There would be a rustle of oily black feathers as a raven settled on the window ledge of a once-grand apartment building in some Eastern European capital. The bird would pace across the ledge a few times but quickly depart. In an apartment on the other side of the window, no one would shift his attention from the briefing papers or the chilled vodka set out on a table. Nor would anything seem amiss in the jagged piece of gray slate resting on the ledge, seemingly jetsam from the roof of an old and unloved building.
Those in the apartment might be dismayed to learn, however, that the slate had come not from the roof but from a technical laboratory at CIA headquarters in Langley, Virginia. In a small cavity at the slate’s center was an electronic transmitter powerful enough to pick up their conversation. The raven that transported it to the ledge was no random city bird, but a U.S.-trained intelligence asset.
Half a world away from the murk of the cold war, it would be a typical day at the I.Q. Zoo, one of the touristic palaces that dotted the streets of Hot Springs, Arkansas, in the 1960s. With their vacationing parents inca tow, children would squeal as they watched chickens play baseball, macaws ride bicycles, ducks drumming and pigs pawing at pianos. You would find much the same in any number of mom-and-pop theme parks or on television variety shows of the era. But chances are that if an animal had been trained to do something whimsically human, the animal—or the technique—came from Hot Springs.
Two scenes, seemingly disjointed: the John le Carré shadows against the bright midway lights of county-fair Americana. But wars make strange bedfellows, and in one of the most curious, if little-known, stories of the cold war, the people involved in making poultry dance or getting cows to play bingo were also involved in training animals, under government contract, for defense and intelligence work. (more)
Monday, October 14, 2013
Sunday, October 13, 2013
NIST - Not Indelibly Secure & Trustworthy?
The National Institute of Standards and Technology (NIST) has an image problem.
Last month, revelations surfaced indicating that the National Security Agency (NSA) may have planted a vulnerability in a widely used NIST-approved encryption algorithm to facilitate its spying activities. And cryptographers are also questioning subtle changes that might weaken a new security algorithm called Secure Hash Algorithm-3, or SHA-3.
Encryption experts say NIST’s reputation has been seriously undermined but that the security community would like to continue using it as a standards body if it can show that it has reformed. (more)
Last month, revelations surfaced indicating that the National Security Agency (NSA) may have planted a vulnerability in a widely used NIST-approved encryption algorithm to facilitate its spying activities. And cryptographers are also questioning subtle changes that might weaken a new security algorithm called Secure Hash Algorithm-3, or SHA-3.
Encryption experts say NIST’s reputation has been seriously undermined but that the security community would like to continue using it as a standards body if it can show that it has reformed. (more)
Lawsuit Blames Companies for Hiring Voyeur
IN - A Hammond man who was convicted in 2011 of using his cellphone to record a woman in a Kmart changing room had a voyeurism conviction, so the victim is suing him, Kmart and the construction and staffing companies that hired him.
The companies shouldn’t have hired a convicted sex offender to remodel the bathroom, said Randy K. Fleming of Sarkisian, Fleming, Grabarek, Sarkisian.
The suit names Mark Anthony Fetzko, 28, of Hammond, as well as Kmart, Sturzenbecker Construction Company Inc. and Labor Ready Midwest Indiana as defendants. (more)
Blue Light Special - "Attention business owners."
Avoid this type of lawsuit by doing your due diligence.
• Conduct quality background checks before hiring.
• Conduct periodic inspections for planted spycams in all areas where the visiting public and your employees have an expectation of privacy.
The companies shouldn’t have hired a convicted sex offender to remodel the bathroom, said Randy K. Fleming of Sarkisian, Fleming, Grabarek, Sarkisian.
The suit names Mark Anthony Fetzko, 28, of Hammond, as well as Kmart, Sturzenbecker Construction Company Inc. and Labor Ready Midwest Indiana as defendants. (more)
Blue Light Special - "Attention business owners."
Avoid this type of lawsuit by doing your due diligence.
• Conduct quality background checks before hiring.
• Conduct periodic inspections for planted spycams in all areas where the visiting public and your employees have an expectation of privacy.
Saturday, October 12, 2013
One Way Your Android Phone Can Get a Virus
Kevin McNamee stands in front of his laptop on a low stage, a phone in his hand as he scrolls through a program showing his phone’s screen, magnified on a projector screen beside him.
Bits of code start flashing up the screen as he injects command-and-control malware into the command window of the app for Rovio Entertainment Ltd.’s trademark game, Angry Birds – transforming the app into a new version he’s dubbed “Very Angry Birds.”
“And here we go,” he says, frowning down at the screen as he begins to run the new app.
McNamee was presenting at Sector 2013, a conference on all things IT security held in Toronto from Oct. 7 to 9. The director of Kindsight Security Labs at Alcatel-Lucent Canada Inc. in Ottawa, McNamee wanted to show how simple it is to use an Android software development kit to add in malware.
When a user downloads a malware-infested version of the app, he or she is asked to sign off on all kinds of permissions, like access to contact lists, the camera, and so on. If a user carelessly checks off ‘yes’ on all the options, the app is activated with a piece of malware called “Droid Whisper,” and the hacker who wrote it now has access to the phone owner’s contact lists, location, messages, camera, and microphone. That means someone can remotely listen in and record phone conversations, send messages to the phone owner’s contacts, and even take pictures from that phone.
This process can work by injecting malware into basically any Android app by using its application package tool, and it just runs as a service in the background, McNamee said. (more) (presentation)
Bits of code start flashing up the screen as he injects command-and-control malware into the command window of the app for Rovio Entertainment Ltd.’s trademark game, Angry Birds – transforming the app into a new version he’s dubbed “Very Angry Birds.”
“And here we go,” he says, frowning down at the screen as he begins to run the new app.
McNamee was presenting at Sector 2013, a conference on all things IT security held in Toronto from Oct. 7 to 9. The director of Kindsight Security Labs at Alcatel-Lucent Canada Inc. in Ottawa, McNamee wanted to show how simple it is to use an Android software development kit to add in malware.
When a user downloads a malware-infested version of the app, he or she is asked to sign off on all kinds of permissions, like access to contact lists, the camera, and so on. If a user carelessly checks off ‘yes’ on all the options, the app is activated with a piece of malware called “Droid Whisper,” and the hacker who wrote it now has access to the phone owner’s contact lists, location, messages, camera, and microphone. That means someone can remotely listen in and record phone conversations, send messages to the phone owner’s contacts, and even take pictures from that phone.
This process can work by injecting malware into basically any Android app by using its application package tool, and it just runs as a service in the background, McNamee said. (more) (presentation)
George Washington's Top-Secret Spy Ring Coming to Cable TV
VA - Gov. Bob McDonnell says a television series about George Washington's top-secret spy ring will be filmed in central Virginia.
The pilot for the AMC Studios project was shot in the Richmond area earlier this year, and AMC has ordered a 10-episode season that will start on AMC in 2014. McDonnell says the first season of the series will begin filming this fall and be completed in the spring.
The working title for the series is "Turn." It's based on the nonfiction book "Washington's Spies: The Story of America's First Spy Ring," by Alexander Rose. It's about the band of spies who helped Washington win the Revolutionary War. (more)
The pilot for the AMC Studios project was shot in the Richmond area earlier this year, and AMC has ordered a 10-episode season that will start on AMC in 2014. McDonnell says the first season of the series will begin filming this fall and be completed in the spring.
The working title for the series is "Turn." It's based on the nonfiction book "Washington's Spies: The Story of America's First Spy Ring," by Alexander Rose. It's about the band of spies who helped Washington win the Revolutionary War. (more)
Betty Boop, The Muppets & Three Wiretappers Explain NSA Spying
An entertaining short video
about NSA spying v. the 4th Amendment to the Constitution,
as explained in part by...
about NSA spying v. the 4th Amendment to the Constitution,
as explained in part by...
World's Heaviest Non-Electronic Eavesdropping Device
The massive concrete acoustic mirrors, or "listening ears," lining the southeast coast of England were built between the world wars to monitor the skies for the telltale sounds of airborne invasion.
Constructed between 1927 and 1930, the sound mirrors were part of Britain's national defense strategy. Their parabolic shape collected and magnified sound waves in the air over the English Channel and directed them at a microphone positioned just in front of the parabola. Anti-aircraft defenses were then deployed. The mirrors effectively gave Britain a 15-minute warning of an impending attack.
The site features three different reflectors, including a 200-foot-long curved wall, a 30-foot-tall parabolic dish, and a 20-foot-tall shallow dish. All three can be seen in Greatstone, located on the northeast side of the Dungeness Nature Reserve. (more)
Constructed between 1927 and 1930, the sound mirrors were part of Britain's national defense strategy. Their parabolic shape collected and magnified sound waves in the air over the English Channel and directed them at a microphone positioned just in front of the parabola. Anti-aircraft defenses were then deployed. The mirrors effectively gave Britain a 15-minute warning of an impending attack.
The site features three different reflectors, including a 200-foot-long curved wall, a 30-foot-tall parabolic dish, and a 20-foot-tall shallow dish. All three can be seen in Greatstone, located on the northeast side of the Dungeness Nature Reserve. (more)
Thursday, October 10, 2013
Hannah Anderson - Be Careful What You Say Around the Hotel Staff
via allvoices.com...
Was Hannah Anderson (kidnapping victum) heard rehearsing her story for the 'Today' show interview that airs today? According to one Pierre Hotel employee -- who wishes to remain anonymous for very obvious reasons -- she was. The hotel employee reached out to me privately and shared that she had been eavesdropping while Anderson's "newly hired PR person" coached her on what to say to Savannah Guthrie during their interview. To be clear, the anonymous tipster told me that she had witnessed a "very damning prep meeting."
The Pierre Hotel employee continued to say the following... (more)
Was Hannah Anderson (kidnapping victum) heard rehearsing her story for the 'Today' show interview that airs today? According to one Pierre Hotel employee -- who wishes to remain anonymous for very obvious reasons -- she was. The hotel employee reached out to me privately and shared that she had been eavesdropping while Anderson's "newly hired PR person" coached her on what to say to Savannah Guthrie during their interview. To be clear, the anonymous tipster told me that she had witnessed a "very damning prep meeting."
The Pierre Hotel employee continued to say the following... (more)
Attorney & PI -- 75-100 Illegal Bugs and Surveillance Devices
CA - Mary Nolan, a family law attorney in San Ramon, California, pleaded guilty in federal court, to four counts of tax evasion and one count of unlawful interception of communications, announced United States Attorney Melinda Haag.
Nolan, 61, entered guilty pleas to all of the substantive counts in the indictment.... according to the plea agreement, Nolan caused her staff to illegally eavesdrop by accessing a listening device that private investigator Christopher Butler had installed in a vehicle used by “N.F” (a victim). Nolan agreed to resign her bar license and never to practice law again.
Butler, who pleaded guilty to unlawful interception and several other offenses on May 4, 2012, admitted having installed approximately seventy-five to one hundred unlawful listening devices at the request of clients or their attorneys, including the listening device in “N.F.’s” vehicle in August 2007. Butler was sentenced to 60 months’ imprisonment on this charge, to be served concurrently with the 96-month sentence on his other counts of conviction. (more)
Nolan, 61, entered guilty pleas to all of the substantive counts in the indictment.... according to the plea agreement, Nolan caused her staff to illegally eavesdrop by accessing a listening device that private investigator Christopher Butler had installed in a vehicle used by “N.F” (a victim). Nolan agreed to resign her bar license and never to practice law again.
Butler, who pleaded guilty to unlawful interception and several other offenses on May 4, 2012, admitted having installed approximately seventy-five to one hundred unlawful listening devices at the request of clients or their attorneys, including the listening device in “N.F.’s” vehicle in August 2007. Butler was sentenced to 60 months’ imprisonment on this charge, to be served concurrently with the 96-month sentence on his other counts of conviction. (more)
Wednesday, October 9, 2013
International Spy Museum Looking for a New Safe House
The International Spy Museum, one of the most popular private attractions in (Washington, DC), would relocate to the former Carnegie Library in Mount Vernon Square under a plan by D.C. officials.
Events DC, which manages the District’s convention and sports business, announced Monday that it planned to renovate and expand the historic library building by moving the Spy Museum to the museum’s underground space and building a new “sculpted glass pavilion” on the north side of the building that would house a new visitors center, a cafĂ© and the Spy Museum store...
In all, the project would add 58,000 square feet to the property, but the idea requires layers of approval from local and federal stakeholders because of the historic state of the grounds and library building, which was completed in 1903 and served as the city’s central library until 1970. (more)
Carnegie Library |
In all, the project would add 58,000 square feet to the property, but the idea requires layers of approval from local and federal stakeholders because of the historic state of the grounds and library building, which was completed in 1903 and served as the city’s central library until 1970. (more)
... or, say Beetlejuice three times.
Taiwan - Rumors saying that people can verify if their cellphones or landlines are under surveillance by dialing *960*# and *26 are false, telecommunication experts said recently, as the snowballing controversy surrounding the wiretapping of government officials conducted by the Special Investigation Division (SID) of the Supreme Prosecutors’ Office sparked concern among the public that private citizens are also under surveillance. (more) (sing-a-long)
Russia's Herculean Feat - Eavesdrop on All Olympic Communications
Russia is preparing to monitor the communications of athletes and others taking part in the Sochi Winter Olympics at an unprecedented level, according to official documents.
Government tender documents indicate all communications equipment at the Black Sea resort will be tapped, including wi-fi and mobile phone networks, to allow eavesdropping through the Russian SORM (System for Operative Investigative Activities) interception system, The Guardian reported.
Documents seen by Russian journalists Andrei Soldatov and Irinia Borogan point to deep packet inspection (DPI) being used to filter all communications around Sochi, with intelligence agencies being able to sort these, search for keywords and identify and monitor people.
The monitoring plans were discovered on the Russian government Zakupki ("purchases") procurement agency website. By law, all Russian government agencies must buy equipment through Zakupki. This includes the country's intelligence agencies. (more)
Government tender documents indicate all communications equipment at the Black Sea resort will be tapped, including wi-fi and mobile phone networks, to allow eavesdropping through the Russian SORM (System for Operative Investigative Activities) interception system, The Guardian reported.
Documents seen by Russian journalists Andrei Soldatov and Irinia Borogan point to deep packet inspection (DPI) being used to filter all communications around Sochi, with intelligence agencies being able to sort these, search for keywords and identify and monitor people.
The monitoring plans were discovered on the Russian government Zakupki ("purchases") procurement agency website. By law, all Russian government agencies must buy equipment through Zakupki. This includes the country's intelligence agencies. (more)
Hey, kids! Want a smart watch? All right. Who said "house arrest ankle bracelet"?!?!
AT&T announced a new smart device that goes on the wrist today, but it’s not the Galaxy Gear. This is the Filip, a pseudo-smartwatch for kids that parents can use to keep tabs on their offspring with an unparalleled level of accuracy. This device acts as a phone, GPS tracker, and a panic button all in one somewhat awkward package.
The Filip plugs into an iOS or Android app that allows parents to set five trusted numbers that the watch can place calls to. The announcement glosses over the phone call functionality, but it appears to be entirely speakerphone-based. The app is also used to pull locations from the watch in real time, send direct SMS, and set up “Safe Zones.” A Safe Zone is basically a geo-fence that the watch is supposed to stay inside of. If it leaves the Safe Zone, an alert will be pushed to the smartphone app. This is truly helicopter parenting gone high-tech...
There are only two buttons on the Filip, one of which is a big red panic button. When it’s held for three seconds, the device will go into emergency mode and start ambient sound recording. It also sends text messages to all five trusted numbers and places a call to the first number in the list. False alarms will be quite the affair.
AT&T will be the exclusive network provider for the Filip, but no pricing has been announced. The closest thing to a release date is “in the coming months.” (more)
The Filip plugs into an iOS or Android app that allows parents to set five trusted numbers that the watch can place calls to. The announcement glosses over the phone call functionality, but it appears to be entirely speakerphone-based. The app is also used to pull locations from the watch in real time, send direct SMS, and set up “Safe Zones.” A Safe Zone is basically a geo-fence that the watch is supposed to stay inside of. If it leaves the Safe Zone, an alert will be pushed to the smartphone app. This is truly helicopter parenting gone high-tech...
There are only two buttons on the Filip, one of which is a big red panic button. When it’s held for three seconds, the device will go into emergency mode and start ambient sound recording. It also sends text messages to all five trusted numbers and places a call to the first number in the list. False alarms will be quite the affair.
AT&T will be the exclusive network provider for the Filip, but no pricing has been announced. The closest thing to a release date is “in the coming months.” (more)
Tuesday, October 1, 2013
Business Espionage: Eavesdropping Discovery at Nortel - Update
The Department of National Defence will have to decide whether it is still worth the risk to move into the former Nortel campus after the discovery of listening devices at the facility, say security analysts.
The DND is not releasing details about where exactly the electronic eavesdropping devices were found or whether they were left over from an industrial espionage operation when Nortel occupied the complex in Ottawa’s west end.
Nortel was the target of a number of spy and computer hacking operations, with the main culprits suspected of being associated with China.
But security analysts say other listening devices could remain in the sprawling campus at 3500 Carling Ave. The question is whether they can all be found and whether they are still active...
Sources say the bugs are believed to have been planted when Nortel occupied the campus. (more)
The DND is not releasing details about where exactly the electronic eavesdropping devices were found or whether they were left over from an industrial espionage operation when Nortel occupied the complex in Ottawa’s west end.
Nortel was the target of a number of spy and computer hacking operations, with the main culprits suspected of being associated with China.
But security analysts say other listening devices could remain in the sprawling campus at 3500 Carling Ave. The question is whether they can all be found and whether they are still active...
Sources say the bugs are believed to have been planted when Nortel occupied the campus. (more)
12 Detained After Bugging Device Found
After it was revealed in the media on Sept. 17 that two listening devices had been found in the office of the Prime Ministry's Overseas Turks Agency (YTB), police have detained 12 suspects in simultaneous operations in the provinces of Ankara, Ä°stanbul and Ardahan, linked to the investigation, Turkish news agencies reported on Monday.
On Sept. 17, the TĂ¼rkiye daily claimed that two female co-founders and current members of the ruling Justice and Development Party (AK Party) were spying for Iran, reportedly gathering intelligence for Tehran by planting listening devices in the office of the YTB, although the claim was at least partly denied by Deputy Prime Minister Bekir BozdaÄŸ later that day. (more)
On Sept. 17, the TĂ¼rkiye daily claimed that two female co-founders and current members of the ruling Justice and Development Party (AK Party) were spying for Iran, reportedly gathering intelligence for Tehran by planting listening devices in the office of the YTB, although the claim was at least partly denied by Deputy Prime Minister Bekir BozdaÄŸ later that day. (more)
Anti-Eavesdropping Just Became Kinky
What if any object around you could play back sound at the touch of your finger? That is the idea behind Ishin-Denshin, an electronic art project that has just won an honourable mention at the ARS Electronica festival in Linz, Austria.
Ishin-Denshin works by getting the user to whisper a message into a microphone, which encodes the sound and then converts it into an electrical signal which modulates an electrostatic field around the human body. When the charged person touches their finger to another person's earlobe, the field causes it to vibrate slightly, reproducing the sound for the touched person to hear. The name comes from a Japanese expression meaning an unspoken understanding. (more)
Ishin-Denshin works by getting the user to whisper a message into a microphone, which encodes the sound and then converts it into an electrical signal which modulates an electrostatic field around the human body. When the charged person touches their finger to another person's earlobe, the field causes it to vibrate slightly, reproducing the sound for the touched person to hear. The name comes from a Japanese expression meaning an unspoken understanding. (more)
School Principal's DIY Investigation Ends in Wiretapping Conviction
A middle school principal from Fort Worth, Texas, has been found guilty of wire-tapping after she got her daughter to plant a camera in the locker room of another high school.
Wendee Long, 47, had her daughter, who was 17 at the time, hide a recording cell phone to catch the basketball coach from Argyle High School yelling at the team.
Long allegedly planted the device after her two daughters had complained the coach shouted too much.
Her teenage daughter Caydan, who did not face any charges, placed a camera phone inside a locker and pressed record.
It did not capture coach Skip Townsend, 61, saying or doing anything inappropriate during the half-time meeting, authorities told WFAA-TV. Someone anonymously sent the video to the superintendent and several board members and Long turned herself in to authorities. (more)
Wendee Long, 47, had her daughter, who was 17 at the time, hide a recording cell phone to catch the basketball coach from Argyle High School yelling at the team.
Long allegedly planted the device after her two daughters had complained the coach shouted too much.
Her teenage daughter Caydan, who did not face any charges, placed a camera phone inside a locker and pressed record.
It did not capture coach Skip Townsend, 61, saying or doing anything inappropriate during the half-time meeting, authorities told WFAA-TV. Someone anonymously sent the video to the superintendent and several board members and Long turned herself in to authorities. (more)
Monday, September 30, 2013
Business Espionage: Eavesdropping Devices Found at Nortel Complex
Canada - Workers preparing the former Nortel complex as the new home for the Department of National Defence have discovered electronic eavesdropping devices, prompting new fears about the security of the facility.
It’s not clear whether the devices were recently planted or left over from an industrial espionage operation when Nortel occupied the complex...
Recently released DND documents indicate that concerns about the security surrounding the former Nortel campus at 3500 Carling Ave. were raised last year...
Last year it was also revealed that Nortel had been the target of industrial espionage for almost a decade... (more)
Note: Nortel Networks Corporation was once a major data networking and multinational telecommunications company. The company filed for protection from creditors on January 14, 2009 and later shut its doors.
It’s not clear whether the devices were recently planted or left over from an industrial espionage operation when Nortel occupied the complex...
Recently released DND documents indicate that concerns about the security surrounding the former Nortel campus at 3500 Carling Ave. were raised last year...
Last year it was also revealed that Nortel had been the target of industrial espionage for almost a decade... (more)
Note: Nortel Networks Corporation was once a major data networking and multinational telecommunications company. The company filed for protection from creditors on January 14, 2009 and later shut its doors.
Saturday, September 28, 2013
Commercial Espionage Fears Prompts... a conference?!?!
Jamacia - Commercial espionage affecting Jamaican businesses are to be addressed at a two-day conference on Cyber Security and Digital Forensics, to be staged at the University of the West Indies from September 30 to October 1.
Mr. Robinson said he became aware of the level of corporate espionage occurring in Jamaica recently, and the conference will address this concern in a fulsome way.
“We’re not talking about a man hacking into a website and defacing it. We’re talking about criminals doing this for financial gain, or to prove a point. They can hack into a critical national infrastructure and disrupt the country in a significant way; for example your Air Traffic Control system, and you know the damage that can be done,” the State Minister said.
“There are just so many ways someone with a computer can create havoc and we need to be on top of that as a country,” he emphasized. (more)
The "Let's Talk About This" love boat sailed a long time ago. It's time for action. BTW... Corporate espionage via computers is only one hole in your security dike. Be sure your security program handles it all.
Mr. Robinson said he became aware of the level of corporate espionage occurring in Jamaica recently, and the conference will address this concern in a fulsome way.
“We’re not talking about a man hacking into a website and defacing it. We’re talking about criminals doing this for financial gain, or to prove a point. They can hack into a critical national infrastructure and disrupt the country in a significant way; for example your Air Traffic Control system, and you know the damage that can be done,” the State Minister said.
“There are just so many ways someone with a computer can create havoc and we need to be on top of that as a country,” he emphasized. (more)
The "Let's Talk About This" love boat sailed a long time ago. It's time for action. BTW... Corporate espionage via computers is only one hole in your security dike. Be sure your security program handles it all.
Business Espionage - Bra Biz Ops Man Bugged
Michelle Mone's firm bugged director's office amid fears he was about to jump ship to ex-husband's new company, tribunal hears
MICHELLE MONE monitored recordings from a bug in a director’s office amid fears he was about quit for a job work with her ex, her new business partner claimed yesterday.
Eliaz Poleg told an employment tribunal he came up with the idea of bugging Scott Kilday’s plant pot.
Poleg – the chairman of the company formed from the sale of Michelle’s MJM firm – said he made the move as he had “extreme concerns” over Kilday’s loyalty to the troubled bra business.
Kilday now works for Michelle’s ex-husband Michael, who was bought out of MJM two days before the sale to MAS Holdings. Kilday walked out on MJM after finding the bug.
Poleg told the tribunal in Glasgow: “I know there was stuff on it because Michelle said she was listening and replacing the machine tapes. (more)
MICHELLE MONE monitored recordings from a bug in a director’s office amid fears he was about quit for a job work with her ex, her new business partner claimed yesterday.
Eliaz Poleg told an employment tribunal he came up with the idea of bugging Scott Kilday’s plant pot.
Poleg – the chairman of the company formed from the sale of Michelle’s MJM firm – said he made the move as he had “extreme concerns” over Kilday’s loyalty to the troubled bra business.
Kilday now works for Michelle’s ex-husband Michael, who was bought out of MJM two days before the sale to MAS Holdings. Kilday walked out on MJM after finding the bug.
Poleg told the tribunal in Glasgow: “I know there was stuff on it because Michelle said she was listening and replacing the machine tapes. (more)
Friday, September 27, 2013
When Business Espionage Doesn't Work the Next Step is Sabotage
Real News or Business Sabotage? You decide...
The following "news story" was found in Yahoo News. It is filled with anonymous quotes, no proof, no substance, no follow-up with the side being attacked.
“Apple’s new operating system is making me nauseous and giving me a headache - just like when you try to read in the car,” says one user.
Others complain of “vertigo” when apps “zoom” in and out - and say that using iOS 7 devices has left them feeling ill for days.
Apple’s new iOS 7 operating system has been downloaded 200 million times - and some users are complaining that the animations make them seasick - or worse. (more)
To our clients... In addition to your TSCM bug sweeps and our other business espionage reductions, keep an eye out for business sabotage. Document it. Go after it.
The following "news story" was found in Yahoo News. It is filled with anonymous quotes, no proof, no substance, no follow-up with the side being attacked.
“Apple’s new operating system is making me nauseous and giving me a headache - just like when you try to read in the car,” says one user.
Others complain of “vertigo” when apps “zoom” in and out - and say that using iOS 7 devices has left them feeling ill for days.
Apple’s new iOS 7 operating system has been downloaded 200 million times - and some users are complaining that the animations make them seasick - or worse. (more)
To our clients... In addition to your TSCM bug sweeps and our other business espionage reductions, keep an eye out for business sabotage. Document it. Go after it.
Monday, September 23, 2013
Yet Another Good Reason to Conduct TSCM Sweeps
Police have arrested eight men in connection with a £1.3m theft by a gang who remotely took control of the computer system of a Barclays bank branch.
A man posing as an IT engineer gained access to the Swiss Cottage branch in north London on 4 April, fitting a keyboard video mouse (KVM) device, which enabled the gang to remotely transfer funds to bank accounts under its control. (more)
A man posing as an IT engineer gained access to the Swiss Cottage branch in north London on 4 April, fitting a keyboard video mouse (KVM) device, which enabled the gang to remotely transfer funds to bank accounts under its control. (more)
Fingerprint Security Appears Risky on iPhone, and Elsewhere
Reason 1. - iPhone's fingerprint biometrics defeated, hackers claim.
Just one day after the new fingerprint-scanning Apple iPhone-5s was released to the public, hackers claimed to have defeated the new security mechanism. After their announcement on Saturday night, the Chaos Computer Club posted a video on YouTube which appears to show a user defeating Apple’s new TouchID security by using a replicated fingerprint. Apple has not yet commented on this matter, and, as far as I can tell, no third-party agency has publicly validated the video or the hacker group’s claim. In theory, the techniques used should not have defeated the sub-dermal analysis (analyzing three dimensional unique aspects of fingerprints rather than just two-dimensional surface images) that Apple was supposed to have used in its fingerprint scanner. (more)
Reason 2. - Mythbusters.
Reason 3. - When You're Busted.
Police can't compel you to spill your password, but they can compel you to give up your fingerprint.
"Take this hypothetical example coined by the Supreme Court: If the police demand that you give them the key to a lockbox that happens to contain incriminating evidence, turning over the key wouldn’t be testimonial if it’s just a physical act that doesn’t reveal anything you know.
However, if the police try to force you to divulge the combination to a wall safe, your response would reveal the contents of your mind — and so would implicate the Fifth Amendment. (If you’ve written down the combination on a piece of paper and the police demand that you give it to them, that may be a different story.)" (more)
Just one day after the new fingerprint-scanning Apple iPhone-5s was released to the public, hackers claimed to have defeated the new security mechanism. After their announcement on Saturday night, the Chaos Computer Club posted a video on YouTube which appears to show a user defeating Apple’s new TouchID security by using a replicated fingerprint. Apple has not yet commented on this matter, and, as far as I can tell, no third-party agency has publicly validated the video or the hacker group’s claim. In theory, the techniques used should not have defeated the sub-dermal analysis (analyzing three dimensional unique aspects of fingerprints rather than just two-dimensional surface images) that Apple was supposed to have used in its fingerprint scanner. (more)
Reason 2. - Mythbusters.
Reason 3. - When You're Busted.
Police can't compel you to spill your password, but they can compel you to give up your fingerprint.
"Take this hypothetical example coined by the Supreme Court: If the police demand that you give them the key to a lockbox that happens to contain incriminating evidence, turning over the key wouldn’t be testimonial if it’s just a physical act that doesn’t reveal anything you know.
However, if the police try to force you to divulge the combination to a wall safe, your response would reveal the contents of your mind — and so would implicate the Fifth Amendment. (If you’ve written down the combination on a piece of paper and the police demand that you give it to them, that may be a different story.)" (more)
Is Your Cell Phone Talking to Your Carrier, or Behind Your Back to a Rogue?
It's not easy to tell, but very important if you want to have a confidential conversation.
What is a rogue or IMSI catcher?
"An IMSI catcher is essentially a false mobile tower acting between the target mobile phone(s) and the service providers real towers. As such it is considered a Man In the Middle (MITM) attack. It is used as an eavesdropping device used for interception and tracking of cellular phones and usually is undetectable for the users of mobile phones. Such a virtual base transceiver station (VBTS) is a device for identifying the International Mobile Subscriber Identity (IMSI) of a nearby GSM mobile phone and intercepting its calls." (more)
Folks with a Cryptophone know...
"Each week an increasing number of Cryptophone customers are becoming aware of disturbing, yet unfortunately not surprising changes to the cellular network in their area.
This screenshot sent in by a customer shows the Cryptophone 500 alerting them to changes in the mobile network. In this case standard network encryption has been turned off. This is often an indication that a rogue base station or “IMSI Catcher” is active in the area.
While this knowledge would be of great to concern to most people, Cryptophone users can rest easy knowing that even in the presence of an ‘active’ attack’s like this, their communications are still completely secure." (more) (more)
Think the problem is theoretical?
What is a rogue or IMSI catcher?
"An IMSI catcher is essentially a false mobile tower acting between the target mobile phone(s) and the service providers real towers. As such it is considered a Man In the Middle (MITM) attack. It is used as an eavesdropping device used for interception and tracking of cellular phones and usually is undetectable for the users of mobile phones. Such a virtual base transceiver station (VBTS) is a device for identifying the International Mobile Subscriber Identity (IMSI) of a nearby GSM mobile phone and intercepting its calls." (more)
Folks with a Cryptophone know...
"Each week an increasing number of Cryptophone customers are becoming aware of disturbing, yet unfortunately not surprising changes to the cellular network in their area.
This screenshot sent in by a customer shows the Cryptophone 500 alerting them to changes in the mobile network. In this case standard network encryption has been turned off. This is often an indication that a rogue base station or “IMSI Catcher” is active in the area.
While this knowledge would be of great to concern to most people, Cryptophone users can rest easy knowing that even in the presence of an ‘active’ attack’s like this, their communications are still completely secure." (more) (more)
Think the problem is theoretical?
"Recently leaked brochures advertising next generation spy devices give outsiders a glimpse into the high-tech world of government surveillance. And one of the most tantalizing of the must-have gizmos available from a company called GammaGroup is a body-worn device that surreptitiously captures the unique identifier used by cell phones." (more)
"Hacker intercepts phone calls with homebuilt $1,500 IMSI catcher, claims GSM is beyond repair" (more)
"Hacker intercepts phone calls with homebuilt $1,500 IMSI catcher, claims GSM is beyond repair" (more)
"Septier IMSI Catcher (SIC) has been designed as a tactical solution intended to extract GSM entities. Based on the Septier GUARDIAN infrastructure, Septier IMSI
Catcher provides its users with the capability of extracting IMSI and
IMEI of GSM Mobile Stations (MS) that are active in the system's
effective range.
Septier IMSI Catcher is the perfect solution for both extracting
identities from MS in its area of coverage (when these identities are
previously unknown) and detecting the presence of known cell phones in
the area, notifying the system user about those phones. Septier IMSI
Catcher can be equipped with an add-on 3G module that allows identity
extraction for 3G cell phones as well. It has several configurations
that allow meeting the specific requirements of every operation and are
suitable for various working conditions." (more)
Wednesday, September 18, 2013
Ex-Sheriff Pleads Guilty to Wiretapping
WV - Former Clay County Sheriff Miles Slack pleaded guilty Tuesday to a federal charge that he hacked his wife’s work computer.
Slack entered the plea to a wiretapping charge Tuesday in U.S. District Court in Charleston. He faces up to five years in prison. Sentencing was set for Dec. 19.
The government said Slack secretly installed a keystroke logger on a computer in the Clay County Magistrate Court office in April where his wife worked. They were married at the time but have since divorced.
Spyware devices can be purchased online and typically are 1-2 inches long and attached to the keyboard cable. Once installed, they can intercept anything typed on that keyboard. (more)
Slack entered the plea to a wiretapping charge Tuesday in U.S. District Court in Charleston. He faces up to five years in prison. Sentencing was set for Dec. 19.
The government said Slack secretly installed a keystroke logger on a computer in the Clay County Magistrate Court office in April where his wife worked. They were married at the time but have since divorced.
Spyware devices can be purchased online and typically are 1-2 inches long and attached to the keyboard cable. Once installed, they can intercept anything typed on that keyboard. (more)
Tuesday, September 17, 2013
Afraid of Getting a Virus from a Public Recharging Station?
For every scare, there is an inventor with an answer...
via int3.cc...
Have you ever plugged your phone into a strange USB port because you really needed a charge and thought: "Gee who could be stealing my data?." We all have needs and sometimes you just need to charge your phone. "Any port in a storm." as the saying goes. Well now you can be a bit safer. "USB Condoms" prevent accidental data exchange when your device is plugged in to another device with a USB cable. USB Condoms achieve this by cutting off the data pins in the USB cable and allowing only the power pins to connect through.Thus, these "USB Condoms" prevent attacks like "juice jacking".
Use USB-Condoms to:
* Charge your phone on your work computer without worrying...
* Use charging stations in public without worrying...
If you're going to run around plugging your phone into strange USB ports, at least be safe about it. ;-) (more)
via int3.cc...
Have you ever plugged your phone into a strange USB port because you really needed a charge and thought: "Gee who could be stealing my data?." We all have needs and sometimes you just need to charge your phone. "Any port in a storm." as the saying goes. Well now you can be a bit safer. "USB Condoms" prevent accidental data exchange when your device is plugged in to another device with a USB cable. USB Condoms achieve this by cutting off the data pins in the USB cable and allowing only the power pins to connect through.Thus, these "USB Condoms" prevent attacks like "juice jacking".
Use USB-Condoms to:
* Charge your phone on your work computer without worrying...
* Use charging stations in public without worrying...
If you're going to run around plugging your phone into strange USB ports, at least be safe about it. ;-) (more)
New iPhones Are Coming - Learn How to Sanitize Your Old One
Planning on buying a new iPhone?
Whether you trade-in, sell or gift your old one, do this first. Erase all your personal data.
Here's how:
1. Plug your phone into the charger, or make sure you have enough charge to complete the process.
2. Take a moment to back-up the phone. iTunes or iCloud make this easy.
3. Go to SETTINGS > GENERAL > RESET
4. Press ERASE ALL CONTENT AND SETTINGS. Press CONFIRM.
5. (Optional) Press all the other RESETS.
6. Double-check to make sure all your data has gone to the bit-bucket in the sky.
Enjoy your new phone!
Whether you trade-in, sell or gift your old one, do this first. Erase all your personal data.
Here's how:
1. Plug your phone into the charger, or make sure you have enough charge to complete the process.
2. Take a moment to back-up the phone. iTunes or iCloud make this easy.
3. Go to SETTINGS > GENERAL > RESET
4. Press ERASE ALL CONTENT AND SETTINGS. Press CONFIRM.
5. (Optional) Press all the other RESETS.
6. Double-check to make sure all your data has gone to the bit-bucket in the sky.
Enjoy your new phone!
Monday, September 16, 2013
How Law Enforcement Can Watch Tweets in Real-time
BlueJay, the "Law Enforcement Twitter Crime Scanner," provides real-time, geo-fenced access to every single public tweet so that local police can keep tabs on #gunfire, #meth and #protest (yes, those are real examples) in their communities.
BlueJay is the product of BrightPlanet, whose tagline is "Deep Web Intelligence" and whose board is populated with people like Admiral John Poindexter of Total Information Awareness infamy.
BlueJay allows users to enter a set of Twitter accounts, keywords and locations to scan for within 25-mile geofences (BlueJay users can create up to five such fences), then it returns all matching tweets in real-time. If the tweets come with GPS locations, they are plotted on a map. The product can also export databases of up to 100,000 matching tweets at a time. (more)
BlueJay is the product of BrightPlanet, whose tagline is "Deep Web Intelligence" and whose board is populated with people like Admiral John Poindexter of Total Information Awareness infamy.
BlueJay allows users to enter a set of Twitter accounts, keywords and locations to scan for within 25-mile geofences (BlueJay users can create up to five such fences), then it returns all matching tweets in real-time. If the tweets come with GPS locations, they are plotted on a map. The product can also export databases of up to 100,000 matching tweets at a time. (more)
New Mobile Survey Reveals 41% of Employees Are Deliberately Leaking Confidential Data
Congratulations and condolences to the nation’s CIOs for being responsible for data security.
There’s now more job security but now there’s less information security too. Because, according to a new survey from uSamp, 41% of workers used an unsanctioned cloud service for document storage in the last 6 months, despite the fact that 87% of these workers knew their company had policies forbidding such practices.
Welcome to the mobile workplace. It’s less secure and loaded with risk.
And, according to the research, the estimated annual cost to remedy the data loss is about $1.8 billion. So what’s a CIO to do? On the one hand, it’s her job to help employees remain productive, but it’s also her job to secure the company’s confidential information.
Six IT experts were asked about their take on the matter, here are their suggestions... (more)
Security Directors: FREE Security White Paper - "Surreptitious Workplace Recording ...and what you can do about it."
There’s now more job security but now there’s less information security too. Because, according to a new survey from uSamp, 41% of workers used an unsanctioned cloud service for document storage in the last 6 months, despite the fact that 87% of these workers knew their company had policies forbidding such practices.
Welcome to the mobile workplace. It’s less secure and loaded with risk.
And, according to the research, the estimated annual cost to remedy the data loss is about $1.8 billion. So what’s a CIO to do? On the one hand, it’s her job to help employees remain productive, but it’s also her job to secure the company’s confidential information.
Six IT experts were asked about their take on the matter, here are their suggestions... (more)
Security Directors: FREE Security White Paper - "Surreptitious Workplace Recording ...and what you can do about it."
"Secure" Integrated Circuit Chip Salami'ed into Spilling Secrets
A technique has been developed to bypass elaborate physical protections and siphon data off the most secure chips potentially including those used to protect military secrets.
The proof-of-concept technique demonstrated by researchers at Berlin's Technical University and security consultancy IOActive was successfully applied to a low-security Atmel chip commonly used in TiVo video recording devices. But the research team found that their complex and expensive attack could be applied to successfully pry data from highly-secure chips.
The attack used a polishing machine to mill down the silicon on the target chip until it was 30 micrometers thin.
The chip was then placed under a laser microscope fitted with an infrared camera to observe heat emanating from where encryption algorithms were running.
A focused ion-beam was then shot at the chip which dug a series of two micrometer -deep trenches in which wiretap probes were inserted.
Together, the elaborate techniques if bolstered by the use of more expensive equipment not available to the researchers could potentially bypass the most advanced chip security mechanisms. (more)
The proof-of-concept technique demonstrated by researchers at Berlin's Technical University and security consultancy IOActive was successfully applied to a low-security Atmel chip commonly used in TiVo video recording devices. But the research team found that their complex and expensive attack could be applied to successfully pry data from highly-secure chips.
The attack used a polishing machine to mill down the silicon on the target chip until it was 30 micrometers thin.
The chip was then placed under a laser microscope fitted with an infrared camera to observe heat emanating from where encryption algorithms were running.
A focused ion-beam was then shot at the chip which dug a series of two micrometer -deep trenches in which wiretap probes were inserted.
Together, the elaborate techniques if bolstered by the use of more expensive equipment not available to the researchers could potentially bypass the most advanced chip security mechanisms. (more)
SpyCam Nails Airline Baggage Handlers at JFK
Seven baggage handlers at JFK Airport were arrested Wednesday for allegedly stealing thousand of dollars in items from checked baggage.
After receiving customer complaints of missing items, Israeli airline EL AL installed a camera in the belly of one of their 747 jets.
Over a five month period they caught seven employees - often wearing gloves - rifling through passenger's suitcases and stuffing luxury items in their pockets and down their pants. (more)
After receiving customer complaints of missing items, Israeli airline EL AL installed a camera in the belly of one of their 747 jets.
Over a five month period they caught seven employees - often wearing gloves - rifling through passenger's suitcases and stuffing luxury items in their pockets and down their pants. (more)
Sports Spying - Italian Football
Italy - In a frankly bizarre twist, Sampdoria caught a Genoa scout dressed in camouflage gear spying on their training ahead of Sunday’s derby.
The two local rivals will face off at Marassi on Sunday.
It seems Genoa were hoping to gain an advantage, but were left red-faced when Primavera youth team goalkeeping Coach Luca De PrĂ was caught spying on Samp’s training session.
It was Sampdoria who revealed the strange story with a statement on their official website and photograph of the man dressed in full camouflage gear to hide in the bushes outside the Bogliasco camp. (more)
The two local rivals will face off at Marassi on Sunday.
It seems Genoa were hoping to gain an advantage, but were left red-faced when Primavera youth team goalkeeping Coach Luca De PrĂ was caught spying on Samp’s training session.
It was Sampdoria who revealed the strange story with a statement on their official website and photograph of the man dressed in full camouflage gear to hide in the bushes outside the Bogliasco camp. (more)
Sunday, September 15, 2013
Alps Slayings Could be Linked to Industrial Espionage - Prosecutor
French authorities said Friday they were
investigating the possibility that the British family shot dead while on
holidays in the Alps a year ago was executed over industrial espionage. (more)
Friday, September 13, 2013
School v. Students - Monitoring Social Media for Anti-Social Behavior
Authorities in California are now snooping on school students’ social media postings to catch law-breaking, bullying and other harmful activities. But parents worry the move is yet another example of Big Brother prying into ordinary Americans’ lives.
Glendale Unified School District, the third-largest in Los Angeles County, has paid Geo Listening Company over $40,000 to follow its students on social media networks. The stated aim is to prevent law-breaking, bullying and doing harm to themselves and others.
Under the scheme, the online activities of Glendale’s 13,000 middle-school and high-school students are closely monitored. (more)
Glendale Unified School District, the third-largest in Los Angeles County, has paid Geo Listening Company over $40,000 to follow its students on social media networks. The stated aim is to prevent law-breaking, bullying and doing harm to themselves and others.
Under the scheme, the online activities of Glendale’s 13,000 middle-school and high-school students are closely monitored. (more)
Wednesday, September 11, 2013
Sometimes the Bird Really is a Spy
Over the past few years there have been a flock of spy stories about birds, the latest being a stork in Egypt. He was interrogated and let go, only to be found dead two days later. "...a wildlife organization claiming that it was 'eaten by local villagers.'" (more)
This story is different. Some birds do spy.
The John Downer Productions team created a set of highly realistic robotic penguins to spy on living birds for a recent BBC documentary. Some penguins are timid around humans, and may flee when a normal camera team approaches. So, these robots allow scientists and filmmakers to get up close with the colony and capture intimate details of day to day life in a penguin colony.
The robots are more than simple spycams. They can:
• Remember the identities of individual penguins based on their patterns of spots.
• Get blown over and right themselves.
• Fall off a ledge without breaking.
• And even carry “egg-cams” to drop off at strategic locations (more)
This story is different. Some birds do spy.
The John Downer Productions team created a set of highly realistic robotic penguins to spy on living birds for a recent BBC documentary. Some penguins are timid around humans, and may flee when a normal camera team approaches. So, these robots allow scientists and filmmakers to get up close with the colony and capture intimate details of day to day life in a penguin colony.
The robots are more than simple spycams. They can:
• Remember the identities of individual penguins based on their patterns of spots.
• Get blown over and right themselves.
• Fall off a ledge without breaking.
• And even carry “egg-cams” to drop off at strategic locations (more)
Business Espionage: BMW Accused of Spying on Paris Electric Car-Share Company
The group that runs Paris car-sharing scheme Autolib’ said Tuesday it had filed a criminal complaint accusing German carmaker BMW of using spies to gather information on its electric cars.
The Bollore group said it had filed the industrial espionage complaint after two employees of a firm employed by BMW were spotted three times tampering with charging points and Autolib’ vehicles parked in Paris.
BMW denied any wrongdoing...
The group that runs Paris car-sharing scheme Autolib’ said Tuesday it had filed a criminal complaint accusing German carmaker BMW of using spies to gather information on its electric cars.
The Bollore group said it had filed the industrial espionage complaint after two employees of a firm employed by BMW were spotted three times tampering with charging points and Autolib’ vehicles parked in Paris.
BMW denied any wrongdoing.
The Bollore group said it had filed the industrial espionage complaint after two employees of a firm employed by BMW were spotted three times tampering with charging points and Autolib’ vehicles parked in Paris.
BMW denied any wrongdoing...
The group that runs Paris car-sharing scheme Autolib’ said Tuesday it had filed a criminal complaint accusing German carmaker BMW of using spies to gather information on its electric cars.
The Bollore group said it had filed the industrial espionage complaint after two employees of a firm employed by BMW were spotted three times tampering with charging points and Autolib’ vehicles parked in Paris.
BMW denied any wrongdoing.
Friday, September 6, 2013
How to Check an iPhone for Spyware
a tip via Techlicious...
"The best way to detect if your iPhone has been hacked is to download an app like Lookout that tells you whether your phone has been "jailbroken".
If the answer is yes (and you didn't jailbreak it), there's a good chance your suspected spy did.
To remove an iPhone hack, simply update to the latest version of iOS. And to protect against future hacks, make sure that your phone is password protected so no one can get physical access to jailbreak it again...
Once you clear the hack, reset all of your passwords for social accounts and iCloud to prevent other means of spying on you."
"The best way to detect if your iPhone has been hacked is to download an app like Lookout that tells you whether your phone has been "jailbroken".
If the answer is yes (and you didn't jailbreak it), there's a good chance your suspected spy did.
To remove an iPhone hack, simply update to the latest version of iOS. And to protect against future hacks, make sure that your phone is password protected so no one can get physical access to jailbreak it again...
Once you clear the hack, reset all of your passwords for social accounts and iCloud to prevent other means of spying on you."
The New York Times Quote of the Day :)
QUOTATION OF THE DAY
"This is the golden age of spying."
PAUL KOCHER,
a cryptographer, on the National Security Agency's ability to
circumvent encryption systems in gathering private Internet information.
Thursday, September 5, 2013
IT Industry Admits ‘Losing Battle’ Against State-Backed Attacks
More than half of senior IT security professionals believe the industry is losing the battle against state-sponsored attacks, according to a survey.
Nearly 200 senior IT security professionals were surveyed by Lieberman Software Corporation at the Black Hat USA 2013 conference in Las Vegas, with 58 per cent of saying they believe the profession is losing the battle against state-sponsored attacks.
And 74 per cent of respondents were not even confident that their own corporate network has not already been breached by a foreign state-sponsored hacker, while 96 per cent believe that the hacking landscape is going to get worse over time. (more)
FutureWatch: Look for a migration of sensitive information away from Internet connectivity, followed by a rise in traditional espionage techniques. This shift will amplify the need for traditional security countermeasures, such as TSCM.
Nearly 200 senior IT security professionals were surveyed by Lieberman Software Corporation at the Black Hat USA 2013 conference in Las Vegas, with 58 per cent of saying they believe the profession is losing the battle against state-sponsored attacks.
And 74 per cent of respondents were not even confident that their own corporate network has not already been breached by a foreign state-sponsored hacker, while 96 per cent believe that the hacking landscape is going to get worse over time. (more)
FutureWatch: Look for a migration of sensitive information away from Internet connectivity, followed by a rise in traditional espionage techniques. This shift will amplify the need for traditional security countermeasures, such as TSCM.
Tuesday, September 3, 2013
Business Espionage: HTC - Cell Phone Company Takes a Hit
Taiwan -- Investigators stormed into HTC yesterday to investigate some of the company's design staff, who are suspected of stealing trade secrets and defrauding HTC of nearly NT$10 million.
HTC accused three of its senior design professionals of fraud. The suspects were alleged to have set up new businesses on their own. Investigators started interrogating the suspects and searching their homes and offices yesterday afternoon.
The Bureau of Investigations said that it had received a complaint from HTC saying that three senior employees in the design development department were suspected of designing cellphone cases and lying about it being contract work. The suspects allegedly conspired with a manufacturer to issue fake invoices amounting to nearly NT$10 million for performing design work. Upon receiving the money from HTC, the manufacturer allegedly transferred it to the suspects. (more)
Ironic HTC homepage. |
The Bureau of Investigations said that it had received a complaint from HTC saying that three senior employees in the design development department were suspected of designing cellphone cases and lying about it being contract work. The suspects allegedly conspired with a manufacturer to issue fake invoices amounting to nearly NT$10 million for performing design work. Upon receiving the money from HTC, the manufacturer allegedly transferred it to the suspects. (more)
The Newest Eavesdropping Gadget for PIs and Spies - Also a Security & Safety Tool
When people around you put on headphones or earbuds you begin to speak freely. Big mistake. You may have been lulled into a false sense of security by an eavesdropper using The Fuser.
"The Fuser increases your awareness of the natural sounds around you using its built-in microphone to “mix” the music in your headphones with the outside world, allowing you to enjoy your music while still hearing yourself and others around you talk, laugh, work, play.*
Listen to music at work and still engage with co-workers. Take a road trip and not ignore others in the car. Relax at the beach with your music and still hear the waves crash… The possibilities are endless. (Oh, and by the way) *Fuser can also be used without a music device as a powerful hearing aid." (more)
P.S. This is also an excellent safety device for when you are walking, jogging, bicycling, or in any other situation where you need to be alert to your surroundings.
"The Fuser increases your awareness of the natural sounds around you using its built-in microphone to “mix” the music in your headphones with the outside world, allowing you to enjoy your music while still hearing yourself and others around you talk, laugh, work, play.*
Listen to music at work and still engage with co-workers. Take a road trip and not ignore others in the car. Relax at the beach with your music and still hear the waves crash… The possibilities are endless. (Oh, and by the way) *Fuser can also be used without a music device as a powerful hearing aid." (more)
P.S. This is also an excellent safety device for when you are walking, jogging, bicycling, or in any other situation where you need to be alert to your surroundings.
Sunday, September 1, 2013
Industrialists Hit by Cyber Espionage
India - Cyber espionage, the practice of spying to obtain secret information like proprietary or classified details, confidential sales data, turnover, clients' contacts, diplomatic reports and records of military or political nature, have hit city industrialists.
"Cyber espionage is the new trend of cyber crime that is threatening mid-scale and small-scale industries in Ludhiana. Here one could target his business competitors or simply steal other company's details to sell it further in the market. Ludhiana offers them a ready-made market as many start-ups and small scale companies are operational here," said Tanmay Sinha, a cyber expert and an entrepreneur based in Ludhiana.
"In most of the instances, cyber espionage attempts benefit the attacker as these attacks are not random but are well-planned and targeted towards one group. Moreover, these are done by the criminals after studying the history of the target," he added.
Ludhiana police cyber cell has received more than 10 complaints of cyber espionage in the last two months. (more)
"Cyber espionage is the new trend of cyber crime that is threatening mid-scale and small-scale industries in Ludhiana. Here one could target his business competitors or simply steal other company's details to sell it further in the market. Ludhiana offers them a ready-made market as many start-ups and small scale companies are operational here," said Tanmay Sinha, a cyber expert and an entrepreneur based in Ludhiana.
"In most of the instances, cyber espionage attempts benefit the attacker as these attacks are not random but are well-planned and targeted towards one group. Moreover, these are done by the criminals after studying the history of the target," he added.
Ludhiana police cyber cell has received more than 10 complaints of cyber espionage in the last two months. (more)
Smartphone Spy Lens
Why mention this?
Our PI friends need to know, and so you will know what you're up against.
"The Smartphone Spy Lens is a tiny gizmo you attach to your phone to take photos at a 90° angle. You can slyly hold your phone in texting position, while photoing straight ahead!
Periscope around a corner. Snap candid shots of your camera-shy kids. Take a photo of your dinner plate without having to climb up on the table.
Its high quality glass and mirrored interior ensures no photo quality is lost. Attach the included metal ring around your phone's lens and the Spy Lens magnetizes securely onto it.
Since it twists 360° you'll have all the advantages of a camera with a swivel screen. Hold it high and still see what you're shooting. Hold it low without dropping into an army crawl to set your focus.
With the Spy Lens in place you can lay your phone down and still shoot straight ahead. Turning any surface into an impromptu tripod for self ports, group pix and steady videoing." (more)
Our PI friends need to know, and so you will know what you're up against.
"The Smartphone Spy Lens is a tiny gizmo you attach to your phone to take photos at a 90° angle. You can slyly hold your phone in texting position, while photoing straight ahead!
Periscope around a corner. Snap candid shots of your camera-shy kids. Take a photo of your dinner plate without having to climb up on the table.
Its high quality glass and mirrored interior ensures no photo quality is lost. Attach the included metal ring around your phone's lens and the Spy Lens magnetizes securely onto it.
Since it twists 360° you'll have all the advantages of a camera with a swivel screen. Hold it high and still see what you're shooting. Hold it low without dropping into an army crawl to set your focus.
With the Spy Lens in place you can lay your phone down and still shoot straight ahead. Turning any surface into an impromptu tripod for self ports, group pix and steady videoing." (more)
Family doctor who used £60 spycam watch...
UK - ...to film intimate examinations of hundreds of women is banned from profession...
When Bains was arrested at his surgery in Royal Wootton Bassett, Wiltshire, officers discovered 361 video clips filmed on the watch - some as long as 45 minutes.
Around 3,000 potential victims were contacted but the exact number is thought to be ‘close to 300’ - aged between 14 and 51.
A Medical Practitioners Tribunal Service banned Bains from practicing.
The tribunal in Manchester was told that his conviction earlier this year means that his fitness to practice is impaired, and he should be struck off.
In March, Bains appeared at Swindon Crown Court where he admitted 39 counts of sexual assault and voyeurism and asked for a further 65 offences to be taken into consideration.
He is serving a 12 year prison sentence and is not represented at the hearing. (more)
When Bains was arrested at his surgery in Royal Wootton Bassett, Wiltshire, officers discovered 361 video clips filmed on the watch - some as long as 45 minutes.
Around 3,000 potential victims were contacted but the exact number is thought to be ‘close to 300’ - aged between 14 and 51.
A Medical Practitioners Tribunal Service banned Bains from practicing.
The tribunal in Manchester was told that his conviction earlier this year means that his fitness to practice is impaired, and he should be struck off.
In March, Bains appeared at Swindon Crown Court where he admitted 39 counts of sexual assault and voyeurism and asked for a further 65 offences to be taken into consideration.
He is serving a 12 year prison sentence and is not represented at the hearing. (more)
Friday, August 30, 2013
Researchers Grow Human Brains in a Lab
A team at the Institute of Molecular Biotechnology of the Austrian Academy of Sciences has succeeded in growing miniature human brains...
The team, led by Dr. JĂ¼rgen Knoblich, started by analyzing human stem cells – a cell type that has the capacity to change into any other type of cell found in the body. Specifically, the scientists were interested in discovering what growth conditions are required for such cells to differentiate into various types of brain tissue cells.
Once those conditions had been identified, stem cells were used to create neuroectoderm, a layer of cells which is the “starting material” from which all components of the nervous system (including the brain) are derived...
After spending 15 to 20 days in the reactor, the neuroectoderm fragments had formed into a piece of continuous brain tissue, known as a cerebral organoid. (more)
The team, led by Dr. JĂ¼rgen Knoblich, started by analyzing human stem cells – a cell type that has the capacity to change into any other type of cell found in the body. Specifically, the scientists were interested in discovering what growth conditions are required for such cells to differentiate into various types of brain tissue cells.
Once those conditions had been identified, stem cells were used to create neuroectoderm, a layer of cells which is the “starting material” from which all components of the nervous system (including the brain) are derived...
After spending 15 to 20 days in the reactor, the neuroectoderm fragments had formed into a piece of continuous brain tissue, known as a cerebral organoid. (more)
Snapchat Not So Private and Secure
According to a "Snapchat Security Advisory" published by Australian researchers,
Snapchat names, aliases and phone numbers can be discovered and harvested via the Snapchat Android and iOS API - even if the Snapchat account is private.
Gibson Security discovered a range of disturbing security holes when it reverse-engineered the popular photo and video sharing app, including what it believes to be unsecure encryption practices (two encryption keys across all users) and code for in-app ads.
Gibson Security has informed ZDNet that "The API reversed isn't just used for Android, but iOS too. Both platforms are vulnerable." (more)
Snapchat names, aliases and phone numbers can be discovered and harvested via the Snapchat Android and iOS API - even if the Snapchat account is private.
Gibson Security discovered a range of disturbing security holes when it reverse-engineered the popular photo and video sharing app, including what it believes to be unsecure encryption practices (two encryption keys across all users) and code for in-app ads.
Gibson Security has informed ZDNet that "The API reversed isn't just used for Android, but iOS too. Both platforms are vulnerable." (more)
FutureWatch: On the Road to The Corporate State
Tech Companies and Government May Soon Go to War Over Surveillance
via Patrick Gray, wired.com...
On the very day the media dropped detailed documents on the NSA’s X-Keyscore collection program, the Facebook engineering team published a blog post stating that all access to Facebook via apps and web browsers was now SSL encrypted. Given X-Keyscore was a program primarily designed to intercept unencrypted internet traffic, you could be forgiven for interpreting Facebook’s post as a middle finger pointed in NSA’s direction...
You want us to execute that warrant for you? Ok, sure, but the user will get a nice big popup warning telling them that their messages are likely being intercepted!
There are new interception hurdles everywhere you look. Even plain old SSL encryption is becoming more difficult to snoop on. Previously, governments could rely on complicit or compromised certificate authorities to provide them with the means to intercept encrypted traffic. Thanks to the Iranian government’s overly enthusiastic use of this technique, Google made changes to the Chrome browser to neuter the practice. Similar updates are expected soon in Internet Explorer. There goes another interception technique for law enforcement!
And it’s only going to get worse for the poor ole G-Men. Technology companies are enabling security features that make certain types of government surveillance extremely difficult, and it’s a trend that’s set to continue. That’s why the U.S. government has long wanted laws that force tech companies to make their products wiretap friendly. (more)
"Knowledge is power." Whoever holds the knowledge, holds the power. (sing-a-long)
via Patrick Gray, wired.com...
On the very day the media dropped detailed documents on the NSA’s X-Keyscore collection program, the Facebook engineering team published a blog post stating that all access to Facebook via apps and web browsers was now SSL encrypted. Given X-Keyscore was a program primarily designed to intercept unencrypted internet traffic, you could be forgiven for interpreting Facebook’s post as a middle finger pointed in NSA’s direction...
You don't need a Weatherman to know... |
There are new interception hurdles everywhere you look. Even plain old SSL encryption is becoming more difficult to snoop on. Previously, governments could rely on complicit or compromised certificate authorities to provide them with the means to intercept encrypted traffic. Thanks to the Iranian government’s overly enthusiastic use of this technique, Google made changes to the Chrome browser to neuter the practice. Similar updates are expected soon in Internet Explorer. There goes another interception technique for law enforcement!
And it’s only going to get worse for the poor ole G-Men. Technology companies are enabling security features that make certain types of government surveillance extremely difficult, and it’s a trend that’s set to continue. That’s why the U.S. government has long wanted laws that force tech companies to make their products wiretap friendly. (more)
"Knowledge is power." Whoever holds the knowledge, holds the power. (sing-a-long)
Thursday, August 29, 2013
Government and Business Team Up Against Espionage...
Germany - Faced with increasing rates of espionage attempts directed at companies, German government and business leaders have agreed on hammering out a joint protection strategy. Raising awareness is the first objective.
The German government and business organizations agreed on Wednesday that domestic companies needed stronger protection from espionage and cyber crime. They signed a declaration on hammering out a joint defense strategy and pooling resources for the most efficient infrastructure to ward off risks...
The Association of German Chambers of Commerce and Industry (DIHK) added putting an efficient security infrastructure in place should not be viewed by smaller firms as a way of wasting money.
"The costs those firms might incur through espionage and the resulting theft of intellectual property and know-how tend to be much higher than the investment in a good security setup," DIHK President Eric Schweitzer emphasized. (more)
Brilliant! Time for the U.S. to do the same.
The German government and business organizations agreed on Wednesday that domestic companies needed stronger protection from espionage and cyber crime. They signed a declaration on hammering out a joint defense strategy and pooling resources for the most efficient infrastructure to ward off risks...
The Association of German Chambers of Commerce and Industry (DIHK) added putting an efficient security infrastructure in place should not be viewed by smaller firms as a way of wasting money.
"The costs those firms might incur through espionage and the resulting theft of intellectual property and know-how tend to be much higher than the investment in a good security setup," DIHK President Eric Schweitzer emphasized. (more)
Brilliant! Time for the U.S. to do the same.
Wiretapping Sparks Naked Protest
FEMEN activists shed clothes in front of Ukrainian embassy in Berlin...
Ukraine based feminist movement group, FEMEN has said that they are moving their office out of Ukraine's capital, Kiev after their telephone calls were wiretapped.
A day prior, the police had alleged that a cache of illegal weapons were discovered from their headquarters.
The group is said to be moving out because of security concerns. The FEMEN group has said that the wiretapping incident has made the place impossible to work. (more)
Imagine what would happen if they were really bugged.
Ukraine based feminist movement group, FEMEN has said that they are moving their office out of Ukraine's capital, Kiev after their telephone calls were wiretapped.
A day prior, the police had alleged that a cache of illegal weapons were discovered from their headquarters.
The group is said to be moving out because of security concerns. The FEMEN group has said that the wiretapping incident has made the place impossible to work. (more)
Imagine what would happen if they were really bugged.
Subscribe to:
Posts (Atom)