Wednesday, July 25, 2012

The Incredible Tale of the Spying Broken Heart Surgeon

A Connecticut heart surgeon has been ordered by a civil jury to pay $2 million to his ex-girlfriend after admitting to planting cameras in her home.

"And this year's award goes to..."
Dr. William V. Martinez, a divorced father of nine, admitted to planting surveillance cameras in the home of D'Anna Welsh, a physician's assistant at Hartford Hospital. He also said he planted a tracking device in her car.

The Hartford Courant reported Welsh and Martinez dated from sometime in 2001 to February 2007, when Martinez broke up with Welsh.

Later that year, a plumber discovered "suspicious" equipment embedded in a crawl space beneath the floor of Welsh's home. She first called the police. Then she called Martinez, who admitted to planting the equipment in her home.

"Martinez further admitted to [her] that he had been viewing video of her bedroom and that he had also been eavesdropping from his car via audio devices he installed in her home," says the civil complaint.

At the time Welsh did not press charges. However a year later, Martinez mentioned details of Welsh's life to her that he had no way of knowing about, leading her to believe he was still spying on her, the newspaper said.

Martinez was charged in criminal court with eavesdropping and voyeurism in 2008, and agreed to two years of accelerated rehabilitation.

Welsh, still uneasy, hired a security firm to sweep her home in January 2010, the newspaper said. She filed a civil suit against Martinez in July 2010 after the firm discovered a camera hidden inside her TV. (more)

New Mobile Malware Threat Revealed at Black Hat

Mobile malware is viewed as a growing threat, particularly on the Android platform. To protect Android users and prevent malicious applications from being uploaded to Google Play, Google created an automated malware scanning service called Bouncer.

At Black Hat, Nicholas Percoco and Sean Schulte, security researchers from Trustwave, will reveal a technique that allowed them to evade Bouncer's detection and keep a malicious app on Google Play for several weeks.

The initial app uploaded to Google Play was benign, but subsequent updates added malicious functionality to it, Percoco said. The end result was an app capable of stealing photos and contacts, forcing phones to visit Web sites and even launch denial-of-service attacks.

Percoco would not discuss the technique in detail ahead of the Black Hat presentation, but noted that it doesn't require any user interaction. The malicious app is no longer available for download on Google Play and no users were affected during the tests, Percoco said. (more) (more)

Hey kids, we bought and fixed Skype just for you!

Skype has denied reports that recent changes to its architecture would make calls and messages easier to monitor by law enforcement.

Skype, a worldwide Internet-based voice and video calling service Microsoft acquired last year for $8.5 billion, said Tuesday the changes to its peer-to-peer infrastructure were done to improve the quality of service.

What it did was move "supernodes" into datacenters, Skype said. Supernodes act as directories that find the right recipient for calls. In the past, a user's computer that was capable of acting as a directory was upgraded from a node to a supernode. A node is the generic term for computers on a network. (more)

Attention Getting Security Awareness Information & Posters

Creative security awareness content is difficult to come by, but there is a ton of it at NoticeBored.

NoticeBored is a subscription service. Every month they supply a new module; a fresh batch of awareness materials for businesses staff, managers and IT professionals. Each module covers a different information security topic. 

TSCM inspections with their vulnerability assessments are a core element of the information security strategy, but employee education is equally important. 

Creating your own educational materials is a chore. Fortunately, there is no need to reinvent the wheel. (more)

Monday, July 23, 2012

Egypt Ex-Spy Chief Died of Rare Disease

Egypt's former intelligence chief Omar Suleiman died from a rare disease affecting the heart and kidneys, according to the U.S. clinic where he was undergoing medical tests at the time.

Suleiman, who died at age 76, was fallen Egyptian president Hosni Mubarak's last deputy and one of his most trusted advisers. He stepped briefly into the limelight when he was made vice president days before Mubarak was ousted in a popular uprising last year. 

"General Omar Suleiman ... passed away due to complications from amyloidosis, a disease that affects multiple organs including the heart and kidneys," the Cleveland Clinic said in a statement. (more)




Bugging History - May 13, 1966

Photo Tag: The extent of the business in snooping devices is indicated by the growth in contrivances to detect wiretaps and "bugs". Some merely warn the intended victim, while others jam or scramble the snooping. This telephone de-bugging meter discovers any transmitter (bug) in the phone or in the lines leading to it. De-bugging devices are bought mostly by business executives who suspect espionage by competitors. (AP Photo/Robert Kradin) (more)

It was never unusual for news reporters to get the facts wrong when reporting on business espionage, bugging or general electronic snooping. It still isn't unusual. The photo actually shows how a carbon microphone from the common phone of the day could easily be replaced by one which also transmitted the voice via radio. 

Due to the simple installation, it was generally referred to as a "drop-in bug". To the untrained eye, both looked legitimate, but your ear could tell! The internal carbon granules inside the microphone sounded like sand when shaken. In order to build the bug inside the housing, the carbon had to be emptied out to allow space for the electronics and micro-mic. Those bugged mics were silent when shaken.

Another photo from the same era, shows two ways to tap a phone: the drop-in bug, and the big suction cup induction coil near the earpiece. Both seem crude by today's standards.

Most modern handsets are sealed units. Dropping anything in them is problematic. There are still a few, however, that are screwed together. 

Here are two examples of what you shouldn't see if you open one of these...

Inspecting today's telephones require more than a trained eye, because there may not be anything to see. 

Conversations from VoIP phones travel as computer bits which may be collected far from the phone instrument. In fact, some VoIP phones transmit room audio even when they are supposedly hung up.

Other business telephone systems have many eavesdropper-friendly features built right into them, no extra hardware needed. Just program the features correctly and listen-in.

Think your phone system is bugged or tapped? Give me a call. ~Kevin

Sunday, July 22, 2012

Thursday, July 19, 2012

Smartphone Spying on the Rise

...how you would you feel if you found out that the smartphone in the palm of your hand was spying on you?

View more videos at: http://nbcconnecticut.com.

"Violated. Violated, very violated," said Andres Torres of East Hartford. "I'd be pretty creeped out, actually," Maddie Weed of Tolland told NBC Connecticut. "That's not cool." "I'm scared now! They could be looking at us," said Magdelena Santiagon of Hartford.

According to Kessler International, cases of malicious smartphone apps posing on markets as free or low-cost applications are on the rise. (more)

Was Skype reworked by Microsoft to make it easier to wiretap?

Skype supernodes are being centralized by Microsoft, but they deny wiretapping. But there's this patent they have to intercept VoIP phone calls...
 
Back in May, skype-open-source reported Skype, owned by Microsoft, had replaced user-hosted P2P supernodes with Linux grsec systems hosted by Microsoft. The shock wasn't that Microsoft is hosing Skype on Linux servers, but that centralization makes it possible to wiretap Skype communications. One big advantage of Skype has always been the decentralized and encrypted service was secure from eavesdropping.

Microsoft denies this, but the company applied for a patent on a technology called Legal Intercept to monitor and record Skype calls. Applied for before they purchased Skype, Microsoft specifically mentions intercepting calls on that service in the patent application. Conspiracy theorists now say they understand why Microsoft paid what seemed to be an unusually high price for Skype. (more)

Monkey Discovers Game Reserve’s ‘Hidden’ Spy Cam, Takes Smug Self-Shot

According to the Houston Zoo, this seemingly self-satisfied monkey has a good reason to "smile": He's uncovered the camera set up by a Borneo-based game reserve to spy on him.

"Looks like someone knew about the 'hidden' cameras," tweeted the zoo. Naturally, monkeys don't bare teeth to express joy or amusement, they do so to communicate anger.

Given that he's being spied on by a game reserve, I'd say he's earned the right to be pissed. (more)

The Other ASIS

Interesting video about a spy agency we don't usually hear about.

William "Bill" Bennett - Friend & Respected Colleague - RIP


The following was composed by a close friend of Bill's and expresses the feelings of many...

With a heavy heart I write this note about the passing of a good friend and a great man William “Bill” Bennett.
  He passed away July 14, 2012 at home after a stint in the hospital. He was 85 years old.

Bill was a former senior Special Agent with the California Department of Justice whose career spanned more than thirty years.  He investigated many of the major crimes that occurred during his tenure including the Charles Manson case and the Sonny Barger – Hell’s Angels investigations.

He retired in 1985 and partnered with John P. Reisinger in Walsingham Associates to perform TSCM services (bug sweeps) and investigations.  Bill was a licensed private investigator.

Upon John’s passing in 2000 Bill kept the firm going.

Bill’s believed in Glenn Whidden’s philosophy of the two day sweep, recording the RF spectrum the day before the sweep and checking it again the day of the sweep.

Bill’s personal TSCM philosophy, which stemmed from his extensive experience in the use of electronic surveillance in his government service, was that searching for bugs was heavy emphasis on the physical search.  He felt that searching for electronic surveillance devices was like searching for narcotics or contraband.

He had a son Patrick who was active in the TSCM business who passed from an accidental drowning in 2009.  He was married to Patricia for 33 years who passed in 2010.

He was a member of the following organizations:

Association of Former Intelligence Officers (AFIO)
American Society for Industrial Security (ASIS)
Business Espionage Control & Countermeasures Association (BECCA)
California Peace Officer Association (CPOA)
California Department of Justice (DOJ, Ret.)
Chief Special Agents Association (CSAA)
California Association of Licensed Investigators (CALI)
Espionage Research Institute (ERI)
High Technology Crime Investigation Association (HTCIA)

He was a true gentleman and a man of integrity whose presence as a friend and in the industry will be missed.

Tuesday, July 17, 2012

Death of an Icon - The Master Padlock

Just to look at it brings back the smell of your high school locker room, but like your old U.S. Keds, it is not the new kid Keds of today. Both have morphed into the 21st Century, new and improved.

Master Padlock no more, they call it 1500eDBX, but you "person of the future" may call it dialSpeed!

Product Features:
• Electronic directional interface offers speed, ease of use, & multiple personalized codes
Organize and protect personal and valuable information with secure, convenient, digital storage at the Master Lock Vault
Vault enabled - permanent Backup Master Code at masterlockvault.com. Never Forget Your Combination Again!
Comes with resettable Primary Code & option for 3 additional Guest Codes
Ready to use – includes installed, replaceable CR2032 battery for 5 years of life
2-1/16" (51mm) wide metal body can be opened one-handed without looking
Maximum security with anti-shim technology
Boron carbide shackle for increased cut resistance
For INDOOR USE only. Do not allow lock to get wet

Best Used For:
School, Employee, & Athletic Lockers
Cabinets
Indoor Storage Lockers
 (more) (sing-a-long)

How Cabbies Cheat the Fare Dispatch System

Australia - A Melbourne taxi driver has exposed a sophisticated scam that some operators are using to override taxi meters and stay at the top of the fare dispatch system. 

The Silver Top driver has told the ABC that some drivers are using remote electronic devices and radio frequency jammers to trick the cab companies into giving them work when they are not in the area.

The equipment is easily purchased at online sites like eBay.

Neil Sach from the Victorian Taxi Association fears hundreds of drivers could be in on the scam. (more with video)


The scam is likely being used by cabbies, truckers, police and others worldwide; wherever GPS tracking is being used. 

Note: eBay has recently policed the sale of these devices on their site, however, they remain available on other sites

Or, DIY...
Click to enlarge.
 

Increasing Government Surveillance Powers Meets Backlash

Australia - Any proposal by the government to increase its own power should be treated with scepticism.

Double that scepticism when the government is vague about why it needs that extra power. Double again when those powers are in the area of law and order. And double again every time the words "national security" are used.

So scepticism - aggressive, hostile scepticism, bordering on kneejerk reaction - should be our default position when evaluating the long list of new security powers the Federal Government would like to deal with "emerging and evolving threats".

The Attorney-General's Department released a discussion paper last week detailing security reform it wants Parliament to consider. (more)

Saturday, July 14, 2012

Another SpyCam'er Shoots Himself - Darwin Award

The Wallingford Police Department released a photograph of the person who they said they would like to speak with after a camera was discovered inside a Walmart dressing room in early June. 

Click to enlarge.
Police said the camera was set up inside the dressing room and was only recording for a short period of time before it was discovered by an employee.

Police said there was no indication that anyone was actually filmed while undressing.

He is described as a man in his early 20s and was wearing a light green-striped shirt and a Hartford Whalers tan colored hat.
 (more)

Own Your Own Spy Plane Drone - Costs Less Than an iPad

Remote control helicopters were a fad not too long ago, but who needs that when you can fly a remote control plane, which also acts as spy vehicle collecting video (and audio) as you fly. 

Red5 has just introduced its Spy Hawk plane, which comes with a 5 megapixel camera attached to the nose. The aircraft beams the video back to your 3.5-inch screen which is embedded in the controller. The plane can be controlled within a 600 feet radius and comes with 4GB of SD card storage.


The Spy Hawk also features a stabilization system which makes it much easier to fly as well as an autopilot switch which will keep the plane at the correct altitude. The aircraft can stay in the air for about 30 minutes thanks to its 7.4v lithium-ion polymer. (more)

14 incredibly creepy surveillance technologies that Big Brother will be using to spy on you

"14 incredibly creepy surveillance technologies that Big Brother will be using to spy on you"

Q. How could you pass up a headline like that?
A. You can't.
(more)

My favorite...
Hijacking Your Mind

The U.S. military literally wants to be able to hijack your mind. The theory is that this would enable U.S. forces to non-violently convince terrorists not to be terrorists anymore. But obviously the potential for abuse with this kind of technology is extraordinary. The following is from a recent article by Dick Pelletier…

The Pentagon's Defense Advanced Research Projects Agency (DARPA) wants to understand the science behind what makes people violent, and then find ways to hijack their minds by implanting false, but believable stories in their brains, with hopes of evoking peaceful thoughts: We're friends, not enemies. Critics say this raises ethical issues such as those addressed in the 1971 sci-fi movie, A Clockwork Orange, which attempted to change people's minds so that they didn't want to kill anymore. Advocates, however, believe that placing new plausible narratives directly into the minds of radicals, insurgents, and terrorists, could transform enemies into kinder, gentler citizens, craving friendship. Scientists have known for some time that narratives; an account of a sequence of events that are usually in chronological order; hold powerful sway over the human mind, shaping a person's notion of groups and identities; even inspiring them to commit violence.

Mobile Phones and Privacy

Mobile phones are a rich source of personal information about individuals. Both private and public sector actors seek to collect this information. 

Facebook, among other companies, recently ignited a controversy by collecting contact lists from users’ mobile phones via its mobile app. A recent Congressional investigation found that law enforcement agencies sought access to wireless phone records over one million times in 2011. As these developments receive greater attention in the media, a public policy debate has started concerning the collection and use of information by private and public actors.

To inform this debate and to better understand Americans’ attitudes towards privacy in data generated by or stored on mobile phones, we commissioned a nationwide, telephonic (both wireline and wireless) survey of 1,200 households focusing upon mobile privacy issues. (more) (download Mobile Phones and Privacy)

Friday, July 13, 2012

Silent Circle is Coming - Guess who won't be pleased.

Silent Phone, Silent Text, Silent Mail, and Silent Eyes - are all neck deep in final tweaks and we have to say, they are even better than we expected! We plan to go live September 17, 2012. 

Click to enlarge.
Each Silent Circle subscriber will receive a personal phone number and of course all calls within the Circle are 100% free worldwide. 

We've even added on a Secure Calling Plan option to allow Silent Circle subscribers to communicate with people outside the Circle. Get them in the Circle and you'll be secure end to end. (more)

Who is the mastermind behind this audacious foray into total privacy? Who is the stick-in-the-eye of eavesdropping and wiretapping? 
Click to enlarge.

None other than our hero... Phil Zimmerman!
 
"Phil is the creator of PGP, the most widely used email encryption software in the world, and the Zfone/ZRTP secure VoIP standard. PC World named him one of the Top 50 Tech Visionaries of the last 50 years. He has received Privacy International's Louis Brandeis Award, CPSR's Norbert Weiner Award, the EFF Pioneer Award, the Chrysler Award for Innovation in Design, and inducted into the Internet Hall of Fame."

This will be big. ~Kevin


Australia - Spies Seek More Data

Australia's intelligence community is proposing the biggest shake-up in more than a decade. 

On the wish list is a plan to force telecommunications providers operating in Australia to retain users' phone and internet data for up to two years.

Other plans include allowing security agencies to get more access to social media sites like Facebook, and expanding powers for ASIO agents.

The ideas are in a discussion paper written by the Attorney-General's Department for a parliamentary joint committee looking at reforms to national security legislation. (more) (discussion paper)

Security Alert for Yahoo Voice users.

Hackers posted what appear to be login credentials for more than 453,000 user accounts that they said they retrieved in plaintext from an unidentified service on Yahoo. 

To support their claim, the hackers posted what they said were the plaintext credentials for 453,492 Yahoo accounts, more than 2,700 database table or column names, and 298 MySQL variables, all of which they claim to have obtained in the exploit. "We hope that the parties responsible for managing the security of this subdomain will take this as a wake-up call, and not as a threat," a brief note at the end of the dump stated. (more)

Check here to see if you are on the list. Use your browser's search tool. If so, it's time to change your password... at every place you use it. ~ Kevin

Security Alert for Cisco TelePresence users.

If you rely on Cisco TelePresence products for sensive business communications, you might want to stop what you are doing and pay attention to a new warning that hackers can exploit security flaws to execute arbitrary code, cause a denial-of-service condition, or inject malicious commands.

Cisco released four separate security advisories today to warn of the risks and urge TelePresence users to deploy patches, especially in sensitive business environments. (more)

Advisory 3
Advisory 4

Of course...
• Don't set up any teleconferencing system outside of your firewall.
• Don't turn the auto-answer feature on.
• Don't forget to set "mute mic" as a default.
In fact, just shut the whole thing off until you need it.


Thursday, July 12, 2012

Post #4000 - Slam Dunked Spycamer Mom Faces Slammer

A sneaky Texas mom, who tried to dig up dirt on her daughters’ high school basketball coach, came away with nothing, but now faces 20 years in prison for wiretapping. 

Prosecutors said Wendee Long, 46, a middle-school principal in Fort Worth, had one of her daughters plant a cellphone camera in a girl's locker room during halftime of a game on February 7, the Star-Telegram reported.

Long's two daughters played for Argyle High School, and they had complained that the coach, Skip Townsend, screamed at the players too much, investigators said. (more) (more)

Are the Androids Spying on You?

Are some mobile ads on Android devices acting as spies? According to one mobile security firm, the answer is yes. 

San Francisco-based Lookout Mobile Security, in a posting Monday on its corporate blog, said that "select ad providers" in free mobile applications are accessing personal information without the user's notification or consent, through the use of "adware." The personal information includes e-mail, phone numbers, and names...

Tip: Lookout Mobile Security is offering a free Ad Network Detector via Google Play. The Detector scans an Android phone and displays the kinds of ads, the ad networks, and the type of information that is being collected, so that a user can decide if a given ad-containing app should remain on the phone. (more)

News of the World - Mr. Big gets tapped.

Britain's Supreme Court took a step toward exposing the names at the heart of Britain's phone hacking scandal Wednesday, ruling that a private investigator convicted of eavesdropping for a Rupert Murdoch-owned tabloid must reveal who ordered him to do it. 

Meanwhile, a police investigation into press wrongdoing triggered by the hacking revelations expanded beyond Murdoch's media empire with the arrest of a former reporter from the rival Mirror group.

Private eye Glenn Mulcaire was jailed briefly in 2007 for hacking the voicemail messages of royal aides on behalf of the now-defunct News of the World. (more)

Wednesday, July 11, 2012

Historical Earthquake Map - Interesting & Sobering

Guess what can trigger your business continuity plan faster than a spy stealing your trade secrets?

Phil's blog has a link to an enlarged version.
That's right. Mother Nature!

My friend and colleague, Phil Rothstein, Rothstein Associates, Inc., is an expert on keeping businesses running. Today, he posted some astounding historical maps on earthquakes and tornadoes. Have a look.

What!?!? You don't have a business continuity plan! Talk to Phil. Now.

Not All USB Spy Sticks Are Found This Easily

An attempt to infiltrate the corporate systems of Dutch chemical giant DSM by leaving malware-riddled USB sticks in the corporation's car park has failed.

Instead of plugging the discarded drives into a workstation, which would have infected the machine, the worker who first found one of the devices handed it in to DSM's IT department.

Sysadmins subsequently found an unspecified password-stealing keylogger, according to local reports by Elsevier.nl (Google translation here).

The spyware was designed to upload stolen usernames and passwords to a server under the control of hackers. This site was blocked by DSM's sysadmins, effectively thwarting the password-snatching object of the attack, so the company would be protected even should any other workers find and use the infected USB sticks on corporate laptops. It's unclear who was behind the plan, but regular cybercriminals or industrial spies are two strong possibilities. (more)

Monday, July 9, 2012

Data Diarrhea - Cell Tower Dumps

If you secretly suspected that nifty mobile device in your pocket was spying on you, your paranoia has just been richly rewarded.

As the New York Times reports, a Congressional inquiry into cell phone surveillance reveals that U.S. law enforcement agencies requested data from wireless carriers more than 1.3 million times last year -- or nearly 500 times the number of wiretaps approved over the same period.

That number is way larger than anyone expected. But the actual number of people spied on might be even higher, says the Times:

"Because of incomplete record-keeping, the total number of law enforcement requests last year was almost certainly much higher than the 1.3 million the carriers reported to [Senator] Markey. Also, the total number of people whose customer information was turned over could be several times higher than the number of requests because a single request often involves multiple callers. For instance, when a police agency asks for a cell tower "dump" for data on subscribers who were near a tower during a certain period of time, it may get back hundreds or even thousands of names." (more)

Wednesday, July 4, 2012

U.S. Wiretap Report 2011 (For the Period January 1 Through December 31, 2011)

The vast majority of law enforcement wiretaps in 2011 were for telephones (including mobiles) and only a tiny percentage included encryption, which in no case prevented officials from obtaining the plain text of the communications.

That's according to the latest annual U.S. Courts report on wiretapping by federal and state government-authorized wiretaps.

Of the 2,189 court-ordered intercepts, 95.6 percent of the 2,189 total were for some type of telephone, whether a plain old one, a cell phone or another type of mobile device. Only four were against some type of electronic device, including a digital pager, fax or computer. Another six were for oral communications (intercepted with a microphone) and 87 were for a combination of more than one intercept type. (more)

Tuesday, July 3, 2012

Libya Powers Up Old Spy Gear (The Who, you say!)

Libya's caretaker government has quietly reactivated some of the interception equipment that fallen dictator Moammar Gadhafi once used to spy on his opponents.

The surveillance equipment has been used in recent months to track the phone calls and online communications of Gadhafi loyalists, according to two government officials and a security official. Two officials say they have seen dozens of phone or Internet-chat transcripts detailing conversations between Gadhafi supporters. (more) (the gear) (sing-a-long)

In other news... Bull Poops Out
French technology company Amesys is offloading its business that sells Internet-interception equipment, a move that comes six months after it became public that Moammar Gadhafi's regime had been using the technology to spy on Libyans.

Bull SA, Amesys's parent company, said Thursday it had "signed an exclusivity agreement with a view to negotiating the sale of the activities" related to its Eagle interception product. Bull declined to identify the buyer. (more)

Monday, July 2, 2012

你好, 你好! Is anybody listening?

The Chinese government has “pervasive access” to some 80 percent of the world’s communications, giving it the ability to undertake remote industrial espionage and even sabotage electronically of critical infrastructures in the United States and in other industrialized countries.

The Chinese government and its People’s Liberation Army are acquiring the access through two Chinese companies, Huawei Technologies Co. Ltd and ZTE Corporation, telecommunications experts have told WND.

With this access, the sources say, the Chinese are working on the other 20 percent. The two companies give the Chinese remote electronic “backdoor” access through the equipment they have installed in telecommunications networks in 140 countries. The Chinese companies service 45 of the world’s 50 largest telecom operators. (more)

Saturday, June 30, 2012

So, how much can you make as an industrial spy?

Japan - Police have arrested two former employees of a Kawasaki-based machine tool maker on suspicion of duplicating confidential blueprints and smuggling them to a Chinese company. 

Industrial espionage: Confidential blueprints from Yoshizuka Seiki Co. in Kawasaki allegedly ended up in the hands of a Chinese company. KYODO 

Seiichi Furuya, 48, and Fumiaki Inoue, 57, were taken into custody Wednesday after allegedly copying blueprints belonging to Yoshizuka Seiki Co...

The Chinese company, a major press maker based in Yangzhou, Jiangsu Province, was found to have deposited about ¥42 million ($526,183.91) in Inoue's bank account, some ¥38 million ($476,071.16) of which was credited to an account held by Furuya, the police said.

Spy Satellites - The Next Amazing Generation

A new spy satellite launched into orbit on a secret mission for the U.S. military Friday (June 29), roaring spaceward atop the world's most powerful rocket in use today.

The NROL-15 reconnaissance satellite blasted off from a launch pad at Cape Canaveral Air Force Station in Florida at 9:15 a.m. EDT (1315 GMT) to begin its classified mission for the National Reconnaissance Office. It rode a towering Delta 4-Heavy booster equipped with new RS-68A first stage engines — the most powerful liquid hydrogen rocket engines ever built, according to their manufactures.

The Ginsu...
The successful launch marked the second space mission in nine days by ULA to orbit a classified payload for the U.S. military. The next ULA launch will be an Atlas 5 rocket slated to loft another NRO spy satellite into orbit in August. (more)

Spy Drones - The Next Amazing Generation

The U.S. Navy has its sight set on this new drone that was recently unveiled by defense company partner Northrop Grumman.

Click to enlarge.
They've been working on the MQ-C4 Triton over the last several years, and it's now ready for test flights. (more)

Click to enlarge.

SpyCam Found in Irish Slammer Slammed

Ireland - Prison chiefs have launched a probe after secret cameras that could have spied on staff were discovered at a top jail.  

Warders at Wheatfield lock-up in Dublin’s west were shocked to find the miniature devices in the tuck shop area which is run by prison officers.

They have demanded to know if there are spying kits in other slammers.

The Prison Officers Association has met senior management to find out why the spy cams were put there. Spokesman John Clinton said: “The POA is deeply concerned about a report of covert surveillance in a location solely used by staff." (more)

John "Jack" Caulfield, Nixon White House operative, dies at 83

John J. Caulfield, a security operative who was responsible for wiretaps and other so-called “dirty tricks” of the Nixon White House died June 17 in Vero Beach, Fla. He was 83. 

Mr. Caulfield was best known as the White House official who extended an offer of clemency, cash and future employment to James W. McCord Jr. if McCord, a convicted Watergate burglar, refused to testify against members of Nixon’s inner circle... Among other things, he revealed that the president’s brother, Donald Nixon, was under surveillance by the Secret Service and had a wiretap on his telephone. 

After Nixon was elected, Mr. Caulfield assumed a vaguely defined role as a White House staff assistant, with responsibilities that ranged from bodyguard to collector of intelligence.

Mr. Caulfield left the White House several months before the Watergate break-in occurred in June 1972 and was never prosecuted. But his Senate testimony did include some jaw-dropping revelations about the Nixon White House’s intelligence-gathering efforts. (more) (book)

Interesting: Caulfield received NYPD shield #911, June 1, 1953, long before the number took on greater meanings. It is also ironic that Nixon called upon 911 to solve his problems.

Friday, June 29, 2012

TSCM Employment Opportunity

Job Title: Security Specialist (TSCM Program Specialist)
Department: Department Of Transportation  
Agency: Federal Aviation Administration  
Job Announcement Number: AWA-AIN-12-MR78807-26265
SALARY RANGE: $91,426.00 to $141,735.00 / Per Year
OPEN PERIOD: Wednesday, June 27, 2012 to Wednesday, July 11, 2012
SERIES & GRADE: FV-1801-J
POSITION INFORMATION: Full Time - Permanent
DUTY LOCATIONS: 1 vacancy(s) - Washington DC
WHO MAY BE CONSIDERED: U.S. Citizens
(more)

Foreign Spying in US on the Rise

DC - Driven in part by the global financial crisis, foreign intelligence services, corporations and computer hackers have stepped up efforts to steal technology and trade secrets from American companies, the FBI’s top spy hunter told Congress on Thursday. (more)