apparently chatting with someone before he busts the dance moves.
The dancer (later identified as a juvenile) is one of three people sought in connection with the March 27 burglary of a Duck Tours amphibious automobile, which takes sightseers along Galveston streets and the bay. (more)
"One can never be too far away, or too thin. Besides, what's in a name?"
NJ - An appeals court has ruled that police in New Jersey can wiretap a suspect in another state without obtaining a warrant from the judge of that state.
Thursday’s ruling also confirms the murder conviction of Edward Ates, a Florida man who was sentenced to life in prison after failing to persuade a jury of the argument that he was too fat to have committed the 2006 murder of his son-in-law.
Ates was convicted in 2009 of fatally shooting his former son-in-law. An investigation by Bergen County prosecutors included wiretapping calls Ates made from Florida to his mother and sister in Louisiana. (more)
Thursday’s ruling also confirms the murder conviction of Edward Ates, a Florida man who was sentenced to life in prison after failing to persuade a jury of the argument that he was too fat to have committed the 2006 murder of his son-in-law.
Ates was convicted in 2009 of fatally shooting his former son-in-law. An investigation by Bergen County prosecutors included wiretapping calls Ates made from Florida to his mother and sister in Louisiana. (more)
Saturday, May 19, 2012
Security Tops Boardroom Agendas
via the Financial Times...
Securing corporate intellectual property assets, customer data and other information in the face of an onslaught of attacks from cyber thieves, spies and “hactivists” is now a top priority for most chief information officers and – increasingly – for the corporate boardroom.
“It is definitely something I think about all the time,” says the chief information officer of a US-based consumer goods multinational that, like many other companies, particularly those in the financial services sector, now has an IT security team led by a chief information security officer (CISO.)...
“Our companies are targeted for insider information and our universities and national laboratories are targeted for their research and development,” Robert Mueller, Federal Bureau of Investigations director told a US congressional panel last year...
Meanwhile companies and other organizations have begun to spend more on identifying and protecting their key data using multiple layers of defense and, perhaps most importantly, monitoring and detection systems that can identify security breaches quickly and efficiently. (one example) (more)
Securing corporate intellectual property assets, customer data and other information in the face of an onslaught of attacks from cyber thieves, spies and “hactivists” is now a top priority for most chief information officers and – increasingly – for the corporate boardroom.
“It is definitely something I think about all the time,” says the chief information officer of a US-based consumer goods multinational that, like many other companies, particularly those in the financial services sector, now has an IT security team led by a chief information security officer (CISO.)...
“Our companies are targeted for insider information and our universities and national laboratories are targeted for their research and development,” Robert Mueller, Federal Bureau of Investigations director told a US congressional panel last year...
Meanwhile companies and other organizations have begun to spend more on identifying and protecting their key data using multiple layers of defense and, perhaps most importantly, monitoring and detection systems that can identify security breaches quickly and efficiently. (one example) (more)
This Time the Janitor is Spied Upon
AK - Educators at Gilson Junior High were shocked and outraged to learn
janitorial supervisors had planted a hidden camera in the ceiling tiles
of the teacher lounge above a computer workplace, ostensibly in hopes of
catching janitors goofing off on the computer rather than working.
Outrage spread when a second camera hidden in a clock was discovered in a
custodial closet at Valdez High School. It was later learned the same
camera had been located in the teacher lounge at the junior high days
before it was found at the high school. (more)
Possible Surveillance Drone Strike? In Colorado?!?!
CO - A mystery object, thought to be a military or law enforcement drone, flying in controlled airspace over Denver almost caused a catastrophic mid air crash with a commercial jet Monday.
The pilot of the Cessna jet radioed air traffic controllers to warn them that “A remote controlled aircraft” had flown past his plane far too close for comfort.
“Something just went by the other way … About 20 to 30 seconds ago. It was like a large remote-controlled aircraft.” the pilot said in the transmission that was captured on the live air traffic audio website liveatc.net (Look for 2012-05-16 15:00:51 in the archive section. Free registration required.) (more)
The pilot of the Cessna jet radioed air traffic controllers to warn them that “A remote controlled aircraft” had flown past his plane far too close for comfort.
“Something just went by the other way … About 20 to 30 seconds ago. It was like a large remote-controlled aircraft.” the pilot said in the transmission that was captured on the live air traffic audio website liveatc.net (Look for 2012-05-16 15:00:51 in the archive section. Free registration required.) (more)
"Spy, the Secret World of Espionage" Now open in NYC
The mysterious cloak and dagger world of international espionage and its real-life heros and villains are exposed in a new exhibition, the first to be sanctioned by U.S. intelligence agencies.
"Spy, the Secret World of Espionage," which opens at the Discovery Times Square on Friday, includes hundreds of artifacts, some from the vaults of the CIA and FBI and the National Reconnaissance Office (NRO).
They range from a World War Two-era collapsible motorbike that could be dropped by parachute and deployed in 10 seconds and a German ENIGMA machine to create secret messages to a camel saddle used by one of the first CIA agents in Afghanistan after the 9/11 attacks to bugging devices, microdots and surveillance equipment.
"This is the first and only time these items will ever travel. It is kind of an unparalleled cooperation and collaboration with the CIA and FBI," said H. Keith Melton, author, intelligence historian and expert on spy technology who contributed items from his own collection. (more)
"Spy, the Secret World of Espionage," which opens at the Discovery Times Square on Friday, includes hundreds of artifacts, some from the vaults of the CIA and FBI and the National Reconnaissance Office (NRO).
They range from a World War Two-era collapsible motorbike that could be dropped by parachute and deployed in 10 seconds and a German ENIGMA machine to create secret messages to a camel saddle used by one of the first CIA agents in Afghanistan after the 9/11 attacks to bugging devices, microdots and surveillance equipment.
"This is the first and only time these items will ever travel. It is kind of an unparalleled cooperation and collaboration with the CIA and FBI," said H. Keith Melton, author, intelligence historian and expert on spy technology who contributed items from his own collection. (more)
Subscribe to:
Posts (Atom)