Important Points
• iPhone / iPad / iPod muggings are common.
• Reduce risk...
-- Minimize usage while in very public places.
-- Use iOS's security features...
---- for tracking a stolen device and remote wiping of data.
---- for preventing thieves from: turning off tracking, accessing data and accounts.
• If theft occurs, go to the police first, not the phone company.
-- Police will try to track.
-- Carrier will shut off service.
• Seal the SIM card with serial numbered security tape to detect tampering.
Setting tips via Martin Williams...
1. Select Settings.
2. Click General.
3. Select Restrictions.
4. Set a Restrictions passcode.
5. Click Enable Restrictions.
6. Look for Deleting Apps and toggle the switch from On to Off. This will mean that no one can delete an app such as Find My iPhone without your Restrictions passcode.
7. Scroll down the list of options until you reach the Privacy section, here you’ll find a link to Locations Services, click it.
8. Select Don’t Allow Changes. This will mean it is impossible for a robber to disable the Find My iPhone application from broadcasting your GPS. You will now need manually to approve all new apps to access your location data.
9. Go back to the main Restrictions menu and select Accounts, changing this setting to Don’t Allow Changes. This makes it impossible for a mugger to disconnect your iCloud account that connects to Find My iPhone.
10. If your iPhone is stolen, it is only going to transmit its location for as long as a SIM card is inserted and is active.
Saturday, November 10, 2012
Friday, November 9, 2012
Government Strength Mobile Spyware
In the secretive world of surveillance technology, he goes just by his initials: MJM. His mystique is such that other security professionals avoid using wireless Internet near him...
MJM -- Martin J. Muench -- is the developer of Andover, U.K.-based Gamma Group’s FinFisher intrusion software, which he sells to police and spy agencies around the world for monitoring computers and smartphones to intercept Skype calls, peer through Web cameras and record keystrokes...
Of Gamma’s products, FinFisher has become the flashpoint. It represents the leading edge of a largely unregulated trade in cybertools that is transforming surveillance, making it more intrusive as it reaches across borders and spies into peoples’ digital devices, whether in their living rooms or back pockets...
...researchers including Claudio Guarnieri of Boston-based security risk-assessment company Rapid7; Bill Marczak, a computer science doctoral candidate at the University of California Berkeley; and Marquis-Boire, whose day job is working as a security engineer at Google Inc., found computers that appeared to be command servers for FinSpy in at least 15 countries.
They also documented FinSpy’s ability to take over mobile phones -- turning on microphones, tracking locations and monitoring e-mails...
On Oct. 12, U.S. law enforcement officials warned smartphone users to protect themselves against FinFisher, calling it malware, or malicious software.
“FinFisher is a spyware capable of taking over the components of a mobile device,” the Internet Crime Complaint Center, a partnership between the Federal Bureau of Investigation and National White Collar Crime Center, said in a Website alert to the public. “FinFisher can be easily transmitted to a Smartphone when the user visits a specific web link or opens a text message masquerading as a system update.”
FinSpy Mobile can infect almost every kind of device, including Apple Inc.’s iPhones and smartphones running Google’s Android or Microsoft Corp.’s Windows systems, according to a pamphlet Muench provides. (more)
MJM -- Martin J. Muench -- is the developer of Andover, U.K.-based Gamma Group’s FinFisher intrusion software, which he sells to police and spy agencies around the world for monitoring computers and smartphones to intercept Skype calls, peer through Web cameras and record keystrokes...
Of Gamma’s products, FinFisher has become the flashpoint. It represents the leading edge of a largely unregulated trade in cybertools that is transforming surveillance, making it more intrusive as it reaches across borders and spies into peoples’ digital devices, whether in their living rooms or back pockets...
...researchers including Claudio Guarnieri of Boston-based security risk-assessment company Rapid7; Bill Marczak, a computer science doctoral candidate at the University of California Berkeley; and Marquis-Boire, whose day job is working as a security engineer at Google Inc., found computers that appeared to be command servers for FinSpy in at least 15 countries.
They also documented FinSpy’s ability to take over mobile phones -- turning on microphones, tracking locations and monitoring e-mails...
On Oct. 12, U.S. law enforcement officials warned smartphone users to protect themselves against FinFisher, calling it malware, or malicious software.
“FinFisher is a spyware capable of taking over the components of a mobile device,” the Internet Crime Complaint Center, a partnership between the Federal Bureau of Investigation and National White Collar Crime Center, said in a Website alert to the public. “FinFisher can be easily transmitted to a Smartphone when the user visits a specific web link or opens a text message masquerading as a system update.”
FinSpy Mobile can infect almost every kind of device, including Apple Inc.’s iPhones and smartphones running Google’s Android or Microsoft Corp.’s Windows systems, according to a pamphlet Muench provides. (more)
Thursday, November 8, 2012
Meet the Superheroes Fighting for Your Right to Mobile Privacy
Five years into the smartphone era, the threats to user privacy have never been higher.
The complex and mostly unregulated privacy concerns of the mobile ecosystem have driven many users to take their privacy into their own hands, whether that means deleting apps that ask for too much information or turning off location services.
However, the fight over mobile privacy is just really starting to take shape. We wanted to get a beat on where that fight is now, and about what – if truly anything – privacy advocates think will change the future of mobile towards a more user controlled experience... (more)
The complex and mostly unregulated privacy concerns of the mobile ecosystem have driven many users to take their privacy into their own hands, whether that means deleting apps that ask for too much information or turning off location services.
However, the fight over mobile privacy is just really starting to take shape. We wanted to get a beat on where that fight is now, and about what – if truly anything – privacy advocates think will change the future of mobile towards a more user controlled experience... (more)
Labels:
App,
cell phone,
FutureWatch,
law,
privacy,
spyware,
statistics,
tracking
A Salute to Our Native American Code Talkers
George Smith, one of the Navajo code talkers who helped the U.S. military outfox the Japanese during World War II by sending messages in their obscure language, has died, the president of the Navajo Nation said.
"This news has saddened me," Ben Shelly, the Navajo president, said in a post Wednesday on his Facebook page. "Our Navajo code talkers have been real life heroes to generations of Navajo people."
Smith died Tuesday, Shelly said, and the Navajo Nation's flag is flying at half-staff until Sunday night to commemorate his life.
Several hundred Navajo tribe members served as code talkers for the United States during World War II, using a military communications code based on the Navajo language. They sent messages back and forth from the front lines of fighting, relaying crucial information during pivotal battles like Iwo Jima.
Military authorities chose Navajo as a code language because it was almost impossible for a non-Navajo to learn and had no written form. It was the only code the Japanese never managed to crack.
The Navajo code talkers participated in every assault the U.S. Marines carried out in the Pacific between 1942 and 1945.
The code talkers themselves were forbidden from telling anyone about the code -- not their fellow Marines, not their families -- until it was declassified in 1968.
Now in their 80s and 90s, only a handful of code talkers remain. (more)
"This news has saddened me," Ben Shelly, the Navajo president, said in a post Wednesday on his Facebook page. "Our Navajo code talkers have been real life heroes to generations of Navajo people."
Smith died Tuesday, Shelly said, and the Navajo Nation's flag is flying at half-staff until Sunday night to commemorate his life.
Several hundred Navajo tribe members served as code talkers for the United States during World War II, using a military communications code based on the Navajo language. They sent messages back and forth from the front lines of fighting, relaying crucial information during pivotal battles like Iwo Jima.
Military authorities chose Navajo as a code language because it was almost impossible for a non-Navajo to learn and had no written form. It was the only code the Japanese never managed to crack.
The Navajo code talkers participated in every assault the U.S. Marines carried out in the Pacific between 1942 and 1945.
The code talkers themselves were forbidden from telling anyone about the code -- not their fellow Marines, not their families -- until it was declassified in 1968.
Now in their 80s and 90s, only a handful of code talkers remain. (more)
Security Quote of the Day
"Protecting classified information depends, today more than ever, on the security awareness of employees. They can literally make or break your security program." NSI, Security NewsWatch
How to Surf the Web in Secret
via Brad Chacos...
They say no one can hear you scream in space, but if you so much as whisper on the Web, you can be tracked by a dozen different organizations and recorded for posterity.

Not everyone likes the idea of having his or her entire digital lives scraped, analyzed and (in countries with restrictive regimes) controlled outright by third parties.
So please consider the following tools and tips, which will hide your IP address and have you surfing the web in blissful anonymity in no time. (more)
Checklist...
• Use a second web browser.
• Set it to anonymous / private mode.
• Have it wipe all cookies when closed.
• Use a web-based proxy. (Proxify, Anonymouse, Hide My Ass, or one from Proxy.org)
• Better... Use a virtual private network (VPN) like The Onion Router (aka TOR).
• Send your email anonymously via Anonymouse or Hide My Ass.
Labels:
advice,
computer,
email,
encryption,
Internet,
privacy,
spy school,
tracking
Monday, October 29, 2012
Seeing Through Shower Curtains and Other Light Scattering Materials
via Gizmodo.com...
Taking a shower while secure in the knowledge that no one can see through the curtains may soon be a thing of the past. Researchers Ori Katz, Eran Small and Yaron Silberberg of the Weizmann Institute of Science, Rehovot, Israel, have developed a method for de-scattering light to form coherent images in real time.
In other words, they have found a way to look through shower curtains, frosted glass and other image-blurring materials. The technique may one day aid scientists in seeing through living tissue or around corners. (more)
Thursday, October 25, 2012
Maltego - For the PI and Security Director of the Future
via techhive.com...
What Maltego does is quickly and succinctly draws on public data sources to put together a graphical digital footprint...
Maltego is highly efficient at quickly assembling digital crumbs and linking those pieces together, which would be tedious work otherwise.
Roelof Temmingh (co-creator) used Maltego to search Twitter with coordinates for the vicinity of the NSA's parking lot...
Temmingh pulled up a web of scattered tweets in Maltego. He picked out one person...
Then Maltego combed social networking sites, checking sources such as Facebook, MySpace, and LinkedIn. An identical photo linked the person's Facebook and MySpace page. From there, Maltego spotted more information. After a day of searching, Maltego discovered the person's email address, date of birth, travel history, employment, and education history.
"This is about a day's worth of digging around," Temmingh said. "It's not weeks and weeks."
Other interesting information can come from EXIF (exchangeable image file) data, which is information often embedded in a photograph... (more)
An investigative tool, and vulnerability assessment tool. For cutting-edge PIs, a competitive advantage. For the average security director, a mini FBICIANSA. ~Kevin
What Maltego does is quickly and succinctly draws on public data sources to put together a graphical digital footprint...
![]() |
Click to enlarge. |
Roelof Temmingh (co-creator) used Maltego to search Twitter with coordinates for the vicinity of the NSA's parking lot...
Temmingh pulled up a web of scattered tweets in Maltego. He picked out one person...
Then Maltego combed social networking sites, checking sources such as Facebook, MySpace, and LinkedIn. An identical photo linked the person's Facebook and MySpace page. From there, Maltego spotted more information. After a day of searching, Maltego discovered the person's email address, date of birth, travel history, employment, and education history.
"This is about a day's worth of digging around," Temmingh said. "It's not weeks and weeks."
Other interesting information can come from EXIF (exchangeable image file) data, which is information often embedded in a photograph... (more)
An investigative tool, and vulnerability assessment tool. For cutting-edge PIs, a competitive advantage. For the average security director, a mini FBICIANSA. ~Kevin
Labels:
App,
business,
FutureWatch,
product,
software,
spybot,
Tips,
tracking,
X-Ray Vision
FBI Issues Warning Regarding Android Malware
The FBI's Internet Crime Complaint Center has issued a warning alerting users about malware that targets the Android mobile operating system.

The intelligence note from the IC3 was issued last week, and highlighted on Monday by Apple 2.0. It noted there are various forms of malware out in the wild that attack Android devices.
Two forms of malware cited byt he IC3 are Loozfon, which steals information from users, and FinFisher, which can give nefarious hackers control over a user's device.
Loozfon can lure in victims by promising users a work-at-home opportunity in exchange for sending out an e-mail. Visiting a link in the e-mail will push Loozfon to the user's device, allowing the malware to steal contact details from the device's address book.
The FinFisher spyware highlighted by the IC3 allows for a mobile device to be remotely controlled and monitored from anywhere. FinFisher is installed by simply visiting a Web link or opening a text message that disguises itself as a system update. (more)


Two forms of malware cited byt he IC3 are Loozfon, which steals information from users, and FinFisher, which can give nefarious hackers control over a user's device.
Loozfon can lure in victims by promising users a work-at-home opportunity in exchange for sending out an e-mail. Visiting a link in the e-mail will push Loozfon to the user's device, allowing the malware to steal contact details from the device's address book.
The FinFisher spyware highlighted by the IC3 allows for a mobile device to be remotely controlled and monitored from anywhere. FinFisher is installed by simply visiting a Web link or opening a text message that disguises itself as a system update. (more)
Sunday, October 21, 2012
New Burglar Alarm... not for you, for the burglar.
Criminals no longer need to stake out a home or a business to monitor the inhabitants' comings and goings. Now they can simply pick up wireless signals broadcast by the building's utility meters.
In the US, analogue meters that measure water, gas and electricity consumption are being replaced by automated meter reading (AMR) technology. Nearly a third of the country's meters - more than 40 million - have already been changed. The new time-saving devices broadcast readings by radio every 30 seconds for utility company employees to read as they walk or drive around with a receiver. But they are not the only ones who can tune in, says Ishtiaq Rouf at the University of South Carolina in Columbia, and his colleagues.
The team picked up transmissions from AMR meters - operated by companies that they did not name in their paper - and reverse-engineered the broadcasts to monitor the readings. To do this they needed about $1000 worth of open-source radio equipment and information available through online tutorials. (more)
Bad guy logic leap: When you are not home, you are not using much electricity.
In the US, analogue meters that measure water, gas and electricity consumption are being replaced by automated meter reading (AMR) technology. Nearly a third of the country's meters - more than 40 million - have already been changed. The new time-saving devices broadcast readings by radio every 30 seconds for utility company employees to read as they walk or drive around with a receiver. But they are not the only ones who can tune in, says Ishtiaq Rouf at the University of South Carolina in Columbia, and his colleagues.
The team picked up transmissions from AMR meters - operated by companies that they did not name in their paper - and reverse-engineered the broadcasts to monitor the readings. To do this they needed about $1000 worth of open-source radio equipment and information available through online tutorials. (more)
Bad guy logic leap: When you are not home, you are not using much electricity.
Bike Race Dopes - Another DIY TSCM Failure
via a Blue Blaze Irregular...
On page 218 of the new book, "The Secret Race: Inside the Hidden World of the Tour de France: Doping, Cover-ups, and Winning at All Costs" by Tyler Hamilton and Daniel Coyle, is a description of the TSCM techniques allegedly used by the U.S. Postal Service cycling team against covert audio and video surveillance:
"According to Landis, Postal performed two transfusions to the entire team during the 2004 Tour de France. The first was after the first rest day in a hotel in Limoges. Riders were taken in small groups to a room and told not to speak. For safety, team staffers were stationed at each end of the hallway. To guard against the possibility of hidden cameras, the air conditioner, light switches, smoke detector, and even the toilet were covered with dark plastic and taped off."
Fun Facts:
• Many types of "dark plastic" – garbage bags, for example – do not block near-IR light.
• Many cameras are sensitive to near-IR light.
• Putting dark plastic over camera hiding spots is no guarantee you blinded the camera.
• (more about seeing through black plastic)
~Kevin
On page 218 of the new book, "The Secret Race: Inside the Hidden World of the Tour de France: Doping, Cover-ups, and Winning at All Costs" by Tyler Hamilton and Daniel Coyle, is a description of the TSCM techniques allegedly used by the U.S. Postal Service cycling team against covert audio and video surveillance:
"According to Landis, Postal performed two transfusions to the entire team during the 2004 Tour de France. The first was after the first rest day in a hotel in Limoges. Riders were taken in small groups to a room and told not to speak. For safety, team staffers were stationed at each end of the hallway. To guard against the possibility of hidden cameras, the air conditioner, light switches, smoke detector, and even the toilet were covered with dark plastic and taped off."
Fun Facts:
• Many types of "dark plastic" – garbage bags, for example – do not block near-IR light.
• Many cameras are sensitive to near-IR light.
• Putting dark plastic over camera hiding spots is no guarantee you blinded the camera.
• (more about seeing through black plastic)
~Kevin
$89.99 Wi-Fi Bug You Control With Your iPhone... from anywhere!
"WeMo Baby conveniently
turns your iPad, iPhone, or iPod touch into a baby monitor so you don't
have to carry an extra device to keep in touch with your baby.
It works with your existing Wi-Fi router to wirelessly stream audio from your baby's room to your mobile device." (more)
Why is this scary?
• It will be repackaged into a covert listening device.
• Unlike previous baby-mon mods, this one is digital.
• Its signal hides among legitimate Wi-Fi signals.
• Listen in from anywhere via the Internet.
• Digitally clear audio.
• Pair with a voice activated recorder for "TiVO" spying.
• It can send text messages when it hears audio.
P.S. Although this product hasn't launched yet, Murray Associates has a detection solution ready. ~Kevin
It works with your existing Wi-Fi router to wirelessly stream audio from your baby's room to your mobile device." (more)
Why is this scary?
• It will be repackaged into a covert listening device.
• Unlike previous baby-mon mods, this one is digital.
• Its signal hides among legitimate Wi-Fi signals.
• Listen in from anywhere via the Internet.
• Digitally clear audio.
• Pair with a voice activated recorder for "TiVO" spying.
• It can send text messages when it hears audio.
P.S. Although this product hasn't launched yet, Murray Associates has a detection solution ready. ~Kevin
Labels:
App,
cell phone,
eavesdropping,
FutureWatch,
product,
spybot,
VoIP,
Wi-Fi,
wireless
Common Problem - Technology Outpaces Spies
Australia's domestic spy agency has revealed there have been intelligence failures in recent years because of changing technology.
Speaking exclusively to Radio National's Background Briefing program, Australian Security Intelligence Organisation (ASIO) director-general David Irvine says new ways of communicating electronically are white-anting* his agency's surveillance powers.
"We have had not near misses, we have had misses," he said.
"In recent years there have been instances where devices have been used or devices have been used that we didn't know about, and we have missed information. (more) (Audio: Law expert George Williams talks to PM (PM) )
* - An Australian term for the process of internal erosion of a foundation.

"We have had not near misses, we have had misses," he said.
"In recent years there have been instances where devices have been used or devices have been used that we didn't know about, and we have missed information. (more) (Audio: Law expert George Williams talks to PM (PM) )
* - An Australian term for the process of internal erosion of a foundation.
Saturday, October 20, 2012
Today in Eavesdropping History

Wednesday, October 17, 2012
Chinese Communications Equipment Maker ZTE Cuts Connection with Surveillance Equipment Maker ZTEsec
Chinese telecoms kit maker ZTE has sold its majority stake in ZTE Special Equipment (ZTEsec) – a company that sells surveillance systems.
The under-fire Shenzhen-based firm said in a little-publicized filing with the Hong Kong Stock Exchange at the end of September that it would “dispose of its 68 per cent equity interests” in ZTEsec. (more)
Apparently not in time to impress Congress. (pdf of report)

Apparently not in time to impress Congress. (pdf of report)
Tuesday, October 16, 2012
Silent Circle Has Launched - An Affordable Secure Communications Package
Their opening salvo...
"We want to fight for your right to privacy. We are pushing back against the tide of surveillance. We don’t like oppressive regimes, indiscriminate wiretapping, big brother, data criminals, intellectual property theft, identity thieves or governments that persecute their citizens for saying or writing their opinions." — Silent Circle
Services:
• Silent Phone
• Silent Text (with a self-destructing feature)
• Silent Eyes (video call encryption)
• Silent Mail (coming soon)
All sold together as Silent Suite for $20.00 per month.
Coming Soon...
"Worldwide Secure Communications with the Secure Business Package brings together the entire Silent Circle suite of products. Not only is this an Encrypted Secure Calling Plan – it's also extremely cost effective compared to today's un-secure VoIP calling plans. The average large domestic carrier basic cell phone plan is about $40 a month with low minutes, low data and un-secure calls. With our Secure Business Package you can have peace of mind that you are communicating securely without worrying about your minutes. In today's market, unlimited calling and data plans with the major cell carriers cost over $120 a month – with our Secure Business Package at $49 per month, on top of a basic carrier plan of around $40 per month, is still much cheaper than today's unlimited carrier plans – and it's SECURE."
ENTERPRISE SOLUTIONS
"In today’s highly-connected International business realm, even small to moderate sized businesses have international employees, offices and partners. Silent Circle was developed and designed to help stop the theft of personal and corporate Intellectual Property, to defeat a critical piece of the Bring Your Own Device (BYOD) issue and to provide a true commercial Software-as-a-Service model for secure communications."
FutureWatch: Like the telephone itself, having one is useless, having two useful. Having millions of subscribers makes it an imperative.
If and when this product scales up, will there be any reason to communicate insecurely? Will the word wiretap join the lexicon graveyard along with galoshes, spitoon and fedora? The answer may depend upon two live-wire words... government regulation.
For now, anyway, this is great progress. ~Kevin
"We want to fight for your right to privacy. We are pushing back against the tide of surveillance. We don’t like oppressive regimes, indiscriminate wiretapping, big brother, data criminals, intellectual property theft, identity thieves or governments that persecute their citizens for saying or writing their opinions." — Silent Circle
Services:
• Silent Phone
• Silent Text (with a self-destructing feature)
• Silent Eyes (video call encryption)
• Silent Mail (coming soon)
All sold together as Silent Suite for $20.00 per month.
Coming Soon...
"Worldwide Secure Communications with the Secure Business Package brings together the entire Silent Circle suite of products. Not only is this an Encrypted Secure Calling Plan – it's also extremely cost effective compared to today's un-secure VoIP calling plans. The average large domestic carrier basic cell phone plan is about $40 a month with low minutes, low data and un-secure calls. With our Secure Business Package you can have peace of mind that you are communicating securely without worrying about your minutes. In today's market, unlimited calling and data plans with the major cell carriers cost over $120 a month – with our Secure Business Package at $49 per month, on top of a basic carrier plan of around $40 per month, is still much cheaper than today's unlimited carrier plans – and it's SECURE."
ENTERPRISE SOLUTIONS
"In today’s highly-connected International business realm, even small to moderate sized businesses have international employees, offices and partners. Silent Circle was developed and designed to help stop the theft of personal and corporate Intellectual Property, to defeat a critical piece of the Bring Your Own Device (BYOD) issue and to provide a true commercial Software-as-a-Service model for secure communications."
FutureWatch: Like the telephone itself, having one is useless, having two useful. Having millions of subscribers makes it an imperative.
If and when this product scales up, will there be any reason to communicate insecurely? Will the word wiretap join the lexicon graveyard along with galoshes, spitoon and fedora? The answer may depend upon two live-wire words... government regulation.
For now, anyway, this is great progress. ~Kevin
Monday, October 15, 2012
Future Room Lighting to Double as Light "Wi-Fi"... or eavesdropping device.
VLC transmits data wirelessly using visible light as its medium instead of radio waves... Harold Haas, professor of Mobile Communications at the University of Edinburgh, successfully demonstrated the VLC technology at a TED conference. He streamed a HD video to a screen using a LED light bulb as transmitter.
Haas co-founded PureVLC, a corporate spin-off of the university’s research project, to turn the technology into commercially viable devices. The company is now beta-testing its first product: the Smart Lighting Development Kit (SLDK)...
Because the light changes superfast it is invisible to the human eye and can still function as normal lighting.
A standard Ethernet port connects the ceiling unit to a data network. The unit encodes the data onto the current feeding the LEDs. The desktop unit receives the data, decodes it and transfers it to a laptop or desktop computer. It can also send data to the ceiling unit. (more)
Haas co-founded PureVLC, a corporate spin-off of the university’s research project, to turn the technology into commercially viable devices. The company is now beta-testing its first product: the Smart Lighting Development Kit (SLDK)...
Because the light changes superfast it is invisible to the human eye and can still function as normal lighting.
A standard Ethernet port connects the ceiling unit to a data network. The unit encodes the data onto the current feeding the LEDs. The desktop unit receives the data, decodes it and transfers it to a laptop or desktop computer. It can also send data to the ceiling unit. (more)
Privacy Tip: Turn OFF Advertiser Tracking in iPhone iOS6
In iOS6, tracking for advertisers has been turned ON by default.
The new "features" are called:
In Settings, navigate to General / About / Advertising, then... flip the switch to ON.
This is not listed under Privacy. It is tucked away in an unlikely corner. It is ON by default. And, to turn it OFF, you have to turn it ON. Weird, huh? Smell a rat? ~Kevin
The new "features" are called:
- identifierForAdvertising (IDFA) which is a cross-app/publisher identifier
- identifierForVendor (IDFV) which is a publisher-specific identifier
In Settings, navigate to General / About / Advertising, then... flip the switch to ON.
This is not listed under Privacy. It is tucked away in an unlikely corner. It is ON by default. And, to turn it OFF, you have to turn it ON. Weird, huh? Smell a rat? ~Kevin
Experimental App Sends 3D Photos of Your Office to Spies, Your Home to Burglars*
via MIT Technology Review...
...smartphones are increasingly targeted by malware designed to exploit this newfound power. Examples include software that listens for spoken credit card numbers (Soundminer malware) or uses the on-board accelerometers to monitor credit card details entered as keystrokes (steal keystrokes).
Today Robert Templeman at the Naval Surface Warfare Center in Crane, Indiana, and a few pals at Indiana University reveal an entirely new class of 'visual malware' capable of recording and reconstructing a user's environment in 3D. This then allows the theft of virtual objects such as financial information, data on computer screens and identity-related information. (It even turns of the shutter noise when taking photos.)
Templeman and co call their visual malware PlaceRaider and have created it as an app capable of running in the background of any smartphone using the Android 2.3 operating system. (more)
* Just two scary imagined use for this app.
Want to know more?
We've got their paper right here.
...smartphones are increasingly targeted by malware designed to exploit this newfound power. Examples include software that listens for spoken credit card numbers (Soundminer malware) or uses the on-board accelerometers to monitor credit card details entered as keystrokes (steal keystrokes).
Today Robert Templeman at the Naval Surface Warfare Center in Crane, Indiana, and a few pals at Indiana University reveal an entirely new class of 'visual malware' capable of recording and reconstructing a user's environment in 3D. This then allows the theft of virtual objects such as financial information, data on computer screens and identity-related information. (It even turns of the shutter noise when taking photos.)
Templeman and co call their visual malware PlaceRaider and have created it as an app capable of running in the background of any smartphone using the Android 2.3 operating system. (more)
* Just two scary imagined use for this app.
Want to know more?
We've got their paper right here.
Labels:
App,
cell phone,
espionage,
FutureWatch,
Hack,
malware,
spyware
Friday, October 12, 2012
Losing Face if Book is Thrown at Them
...via seekingalpha.com...
The case was highlighted in an article by Bloomberg titled "Facebook Seeks Dismissal of $15 Billion Privacy Suit". Here is an excerpt of the action:
NATURE OF THE ACTION
1.This class action lawsuit, seeking in excess of $15 billion in damages and injunctive relief brought by, and on behalf of, similarly situated individuals domiciled in the United States who had active Facebook, Inc. accounts from May 27, 2010 through September 26, 2011...
We added the bold type above to highlight who can be part of the "class". We recommend a thorough read of the case to all interested parties to see who may qualify to participate as part of the "class". In our opinion, the legal question posed by this case is potentially more harmful than the other shareholder suits outlined by the Wall Street Journal's article: "Facebook's Next Fight: Suits, and More Suits".
The privacy "wiretapping" lawsuit accuses Facebook of secretly tracking users' Internet activity after they log out of their Facebook accounts. This is done using "cookies" which are activated when a user logs into a Facebook account. These cookies can also be used by hackers in intercepting a user's data which is yet another privacy concern. Facebook has filed a motion to dimiss the suit for lack of establishing a Facebook user's harm. We believe that the value of one's privacy is "priceless". The suit accuses Facebook of violating federal wiretap laws with statutory damages per user of $100 per day per violation, up to $10,000 per user. With over a billion users, let's assume that the court decides that $10,000 is too much to award to each user and asserts the $100 floor per user, this would equate to $100 billion in damages and would wipe out more than all the equity in FB.
While this may seem highly speculative at first blush, according to the Wiretap Act, it's a crime for anyone that is not a party to a communication to be eavesdropping. If a crime in this case is established, Facebook could be ordered to shut down much like Kim Dotcom's Megaupload shutdown which was based on violation of US Copyright laws. In addition, the "wiretapping" lawsuit also charges that Facebook is violating the Stored Communications Act and the Computer Fraud and Abuse Act. Any way you look at this battle, it seems like a high stakes issue for Facebook which is not seriously being weighed by investors.... yet. (more)
The case was highlighted in an article by Bloomberg titled "Facebook Seeks Dismissal of $15 Billion Privacy Suit". Here is an excerpt of the action:
NATURE OF THE ACTION
1.This class action lawsuit, seeking in excess of $15 billion in damages and injunctive relief brought by, and on behalf of, similarly situated individuals domiciled in the United States who had active Facebook, Inc. accounts from May 27, 2010 through September 26, 2011...
We added the bold type above to highlight who can be part of the "class". We recommend a thorough read of the case to all interested parties to see who may qualify to participate as part of the "class". In our opinion, the legal question posed by this case is potentially more harmful than the other shareholder suits outlined by the Wall Street Journal's article: "Facebook's Next Fight: Suits, and More Suits".
The privacy "wiretapping" lawsuit accuses Facebook of secretly tracking users' Internet activity after they log out of their Facebook accounts. This is done using "cookies" which are activated when a user logs into a Facebook account. These cookies can also be used by hackers in intercepting a user's data which is yet another privacy concern. Facebook has filed a motion to dimiss the suit for lack of establishing a Facebook user's harm. We believe that the value of one's privacy is "priceless". The suit accuses Facebook of violating federal wiretap laws with statutory damages per user of $100 per day per violation, up to $10,000 per user. With over a billion users, let's assume that the court decides that $10,000 is too much to award to each user and asserts the $100 floor per user, this would equate to $100 billion in damages and would wipe out more than all the equity in FB.
While this may seem highly speculative at first blush, according to the Wiretap Act, it's a crime for anyone that is not a party to a communication to be eavesdropping. If a crime in this case is established, Facebook could be ordered to shut down much like Kim Dotcom's Megaupload shutdown which was based on violation of US Copyright laws. In addition, the "wiretapping" lawsuit also charges that Facebook is violating the Stored Communications Act and the Computer Fraud and Abuse Act. Any way you look at this battle, it seems like a high stakes issue for Facebook which is not seriously being weighed by investors.... yet. (more)
Thursday, October 11, 2012
He Can Open Your Hotel Room Lock with a Magic Marking Pen
...of course, its no ordinary marker...
Matthew Jakubowski, a security researcher, posted a video on YouTube which shows how anyone can build a pocket-sized device to open the lock on an estimated 4 million hotel rooms.
The magic marking pen exploits an Onity lock vulnerability, used on millions of hotel room doors. (more)
As you can see, card-key door locks can be hacked. But did you know, one can open the internal door privacy latch using nothing more than the plastic 'do not disturb' sign hanging on the outside door handle?!?! (Yes, they can come in while you are in the shower.)
Hotel safes are equally insecure, a paper clip can open some of them, others have commonly known default passcodes. Most also have an Ethernet port which can be hacked, and/or a hidden keyway, which can be picked. All these security loopholes are in addition to the legitimate hotel staff's master keys for opening both doors and safes.
In short, your hotel room is easy pickings when it comes to a concerted espionage attack.
One of our many travel recommendations for our clients is:
• Don't trust hotel security.
• Keep your confidential information with you at all times.
Want to know more?
Become park of our client family.
~Kevin
Matthew Jakubowski, a security researcher, posted a video on YouTube which shows how anyone can build a pocket-sized device to open the lock on an estimated 4 million hotel rooms.
The magic marking pen exploits an Onity lock vulnerability, used on millions of hotel room doors. (more)
As you can see, card-key door locks can be hacked. But did you know, one can open the internal door privacy latch using nothing more than the plastic 'do not disturb' sign hanging on the outside door handle?!?! (Yes, they can come in while you are in the shower.)
Hotel safes are equally insecure, a paper clip can open some of them, others have commonly known default passcodes. Most also have an Ethernet port which can be hacked, and/or a hidden keyway, which can be picked. All these security loopholes are in addition to the legitimate hotel staff's master keys for opening both doors and safes.
In short, your hotel room is easy pickings when it comes to a concerted espionage attack.
One of our many travel recommendations for our clients is:
• Don't trust hotel security.
• Keep your confidential information with you at all times.
Want to know more?
Become park of our client family.
~Kevin
Tuesday, October 9, 2012
Growing Prevalence of Industrial Espionage Threaten Automakers
According to Automotive News, industrial espionage in the United States has been steadily rising in multiple sectors. In fact, the U.S. Immigration and Customs Enforcement Homeland Security Investigations (ICE HSI) have opened 1,212 intellectual property rights cases for the 2011 fiscal year. Compared to 2009, cases have increased by nearly 66 percent.
Given the high-octane environment that is the auto industry, cloak and dagger activities are especially prevalent. In particular, auto giants including GM, Ford and Toyota have endured stolen intellectual property more than most...
Addressing a need to prevent acts of espionage to continue, the Office of the National Counterintelligence Executive declared that countermeasures must be put in place due to the exponentially growing proliferation of smartphones and various mobile devices. (more)
Given the high-octane environment that is the auto industry, cloak and dagger activities are especially prevalent. In particular, auto giants including GM, Ford and Toyota have endured stolen intellectual property more than most...
Addressing a need to prevent acts of espionage to continue, the Office of the National Counterintelligence Executive declared that countermeasures must be put in place due to the exponentially growing proliferation of smartphones and various mobile devices. (more)
Saturday, October 6, 2012
All Quiet in the Chinese Front: We Await the Jury
• The House Intelligence Committee will release a report Monday, following its probe into espionage charges against the two telecommunications-gear makers.
• Also, "60 Minutes" will air its investigation into the company on Sunday.
The House Intelligence Committee investigating national security threats posed by two Chinese telecommunications-gear makers is set to release a report Monday that seems likely to ratchet up pressure.
The committee held a three-hour hearing last month, during which lawmakers repeatedly criticized Huawei and ZTE for being vague in answering questions about whether their networking equipment could be used to snoop on American companies and individuals. At the end of the hearing, committee Chairman Mike Rogers (R-Mich.) expressed some consternation that the companies hadn't been more forthcoming in addressing his concerns. (more)
Sneak Peak... (excellent clip from Chairman Mike Rogers (R-Mich.)
• Also, "60 Minutes" will air its investigation into the company on Sunday.
The House Intelligence Committee investigating national security threats posed by two Chinese telecommunications-gear makers is set to release a report Monday that seems likely to ratchet up pressure.
The committee held a three-hour hearing last month, during which lawmakers repeatedly criticized Huawei and ZTE for being vague in answering questions about whether their networking equipment could be used to snoop on American companies and individuals. At the end of the hearing, committee Chairman Mike Rogers (R-Mich.) expressed some consternation that the companies hadn't been more forthcoming in addressing his concerns. (more)
Sneak Peak... (excellent clip from Chairman Mike Rogers (R-Mich.)
All Quiet in the Russian Front: Stop Light Company Stopped
TX - If their website is any indication, Arc Electronics was apparently into a lot of things besides spying.
Sure, espionage is exciting and interesting and all, but bills have got to be paid. Those traffic lights aren't going to construct themselves -- though Arc sure as hell weren't selling anything to the city...
Federal court hearings regarding Arc's alleged spying begin today before U.S. District Judge George Hanks.
The charges involve illegally sending microelectronics to the Russian government, Russian military, and intelligence agencies. But while all that was allegedly going down, Alexander Fishenko, the company's owner, had a rather elaborate faux operation humming at a nondescript strip mall in southwest Houston.
Alex James, a receptionist at neighboring Modern Performance, said he never saw anyone coming in and out of their mutual alley and had no idea what was happening inside Arc Electronic. (more)
Sure, espionage is exciting and interesting and all, but bills have got to be paid. Those traffic lights aren't going to construct themselves -- though Arc sure as hell weren't selling anything to the city...
Federal court hearings regarding Arc's alleged spying begin today before U.S. District Judge George Hanks.
The charges involve illegally sending microelectronics to the Russian government, Russian military, and intelligence agencies. But while all that was allegedly going down, Alexander Fishenko, the company's owner, had a rather elaborate faux operation humming at a nondescript strip mall in southwest Houston.
Alex James, a receptionist at neighboring Modern Performance, said he never saw anyone coming in and out of their mutual alley and had no idea what was happening inside Arc Electronic. (more)
Facebook Logic - What harm can a little spying do?
A federal court in May 2012 hit Facebook with a $15 billion lawsuit after it was found that the social network was tracking customers after they logged out of its system. The court filing claims that Facebook is violating federal wiretap laws.
The Menlo Park company is now asking that the case be dismissed because the defendants behind the case have failed to specify how they were harmed by the error in Facebook’s judgement. (more)
The Menlo Park company is now asking that the case be dismissed because the defendants behind the case have failed to specify how they were harmed by the error in Facebook’s judgement. (more)
Labels:
App,
computer,
lawsuit,
mores,
privacy,
software,
spyware,
surveillance,
tracking,
wiretapping
Spy Gear & Divorce
Techniques once accessible only to governments or corporations are now trickling down to daily use. It's part of a broader transformation of modern privacy in which even the most personal spheres of people's lives—home, friendships, intimacy—can be exposed for examination without knowledge or consent. Lawyers say the technology is turning divorces into an arms race...
Amateur spies have widening options. LandAirSea sells a GPS Tracking Key—a matchbox-size, magnetized gizmo that can stick to cars—for $179 online... Software can be purchased for many smartphones that can track their location. Computer software that copies instant messages and emails can cost less than $100 and be installed without any special know-how. An array of tiny recorders makes eavesdropping easy.
Regulators have a tough time policing the sale of these kinds of devices, since they have legitimate uses by employers or parents... (more)
![]() |
World's smallest voice recorder. Holds 300 hrs. of voice. How it's made. |
Regulators have a tough time policing the sale of these kinds of devices, since they have legitimate uses by employers or parents... (more)
Workplace SpyCams: The Accounting Firm
WI - The reported vice president of a Wisconsin accounting firm was charged with four felonies for allegedly using a camera pen to spy on women in the office restroom.
Last month, a woman working in an office building in the Milwaukee suburb of Glendale went to the bathroom and noticed a pen slide under the door, according to the criminal complaint and reported by the Menomonee Falls Patch. Suspecting that the pen was a camera, the woman looked online and spotted a camera pen for sale that looked similar. She then contacted the Glendale police.
A week later, another woman allegedly saw the same pen slide under the bathroom door. She likewise reported the incident to police, and the officers checked hidden cameras that they had set up outside the bathroom. According to the complaint, the cameras showed James Pirc, 46, sliding something under the door. (more)
Security Directors: FREE Security White Paper - "Surreptitious Workplace Recording ...and what you can do about it."
![]() |
Click to enlarge. |
A week later, another woman allegedly saw the same pen slide under the bathroom door. She likewise reported the incident to police, and the officers checked hidden cameras that they had set up outside the bathroom. According to the complaint, the cameras showed James Pirc, 46, sliding something under the door. (more)
Security Directors: FREE Security White Paper - "Surreptitious Workplace Recording ...and what you can do about it."
Sunday, September 30, 2012
SpyCam Story #663 - This Month In SpyCam News
SpyCam stories have
become commonplace and the techniques used, repetitive. We continue to
keep lose track of the subject for statistical purposes, but won't bore
you with too many details. Links supplied.
Charges Laid...
UK - Lusted - Ex-council member charged - leisure centres, holiday camp and dance studio.
The Tanning Guys...
School Daze...
Charges Laid...
LA - Gynecologist charged - secretly photographedthe genitals of his patients... 186 times
Only You Can Pervert...
Darwin Awards to...
The Tanning Guys...
(Arkansas and tanning salon pervs. Weird.)
Canada Recruits Spies - via YouTube
The Canadian Security Intelligence Service has released a series of recruitment videos onto YouTube, videos that feature testimonials from real-life spies.
The clips were posted last week, but released without any publicity...
In the clips, each of which lasts a minute or two, CSIS intelligence officers are shown striding purposefully to urgent (but fictional) assignments, as orchestral music plays and time-lapse video speeds up street scenes. (more) (videos)
The clips were posted last week, but released without any publicity...
In the clips, each of which lasts a minute or two, CSIS intelligence officers are shown striding purposefully to urgent (but fictional) assignments, as orchestral music plays and time-lapse video speeds up street scenes. (more) (videos)
Put a GPS in a Candy Bar - Sales Skyrocket
The candy company launched the “We Will Find You” campaign in the United Kingdom where GPS tracking devices were placed inside six candy bars.
Once the winning candy bar wrapper is opened, the tracking device will go off and Nestle officials will be able to find the exact location of the customer.
“This will alert a secret control room who will scramble a crack team of highly trained individuals,” the commercial states. “They will board a helicopter, find the special bar and give the owner 10,000 pounds ($16,145).”
The six tracking devices will be placed in Kit-Kat, Aero and Yorkie bars in the U.K. (more)
What could possibly go wrong? Hummm... The guys in the warehouse borrow the guard's metal detector and scan pallet-loads of product.
Seriously, if they have their act together, the bars are not going through the usual distribution chain. They are being placed on the shelf at the very last minute and the camera crew is waiting in the stock room. Brilliant promotion, however.
Once the winning candy bar wrapper is opened, the tracking device will go off and Nestle officials will be able to find the exact location of the customer.
“This will alert a secret control room who will scramble a crack team of highly trained individuals,” the commercial states. “They will board a helicopter, find the special bar and give the owner 10,000 pounds ($16,145).”
The six tracking devices will be placed in Kit-Kat, Aero and Yorkie bars in the U.K. (more)
What could possibly go wrong? Hummm... The guys in the warehouse borrow the guard's metal detector and scan pallet-loads of product.
Seriously, if they have their act together, the bars are not going through the usual distribution chain. They are being placed on the shelf at the very last minute and the camera crew is waiting in the stock room. Brilliant promotion, however.
Labels:
business,
contest,
fun,
FutureWatch,
GPS,
marketing,
miscellaneous,
product,
tracking,
weird
Saturday, September 29, 2012
Business Espionage: Papal Butler's Trial Begins
The pope's once-trusted butler went on trial Saturday for allegedly
stealing papal documents and passing them off to a journalist in the
worst security breach of the Vatican's recent history — a case that
embarrassed the Vatican and may shed some light on the discreet,
internal workings of the papal household...
Security was relaxed, with the guards at the tribunal entrance mostly concerned that none of the press or public brought in any recording devices: They even checked pens to make sure they couldn't record, and sequestered cell phones into safe boxes. (more)
Security was relaxed, with the guards at the tribunal entrance mostly concerned that none of the press or public brought in any recording devices: They even checked pens to make sure they couldn't record, and sequestered cell phones into safe boxes. (more)
Friday, September 28, 2012
Mobile malware up 2,180% - Threats to mobile devices rocket and set to rise further.
Between Q1 2011 and Q2 2012 ABI Research found that unique malware variants grew by 2,180 percent reaching 17,439.
And these threats are set to increase significantly.
"With the increasing popularity of smartphones, mobile threats are on the rise. This has implications for security at the corporate level as well as for individual privacy," says Michela Menting, senior cyber security analyst.
"The mobile application security market is rife with vendors offering their wares. The priority now for end-users is understanding the issue at hand and finding the right offering that best suits their needs," said Menting. (more) (SpyWarn)
And these threats are set to increase significantly.
"With the increasing popularity of smartphones, mobile threats are on the rise. This has implications for security at the corporate level as well as for individual privacy," says Michela Menting, senior cyber security analyst.
"The mobile application security market is rife with vendors offering their wares. The priority now for end-users is understanding the issue at hand and finding the right offering that best suits their needs," said Menting. (more) (SpyWarn)
Labels:
advice,
App,
cautionary tale,
cell phone,
FutureWatch,
GSM,
Hack,
malware,
software,
statistics,
telephone
Lawsuit: Failure to Proactively Prevent Spying
A coffee shop staged a failed cover-up after a lawyer planted spy cameras in its restrooms, a class of customers claim in court.
Lead plaintiff Roderick Smith says he discovered a spy camera in the restroom of a Coffee Bean and Tea Leaf in Encino last year, and that personal injury attorney Mark Daniel Wenzel planted another camera a week later.
Corporate owner International Coffee & Tea LLC failed to "proactively prevent" this spying, according to the complaint in Superior Court...
Detectives allegedly identified Wenzel as the culprit because the spy cam's own footage captured him during the installation process.
"The police sent pictures of defendant Wenzel to all the Coffee Bean shops in the area, and weeks later, in or about November of 2011, defendant Wenzel was apprehended by the police on a visit to the Coffee Bean located at the intersection of Woodley and Ventura at 16101 Ventura Boulevard in Encino, California, where another hidden recording device was also uncovered," the complaint says.
Meanwhile Coffee Bean superiors allegedly told staff to keep the incident to themselves. (more)
Dedicated spycam'ers plant multiple devices — in this case, at least three before the case was solved.
All businesses need to "proactively prevent spying" (especially optical spying). Schools, country clubs and companies dealing with the public use our services on a regular basis. Contact us.
Proactive inspections are cheap insurance. Inaction leads to lawsuits and lost customer goodwill.
Lead plaintiff Roderick Smith says he discovered a spy camera in the restroom of a Coffee Bean and Tea Leaf in Encino last year, and that personal injury attorney Mark Daniel Wenzel planted another camera a week later.
Corporate owner International Coffee & Tea LLC failed to "proactively prevent" this spying, according to the complaint in Superior Court...
Detectives allegedly identified Wenzel as the culprit because the spy cam's own footage captured him during the installation process.
"The police sent pictures of defendant Wenzel to all the Coffee Bean shops in the area, and weeks later, in or about November of 2011, defendant Wenzel was apprehended by the police on a visit to the Coffee Bean located at the intersection of Woodley and Ventura at 16101 Ventura Boulevard in Encino, California, where another hidden recording device was also uncovered," the complaint says.
Meanwhile Coffee Bean superiors allegedly told staff to keep the incident to themselves. (more)
Dedicated spycam'ers plant multiple devices — in this case, at least three before the case was solved.
All businesses need to "proactively prevent spying" (especially optical spying). Schools, country clubs and companies dealing with the public use our services on a regular basis. Contact us.
Proactive inspections are cheap insurance. Inaction leads to lawsuits and lost customer goodwill.
U.S. Government Surveillance Stats - Up 361%, 2009-2011
U.S. law enforcement surveillance of email and other Internet communication has skyrocketed in the last two years, according to data obtained by the American Civil Liberties Union...
The number of so-called pen register and trap-and-trace orders obtained by federal law enforcement agencies has increased 361 percent between 2009 and 2011, the ACLU said. The U.S. Department of Justice released the data to the ACLU after the civil rights group sued the agency under the Freedom of Information Act. (more)
![]() |
Early Pen Register |
Outrageous - Anyone else would have landed in prison.
Companies agree to stop spying, taking secret photos on rented home computers
The US Federal Trade Commission has reached a settlement with seven computer rental companies and a software firm over what the agency said was flagrant computer spying on customers of the rental stores.
In a statement Wednesday, the FTC said that DesignerWare LLC and seven rent-to-own computer stores agreed to cease using malware-like monitoring software to track rental PCs and from using information gathered by the spying software for debt collection purposes.
According to the FTC, the software captured screenshots of confidential and personal information, logged users' keystrokes, and in some cases took "webcam pictures of people in their homes, all without notice to, or consent from, the consumers."
The settlement stems from what an FTC complaint (PDF link) says was a years-long campaign of electronic spying by PC rent-to-own firms against customers using PC Rental Agent, a remote monitoring application made and marketed by DesignerWare that can disable or remotely wipe a rented computer, but also monitored a user’s online activity and physical location using a feature called "Detective Mode." (more) (sing-a-long)
P.S. It also presented a fake software program registration screen that tricked consumers into providing their personal contact information.
The US Federal Trade Commission has reached a settlement with seven computer rental companies and a software firm over what the agency said was flagrant computer spying on customers of the rental stores.
In a statement Wednesday, the FTC said that DesignerWare LLC and seven rent-to-own computer stores agreed to cease using malware-like monitoring software to track rental PCs and from using information gathered by the spying software for debt collection purposes.
According to the FTC, the software captured screenshots of confidential and personal information, logged users' keystrokes, and in some cases took "webcam pictures of people in their homes, all without notice to, or consent from, the consumers."
The settlement stems from what an FTC complaint (PDF link) says was a years-long campaign of electronic spying by PC rent-to-own firms against customers using PC Rental Agent, a remote monitoring application made and marketed by DesignerWare that can disable or remotely wipe a rented computer, but also monitored a user’s online activity and physical location using a feature called "Detective Mode." (more) (sing-a-long)
P.S. It also presented a fake software program registration screen that tricked consumers into providing their personal contact information.
Forensically Find Fake Photos Fast - Further Discussion
As most readers of the Security Scrapbook know, I do not sell products, nor do I profit in any way from items brought to your attention. The sole purpose when mentioning a product is to inform and educate. Sometimes, my readers provide additional insights and information. This helps all of us.
The other day I posted, "Fourandsix Technologies, Inc. has introduced their first product, FourMatch, which instantly distinguishes unmodified digital camera files from those that may have been edited." Wow! Cool stuff. Gimme, gimme.
Reality Check...
While this statement is technically accurate, one reader cautions that the company's other marketing information may lead one to expectations the product can not fulfill.
Read the review by Jim Hoerricks, and the response by Kevin Connor of Fourandsix Technologies, Inc.. Their discussion is very useful and illuminating, especially if you are in need of this technology.
P.S. The answer to the last "What's wrong with this picture?" (Rolling Stones album cover) is... "Former Rolling Stones’ bassist Bill Wyman was digitally removed from the cover..."
Next up...
The other day I posted, "Fourandsix Technologies, Inc. has introduced their first product, FourMatch, which instantly distinguishes unmodified digital camera files from those that may have been edited." Wow! Cool stuff. Gimme, gimme.
Reality Check...
While this statement is technically accurate, one reader cautions that the company's other marketing information may lead one to expectations the product can not fulfill.
Read the review by Jim Hoerricks, and the response by Kevin Connor of Fourandsix Technologies, Inc.. Their discussion is very useful and illuminating, especially if you are in need of this technology.
P.S. The answer to the last "What's wrong with this picture?" (Rolling Stones album cover) is... "Former Rolling Stones’ bassist Bill Wyman was digitally removed from the cover..."
Next up...
![]() |
What's wrong with this picture? |
Wednesday, September 26, 2012
(Off topic) The Jetsons Turn 50 - What Became Reality?
FutureWatch
It's hard to believe, but George Jetson, his boy Elroy, daughter Judy, Jane, his wife -- and Astro, everyone's favorite space dog -- are now 50 years old.
The show was futuristic in its own right: When it bowed in the early 60's, it was the first color show to ever air on ABC. But it was the quirky technological advances that the Hanna Barbera show imagined human beings using -- from robot maids to flying cars -- that really formed the backdrop of the show and kept viewers interested.
In honor of The Jetsons' 50th anniversary, we decided to take a look to see how far we've come. And based on where we are so far, by 2062, the year the show is set in, we may just achieve all that the show's writers envisioned and then some. One thing that's massively important to us today and wasn't reflected that way on the show is our powerful mobile phone technology and the importance to us of how small those devices have become, as well as what they permit -- constant access to the internet (not conceived back then) and a variety of useful apps. (more)
It's hard to believe, but George Jetson, his boy Elroy, daughter Judy, Jane, his wife -- and Astro, everyone's favorite space dog -- are now 50 years old.
The show was futuristic in its own right: When it bowed in the early 60's, it was the first color show to ever air on ABC. But it was the quirky technological advances that the Hanna Barbera show imagined human beings using -- from robot maids to flying cars -- that really formed the backdrop of the show and kept viewers interested.
In honor of The Jetsons' 50th anniversary, we decided to take a look to see how far we've come. And based on where we are so far, by 2062, the year the show is set in, we may just achieve all that the show's writers envisioned and then some. One thing that's massively important to us today and wasn't reflected that way on the show is our powerful mobile phone technology and the importance to us of how small those devices have become, as well as what they permit -- constant access to the internet (not conceived back then) and a variety of useful apps. (more)
Forensically Find Fake Photos Fast
Fourandsix Technologies, Inc. has introduced their first product, FourMatch, which instantly distinguishes unmodified digital camera files from those that may have been edited.
Fourandsix Technologies was co-founded last year by Kevin Connor, a 15-year veteran of the Adobe Photoshop team, and Hany Farid, a pioneering scientist in image forensics. Dr. Farid’s extensive research led to the development of FourMatch software, which provides compelling evidence for the authenticity of an image, while also serving as an efficient triage step for identifying photos that may require closer scrutiny.
...Increasingly, photographic evidence has been challenged in court as being unreliable. Similarly, media companies have faced embarrassment when running news photos that later were revealed to be falsified. (more)
Really interesting... Their Photo Tampering throughout History page.
Example...
Fourandsix Technologies was co-founded last year by Kevin Connor, a 15-year veteran of the Adobe Photoshop team, and Hany Farid, a pioneering scientist in image forensics. Dr. Farid’s extensive research led to the development of FourMatch software, which provides compelling evidence for the authenticity of an image, while also serving as an efficient triage step for identifying photos that may require closer scrutiny.
...Increasingly, photographic evidence has been challenged in court as being unreliable. Similarly, media companies have faced embarrassment when running news photos that later were revealed to be falsified. (more)
Really interesting... Their Photo Tampering throughout History page.
Example...
![]() |
What's wrong with this picture? |
Labels:
App,
art,
detection,
FutureWatch,
Hack,
miscellaneous,
steganography
Subscribe to:
Posts (Atom)