Turkey - The other day, a friend of mine told me this anecdote about his meeting with a famous constructor.
“We took our seats. I put my mobile on the table. He gave me my mobile and said ‘Take this and sit on it.’ I did not understand. ‘What am I going to sit on?’ I asked. ‘Sit on the telephone. This is how I do it. That way they cannot listen,’ he said. He sat on his own telephone. I just put it in my pocket, without him seeing. He was relieved and only then could we continue to speak.” As you might understand, we are now passing through a period of time when people sit on their phones. (more)
Hummm... Maybe there is a market for... stay tuned for my solution.
Wednesday, March 12, 2014
Tuesday, March 11, 2014
PI Job Opportunity - Spy Agency Hires PIs to do its Snooping
New Zealand - It might be an organization dedicated to snooping - but the nation's spy agency has still forked out $50,000 to hire private investigators.
Details released under the Official Information Act show that during the past three years the Government Communications Security Bureau has paid contractors to investigate two matters. Director Ian Fletcher said they were "personnel-related issues".
The investigations ran concurrently and lasted five months, costing $46,009.
Mr Fletcher declined to give further details - and would not reveal the outcome of the investigations "in order to protect the privacy of the persons involved". (more)
Details released under the Official Information Act show that during the past three years the Government Communications Security Bureau has paid contractors to investigate two matters. Director Ian Fletcher said they were "personnel-related issues".
The investigations ran concurrently and lasted five months, costing $46,009.
Mr Fletcher declined to give further details - and would not reveal the outcome of the investigations "in order to protect the privacy of the persons involved". (more)
Former Soviet Spy Chief Claims Putin Regime is an ‘Intelligence Agency Dictatorship’
The highest ranking defector to flee from the old Soviet bloc has a
message to share about Vladimir Putin — he’s still a KGB agent at heart
and that mindset is heavily influencing his tactics for furthering
Russia’s interests.
Ion Mihai Pacepa was the head of the Romanian communist regime’s foreign intelligence service before he defected to the West in 1978. Due to the threats on his life, Pacepa refuses to appear in public, but he has communicated his message to the co-author of his most recent book ”Disinformation: Former Spy Chief Reveals Secret Strategies for Undermining Freedom, Attacking Religion, and Promoting Terrorism.”...
“About five years ago, Pacepa was warning me about Putin. He’s saying Putin is former KGB, Putin has surrounded himself with KGB people everywhere, it is now in essence an ‘intelligence agency dictatorship’,” Rychlak, a professor at the University of Mississippi School of Law, told TheDC. (more)
Ion Mihai Pacepa was the head of the Romanian communist regime’s foreign intelligence service before he defected to the West in 1978. Due to the threats on his life, Pacepa refuses to appear in public, but he has communicated his message to the co-author of his most recent book ”Disinformation: Former Spy Chief Reveals Secret Strategies for Undermining Freedom, Attacking Religion, and Promoting Terrorism.”...
“About five years ago, Pacepa was warning me about Putin. He’s saying Putin is former KGB, Putin has surrounded himself with KGB people everywhere, it is now in essence an ‘intelligence agency dictatorship’,” Rychlak, a professor at the University of Mississippi School of Law, told TheDC. (more)
Dendroid Spying RAT Malware Found on Google Play
A new Android malware toolkit called Dendroid is being offered for sale by its creators, and at least one of the malicious APKs created with it has managed to fool Google Play's Bouncer...
The malicious APKs can purportedly intercept, block, and send out SMSes; record ongoing phone calls; take pictures, record video and audio by using the device's camera and microphone; download pictures the device owner has already made, as well as his or her browser history and bookmarks; and extract saved login credentials and passwords for a variety of accounts.
"Dendroid also comes bundled with a universal 'binder application.' This is a point-and-click tool that a customer can use to inject (or bind) Dendroid into any innocent target application that they choose with minimal effort," the researchers added.
"This means that all a wannabee malware author needs in order to start pumping out infected applications is to choose a carrier app, download it and then let Dendroid’s toolkit take care of the rest."
Sold for $300 (in crypto currencies), the toolkit comes with a warranty that the malware created with it will remain undetected.
The researchers have discovered one app created with Dendroid that managed to get included and offered on Google Play by leveraging anti-emulation detection code that fools Google Play's Bouncer, the automated app scanning service that analyzes apps by running them on Google’s cloud infrastructure and simulating how they will run on an Android device. The app has since been removed from the market. (more)
Why this is important...
It means that any jerk with $300 and some computer skills can turn any other app into your worst nightmare. BTW, it can be detected. q.v. SpyWarn™ — coming soon.
The malicious APKs can purportedly intercept, block, and send out SMSes; record ongoing phone calls; take pictures, record video and audio by using the device's camera and microphone; download pictures the device owner has already made, as well as his or her browser history and bookmarks; and extract saved login credentials and passwords for a variety of accounts.
"Dendroid also comes bundled with a universal 'binder application.' This is a point-and-click tool that a customer can use to inject (or bind) Dendroid into any innocent target application that they choose with minimal effort," the researchers added.
"This means that all a wannabee malware author needs in order to start pumping out infected applications is to choose a carrier app, download it and then let Dendroid’s toolkit take care of the rest."
Sold for $300 (in crypto currencies), the toolkit comes with a warranty that the malware created with it will remain undetected.
The researchers have discovered one app created with Dendroid that managed to get included and offered on Google Play by leveraging anti-emulation detection code that fools Google Play's Bouncer, the automated app scanning service that analyzes apps by running them on Google’s cloud infrastructure and simulating how they will run on an Android device. The app has since been removed from the market. (more)
Why this is important...
It means that any jerk with $300 and some computer skills can turn any other app into your worst nightmare. BTW, it can be detected. q.v. SpyWarn™ — coming soon.
Labels:
App,
cell phone,
eavesdropping,
espionage,
Hack,
malware,
privacy,
software,
spyware
5 Apps for Spying on your Spouse
Americans have good reason to wonder if there is such a thing as privacy anymore. After former National Security Agency contractor Edward Snowden revealed that the U.S. government monitors calls, emails and texts, many people might think twice about what they share online. But that same technology is being used for another purpose: “There are a growing number of apps that will spy on your husband or wife and keep tabs on your kids,” says Theodore Claypoole, privacy attorney and co-author of “Privacy in the Age of Big Data: Recognizing Threats, Defending Your Rights, and Protecting Your Family.”
These apps may raise moral and legal questions too. The most invasive can be downloaded onto a phone and will quietly forward emails, calls and texts.
It’s a criminal offense under the Computer Fraud and Abuse Act of 1965 to access a computer—including modern computers like tablets and smartphones—without authorization. But if ownership of the smartphone in question is under someone else’s name—say, a spouse, a parent or an employer—it’s a legal gray area, Claypoole says. “That raises the question of whether the user has a reasonable expectation of privacy,” he says. “If you own your husband or wife’s smartphone and you’re paying your child’s phone bill, it could be a moral issue rather than a legal one.” (more)
These apps may raise moral and legal questions too. The most invasive can be downloaded onto a phone and will quietly forward emails, calls and texts.
It’s a criminal offense under the Computer Fraud and Abuse Act of 1965 to access a computer—including modern computers like tablets and smartphones—without authorization. But if ownership of the smartphone in question is under someone else’s name—say, a spouse, a parent or an employer—it’s a legal gray area, Claypoole says. “That raises the question of whether the user has a reasonable expectation of privacy,” he says. “If you own your husband or wife’s smartphone and you’re paying your child’s phone bill, it could be a moral issue rather than a legal one.” (more)
Bugging at Riga International Airport Being Investigated
Latvia - The wire-tapping scandal at Riga International airport is being investigated by Security Police. This whole situation has created a great deal of concern for Latvian politicians. During a recent closed meeting of the Saeima National Security Committee, they attempted to determine if there are any recordings of conversations that could compromise officials and sponsors of political parties whose names have surfaced during the investigation...
Even though the actual meeting was closed and information classified, Pietiek managed to uncover that politicians are concerned over the news that Riga airport’s VIP lounge was being monitored as well. Officials often use this are of the airport to meet in an informal environment to discuss matters away from prying eyes. (more)
Even though the actual meeting was closed and information classified, Pietiek managed to uncover that politicians are concerned over the news that Riga airport’s VIP lounge was being monitored as well. Officials often use this are of the airport to meet in an informal environment to discuss matters away from prying eyes. (more)
FutureWatch: Germans Sweep Parliament for Bugs and Tapped Phones
The German parliament building may be soon checked for bugs and eavesdropping landlines to ensure privacy. Berlin is ramping up security amid a scandal over electronic surveillance by the US National Security Agency.
A plan to secure the Bundestag complex was prepared by the Federal Office for Information Security (BSI) and approved by the IuK, the parliamentary commission on information technology and communications, Der Spiegel magazine reported on Monday citing its sources. It is to be presented to MPs later this week.
One of the prime areas of interest for the BSI is posed by supposedly secure rooms, which are meant to be used for negotiations of officials related to confidential matters. The office wants to ensure that they are actually free of bugs, the report says.
They also want to check landlines in the building, because they can be used for remote eavesdropping on the parliament. (more)
The amazing part of the story is that TSCM inspections are apparently not routine.
A plan to secure the Bundestag complex was prepared by the Federal Office for Information Security (BSI) and approved by the IuK, the parliamentary commission on information technology and communications, Der Spiegel magazine reported on Monday citing its sources. It is to be presented to MPs later this week.
One of the prime areas of interest for the BSI is posed by supposedly secure rooms, which are meant to be used for negotiations of officials related to confidential matters. The office wants to ensure that they are actually free of bugs, the report says.
They also want to check landlines in the building, because they can be used for remote eavesdropping on the parliament. (more)
The amazing part of the story is that TSCM inspections are apparently not routine.
Sunday, March 9, 2014
Two All Beef Paddies, Special Sauce, Let Us Cheese the Spycam!
Ireland - MCDONALD’S has defended the use of a hidden camera in the bathroom of a Dublin restaurant.
The primitive device, hidden in a smoke alarm in men’s bathroom in its Temple Bar branch, is pointed towards the sink area.
This leaves urinals and cubicles out of view.
A statement from McDonald’s noted that means the camera is “fully compliant with all appropriate legislation and guidelines in this area”.
Data Protection laws state that there are circumstances in which a camera can be installed in a bathroom. (more)
The primitive device, hidden in a smoke alarm in men’s bathroom in its Temple Bar branch, is pointed towards the sink area.
This leaves urinals and cubicles out of view.
A statement from McDonald’s noted that means the camera is “fully compliant with all appropriate legislation and guidelines in this area”.
Data Protection laws state that there are circumstances in which a camera can be installed in a bathroom. (more)
Mobile Malware Sees ‘Exponential’ 614 Percent Growth
Chinese cybercriminals are increasingly targeting mobile users as they develop ever more sophisticated hacking tools, according to new research from security firm Trend Micro.
Its Mobile Cybercriminal Underground Market report revealed that Chinese hackers are using a variety of in-depth malware and malicious code programs to target users both at home and in the West, with mobile malware kits available to buy from as little as 100 yuan (around £10) on the black market.
“The barriers to launching cybercriminal operations are less in number than ever,” the report stated. “Toolkits are becoming more available and cheaper; some are even offered free of charge.” (more)
Its Mobile Cybercriminal Underground Market report revealed that Chinese hackers are using a variety of in-depth malware and malicious code programs to target users both at home and in the West, with mobile malware kits available to buy from as little as 100 yuan (around £10) on the black market.
“The barriers to launching cybercriminal operations are less in number than ever,” the report stated. “Toolkits are becoming more available and cheaper; some are even offered free of charge.” (more)
Thursday, March 6, 2014
Turkish Watergate - First Audio Eavesdropping Tapes - Now Video
Turkey’s Prime Minister Recep Tayyip Erdogan, whose government has been ensnared by a series of anonymously leaked audio tapes of purported corruption, said his administration may face a new threat from covertly recorded video recordings.
“In these incidents, there is not just wiretapping, there is also filming,” Erdogan said in Ankara yesterday, according to state-run Anatolia news agency. “It’s even been stretched to the extreme of filming extramarital affairs, invading a family’s privacy and totally ignoring moral values.”
Speaking to local reporters after the release of audio tapes that the opposition said placed Erdogan at the center of a bribery scheme, the premier lashed out at the tactics. (more)
“In these incidents, there is not just wiretapping, there is also filming,” Erdogan said in Ankara yesterday, according to state-run Anatolia news agency. “It’s even been stretched to the extreme of filming extramarital affairs, invading a family’s privacy and totally ignoring moral values.”
Speaking to local reporters after the release of audio tapes that the opposition said placed Erdogan at the center of a bribery scheme, the premier lashed out at the tactics. (more)
Kuwait Minister Warns on Eavesdropping Device Sales
KUWAIT -- Maximum penalties will be taken against any
telecommunication company trading in eavesdropping devices, warned Minister of
Communications Essa Al-Kanderi on Wednesday. Offenders will be referred to the public prosecution, the minister warned
further, during a debate at the National Assembly. Some MPs charged during the discussions that a number of companies
"possess" listening bugs, in violation of the Constitution and State Laws. (more)
County Jail Official Retires Amid Wiretap Charges
NJ - The deputy director of the Hudson County jail, who is facing federal charges he used a website to illegally wiretap fellow employees, has put in his retirement papers, officials said.
The retirement papers of Kirk Eady, 45, of East Brunswick, are dated retroactively to Feb. 1, Hudson County spokesman Jim Kennelly said.
Eady turned himself in to federal authorities on Feb. 15 after being charged with intentionally intercepting the wire, oral or electronic communications of others, according to a criminal complaint. (more)
The retirement papers of Kirk Eady, 45, of East Brunswick, are dated retroactively to Feb. 1, Hudson County spokesman Jim Kennelly said.
Eady turned himself in to federal authorities on Feb. 15 after being charged with intentionally intercepting the wire, oral or electronic communications of others, according to a criminal complaint. (more)
Update - Rayney Phone Bugging Case
Australia - Former Perth barrister Lloyd Rayney will be making an application to put a permanent hold on charges of bugging his wife's phone, a court has heard. Rayney is accused of intercepting the calls of his wife Corryn in the lead up to her death in 2007. (more)
Previously reported in 2007...
She bootscoots. He taps. What could possibly go wrong?
The Continuing Saga of the Rayney Wiretap
Update - Rayney ‘phone’ man in key talks
Previously reported in 2007...
She bootscoots. He taps. What could possibly go wrong?
The Continuing Saga of the Rayney Wiretap
Update - Rayney ‘phone’ man in key talks
Wednesday, March 5, 2014
Bogus Boris Netflix App
Android phones and tablets from four different manufacturers are arriving with malware “pre-installed” – a bogus version of Netflix which sends password and credit card information to Russia, according to app security specialist Marble Security.
David Jevans, CTO and founder of the company said that he was alerted to the problem by a company testing his product, software to help organizations manage mobile devices, after it repeatedly flagged Netflix as malicious, according to PC World’s report.
Jevans’ team analysed the app, and found that it was bogus, using tools including one that analyzed the app’s network traffic for signs of communication with known malicious servers. Jevans says, “This isn’t the real Netflix. You’ve got one that has been tampered with, and is sending passwords and credit card information to Russia.” (more)
David Jevans, CTO and founder of the company said that he was alerted to the problem by a company testing his product, software to help organizations manage mobile devices, after it repeatedly flagged Netflix as malicious, according to PC World’s report.
Jevans’ team analysed the app, and found that it was bogus, using tools including one that analyzed the app’s network traffic for signs of communication with known malicious servers. Jevans says, “This isn’t the real Netflix. You’ve got one that has been tampered with, and is sending passwords and credit card information to Russia.” (more)
A Black Eye for Blackphones
Australian law enforcement agencies are increasingly unable to monitor the communications of some of the country's most powerful criminals due to the rising prevalence of uncrackable encrypted phones.
The phones are linked to a series of the underworld killings that rocked Sydney, several senior law enforcement officials told the ABC on condition of anonymity.
The phones are sold by dozens of companies worldwide and have legitimate uses.
But the law enforcement officials say thousands of the phones have been obtained by Australian criminals and they are using them to commit serious crimes, including murder. (more) (video report)
Interesting article, but... one half of my brain is saying wouldn't the LE's want criminals to think these phones are secure? And, once the general public views encryption as a criminal tool, the politicians would be free to pass laws restricting communications encryption so then only the outlaws (and selected others) would use it... kind-of-like gun silencers.
Or, maybe I've been "Snowed-in" over the long winter and have become cynical.
The phones are sold by dozens of companies worldwide and have legitimate uses.
But the law enforcement officials say thousands of the phones have been obtained by Australian criminals and they are using them to commit serious crimes, including murder. (more) (video report)
Interesting article, but... one half of my brain is saying wouldn't the LE's want criminals to think these phones are secure? And, once the general public views encryption as a criminal tool, the politicians would be free to pass laws restricting communications encryption so then only the outlaws (and selected others) would use it... kind-of-like gun silencers.
Or, maybe I've been "Snowed-in" over the long winter and have become cynical.
Tuesday, March 4, 2014
Crypto Bug Leaves Linux, Hundreds of Apps Open to Eavesdropping
Hundreds of open source packages, including the Red Hat, Ubuntu, and Debian distributions of Linux, are susceptible to attacks that circumvent the most widely used technology to prevent eavesdropping on the Internet, thanks to an extremely critical vulnerability in a widely used cryptographic code library.
The bug in the GnuTLS library makes it trivial for attackers to bypass secure sockets layer (SSL) and Transport Layer Security (TLS) protections available on websites that depend on the open source package. Initial estimates ... indicate that more than 200 different operating systems or applications rely on GnuTLS to implement crucial SSL and TLS operations, but it wouldn't be surprising if the actual number is much higher.
Web applications, e-mail programs, and other code that use the library are vulnerable to exploits that allow attackers monitoring connections to silently decode encrypted traffic passing between end users and servers. (more)
The bug in the GnuTLS library makes it trivial for attackers to bypass secure sockets layer (SSL) and Transport Layer Security (TLS) protections available on websites that depend on the open source package. Initial estimates ... indicate that more than 200 different operating systems or applications rely on GnuTLS to implement crucial SSL and TLS operations, but it wouldn't be surprising if the actual number is much higher.
Web applications, e-mail programs, and other code that use the library are vulnerable to exploits that allow attackers monitoring connections to silently decode encrypted traffic passing between end users and servers. (more)
Chevron Wins Suit Fighting $9.5 Billion Ecuador Judgment - The Spy Pen Helped
Back in 2009, I posted this: Spy Pen May Kill $27 Billion Lawsuit. A little later: The Chevron Secret Recordings Case Continues. Chevron claimed that the Ecuadorian legal system was corrupt and they were not getting a fair hearing.
They backed up their claim with covert videos showing the bribery and corruption. For a while they hosted the videos on their website, while saying they had nothing to do with the making of them.
The videos were made with nothing more than a cheap spy pen and video wristwatch bought from a SkyMall catalog.
Now, a $9.5 Billion lawsuit is $0.00. If this doesn't prove the power of spy gadgets, nothing does.
Got any cheap spy gadgets hanging around your offices? You don't know, do you? Call me.
Here is how the lawsuit ended today...
A federal judge ruled in favor of Chevron Corp. on Tuesday in a civil racketeering case, saying a record $9.5 billion environmental judgment in Ecuador against the oil giant was "obtained by corrupt means."
U.S. District Judge Lewis Kaplan found that New York lawyer Steven Donziger and his litigation team engaged in coercion, bribery, money laundering and other criminal conduct in pursuit of the 2011 verdict.
The decision barred Mr. Donziger and his two Ecuadorean co-defendants from profiting from the verdict.
The case in New York stems from a 2003 lawsuit filed by a group of Ecuadorean villagers from the Lago Agrio region over decades-old pollution from oil exploration in the Amazon rain forest by Texaco Inc., which Chevron acquired in 2001. The decision could hamper efforts to enforce the 2011 judgment by pursuing Chevron's assets in Canada and elsewhere. (more)
They backed up their claim with covert videos showing the bribery and corruption. For a while they hosted the videos on their website, while saying they had nothing to do with the making of them.
The videos were made with nothing more than a cheap spy pen and video wristwatch bought from a SkyMall catalog.
Now, a $9.5 Billion lawsuit is $0.00. If this doesn't prove the power of spy gadgets, nothing does.
Got any cheap spy gadgets hanging around your offices? You don't know, do you? Call me.
Here is how the lawsuit ended today...
A federal judge ruled in favor of Chevron Corp. on Tuesday in a civil racketeering case, saying a record $9.5 billion environmental judgment in Ecuador against the oil giant was "obtained by corrupt means."
U.S. District Judge Lewis Kaplan found that New York lawyer Steven Donziger and his litigation team engaged in coercion, bribery, money laundering and other criminal conduct in pursuit of the 2011 verdict.
The decision barred Mr. Donziger and his two Ecuadorean co-defendants from profiting from the verdict.
The case in New York stems from a 2003 lawsuit filed by a group of Ecuadorean villagers from the Lago Agrio region over decades-old pollution from oil exploration in the Amazon rain forest by Texaco Inc., which Chevron acquired in 2001. The decision could hamper efforts to enforce the 2011 judgment by pursuing Chevron's assets in Canada and elsewhere. (more)
Monday, March 3, 2014
G-Men Chase Sprint'er Over Inflated Wiretap Billing
Sprint Corp. overcharged the Federal Bureau of Investigation, the Drug Enforcement Administration and other law-enforcement agencies by more than 50% to facilitate eavesdropping on phone calls, the U.S. Justice Department alleged in a lawsuit filed Monday.
The suit accuses Sprint of inflating the bills it submitted to federal law-enforcement agencies for wiretaps and other surveillance services to cover capital expenditures necessary to respond to the requests—something prohibited by federal law and Federal Communications Commission rules, according to the complaint filed in federal court in San Francisco.
Sprint covered up the fact that the extra charges were included in the bills paid by the FBI and others by disguising them as regular surveillance costs, the suit alleges. As a result, the federal government overpaid Sprint by $21 million over a period of three and a half years.
Sprint said it didn't break the law and will fight the charges. (more)
The suit accuses Sprint of inflating the bills it submitted to federal law-enforcement agencies for wiretaps and other surveillance services to cover capital expenditures necessary to respond to the requests—something prohibited by federal law and Federal Communications Commission rules, according to the complaint filed in federal court in San Francisco.
Sprint covered up the fact that the extra charges were included in the bills paid by the FBI and others by disguising them as regular surveillance costs, the suit alleges. As a result, the federal government overpaid Sprint by $21 million over a period of three and a half years.
Sprint said it didn't break the law and will fight the charges. (more)
Florida Cops’ Secret Weapon: Warrantless Cell Phone Tracking
Police in Florida have offered a startling excuse for having used a controversial “stingray” cell phone tracking gadget 200 times without ever telling a judge: the device’s manufacturer made them sign a non-disclosure agreement that they say prevented them from telling the courts. (more)
Sunday, March 2, 2014
Business Espionage: Rival CEO Posed as Exec to Get Secrets
The CEO of a sporting goods chain who once appeared on the TV show "Undercover Boss" pretended to be an executive from a rival company in an effort to get confidential information, according to a lawsuit.
Dick's Sporting Goods claims in a lawsuit filed Feb. 20 in Mercer County Court that Mitchell Modell, CEO of Modell's Sporting Goods, showed up at a Dick's store in Princeton in February saying he was a Dick's senior vice president.
Dick's alleges Modell told employees he was to meet the Dick's CEO there and persuaded workers to show him the backroom of the store and to answer questions about the business. Modell gathered information about online sales, including a "ship from store" program that gets products to customers' doors quickly, the lawsuit said. (more)
Security Director Alert: Like electronic eavesdropping, business espionage via social engineering is one of the more common spy tricks. In addition to TSCM, make employee awareness about social engineering part of your counterespionage strategy. This story makes an excellent talking point.
Artist's conception. Not a real executive spying. |
Dick's alleges Modell told employees he was to meet the Dick's CEO there and persuaded workers to show him the backroom of the store and to answer questions about the business. Modell gathered information about online sales, including a "ship from store" program that gets products to customers' doors quickly, the lawsuit said. (more)
Security Director Alert: Like electronic eavesdropping, business espionage via social engineering is one of the more common spy tricks. In addition to TSCM, make employee awareness about social engineering part of your counterespionage strategy. This story makes an excellent talking point.
If Your are Calling the FBI or Secret Service, ...
...don't get the phone number from a Google Maps listing.
Don't trust Google Maps, warns former map-jacker after he was ironically called a 'hero' by the feds he wiretapped.
The incident in question involves an individual posting their own phone number as a Secret Service field office phone number on Google Maps. When unsuspecting citizens utilize this incorrect third party phone number to contact the Secret Service the call is directed through the third party system and recorded. This is not a vulnerability or compromise of our phone system. Virtually any phone number that appears on a crowdsourcing platform could be manipulated in this way.
The Secret Service encourages the general public to visit their website at www.secretservice.gov to obtain accurate contact information for our field offices. (more) (video)
Don't trust Google Maps, warns former map-jacker after he was ironically called a 'hero' by the feds he wiretapped.
The incident in question involves an individual posting their own phone number as a Secret Service field office phone number on Google Maps. When unsuspecting citizens utilize this incorrect third party phone number to contact the Secret Service the call is directed through the third party system and recorded. This is not a vulnerability or compromise of our phone system. Virtually any phone number that appears on a crowdsourcing platform could be manipulated in this way.
The Secret Service encourages the general public to visit their website at www.secretservice.gov to obtain accurate contact information for our field offices. (more) (video)
Anonymous Instant Messaging - Coming Soon
The Tor Foundation is moving forward with a plan to provide its own instant messaging service. Called the Tor Instant Messaging Bundle, the tool will allow people to communicate in real time while preserving anonymity by using chat servers concealed within Tor’s hidden network.
In planning since last July—as news of the National Security Agency’s broad surveillance of instant messaging traffic emerged—the Tor Instant Messaging Bundle (TIMB) should be available in experimental builds by the end of March, based on a roadmap published in conjunction with the Tor Project’s Winter Dev meeting in Iceland.
TIMB will connect to instant messaging servers configured as Tor “hidden services” as well as to commercial IM services on the open Internet. (more)
In planning since last July—as news of the National Security Agency’s broad surveillance of instant messaging traffic emerged—the Tor Instant Messaging Bundle (TIMB) should be available in experimental builds by the end of March, based on a roadmap published in conjunction with the Tor Project’s Winter Dev meeting in Iceland.
TIMB will connect to instant messaging servers configured as Tor “hidden services” as well as to commercial IM services on the open Internet. (more)
How the Avaya Phone on Your Desk Can Be Turned Into A Bug
Security researchers have designed a stealthy eavesdropping attack that sounds like it's straight out of a James Bond movie. It starts with a booby-trapped document that compromises an unpatched laser printer, which in turn converts a popular Internet phone into a covert bugging device.
The proof-of-concept attack exploits currently unpatched vulnerabilities in the Avaya one-X 9608, a popular model of phone that uses the Internet rather than a standard phone line to make and receive calls. Researcher Ang Cui, a Ph.D. candidate at Columbia University and chief scientist at Red Balloon Security, declined to provide many details on the vulnerabilities until users have had time to install a patch that Avaya is expected to release soon. He did say the weaknesses allow devices on the same local network to remotely execute code that causes the device to surreptitiously record all sounds within earshot and transmit them to a server controlled by attackers. He demonstrated a similar bugging vulnerability last year in competing Internet phones designed by Cisco Systems, which has since patched the underlying bugs...
The compromise begins with a booby-trapped document that when printed executes malicious code on certain models of HP LaserJet printers that have not been patched against a critical vulnerability. Once compromised, the printers connect to attack servers, creating a means for outside hackers to bypass corporate firewalls. The attackers then use the printers as a proxy to enumerate and connect to other devices in the corporate network.
Once an Avaya 9608 phone is discovered, the attackers can inject code into it that infects its firmware. The compromise, which survives reboots, activates the phone's microphone without turning on any lights or otherwise giving any indication that anything is amiss. The infected phones can be set up to record conversations only after attacker-chosen keywords are detected. Recorded conversations can be sent through a corporate network onto the open Internet, but the malware also has a secondary method for exfiltration that bypasses any devices that block suspicious network traffic. In the event that such devices are detected, the malware can turn a phone's circuit board into a radio transmitter that sends the recorded conversations to a receiver that's anywhere from several inches to 50 feet away, depending on environmental variables.
The larger point is that bugs in electronics firmware are notoriously easy to exploit, as a small sample of recent stories shows. Even if a target isn't using the phones or printers featured in the demonstration, chances are good that the target is using some constellation of devices that are susceptible to remote hijacking. And besides, many organizations fail to apply firmware updates, so even if a patch has been released, there's a good chance that it will never get installed on many vulnerable devices. (more)
Security Director Alert: Make sure software patching is a priority on the IT department's list. Start with this list for HP printers.
The proof-of-concept attack exploits currently unpatched vulnerabilities in the Avaya one-X 9608, a popular model of phone that uses the Internet rather than a standard phone line to make and receive calls. Researcher Ang Cui, a Ph.D. candidate at Columbia University and chief scientist at Red Balloon Security, declined to provide many details on the vulnerabilities until users have had time to install a patch that Avaya is expected to release soon. He did say the weaknesses allow devices on the same local network to remotely execute code that causes the device to surreptitiously record all sounds within earshot and transmit them to a server controlled by attackers. He demonstrated a similar bugging vulnerability last year in competing Internet phones designed by Cisco Systems, which has since patched the underlying bugs...
The compromise begins with a booby-trapped document that when printed executes malicious code on certain models of HP LaserJet printers that have not been patched against a critical vulnerability. Once compromised, the printers connect to attack servers, creating a means for outside hackers to bypass corporate firewalls. The attackers then use the printers as a proxy to enumerate and connect to other devices in the corporate network.
Once an Avaya 9608 phone is discovered, the attackers can inject code into it that infects its firmware. The compromise, which survives reboots, activates the phone's microphone without turning on any lights or otherwise giving any indication that anything is amiss. The infected phones can be set up to record conversations only after attacker-chosen keywords are detected. Recorded conversations can be sent through a corporate network onto the open Internet, but the malware also has a secondary method for exfiltration that bypasses any devices that block suspicious network traffic. In the event that such devices are detected, the malware can turn a phone's circuit board into a radio transmitter that sends the recorded conversations to a receiver that's anywhere from several inches to 50 feet away, depending on environmental variables.
The larger point is that bugs in electronics firmware are notoriously easy to exploit, as a small sample of recent stories shows. Even if a target isn't using the phones or printers featured in the demonstration, chances are good that the target is using some constellation of devices that are susceptible to remote hijacking. And besides, many organizations fail to apply firmware updates, so even if a patch has been released, there's a good chance that it will never get installed on many vulnerable devices. (more)
Security Director Alert: Make sure software patching is a priority on the IT department's list. Start with this list for HP printers.
Saturday, March 1, 2014
"Black" Smartphones Come of Age
The launch of not one, but two, "Black phones"
this past week may lead people to think that secure cell phones are a hot new item.
Hot, yes. New, no. Many other secure smartphones, not to mention a plethora of apps, have existed for years. Mostly, these phones have been sold to governments and have commanded high prices. Now, as the demand heats up, prices are dropping.
Want a government-level secure, encrypted smartphone at a reduced price? (You know you do. Even if only to attract attention.)
Cryptophone™ today announced. "...special prices on the first two phones of any order placed this week." (more)
this past week may lead people to think that secure cell phones are a hot new item.
Hot, yes. New, no. Many other secure smartphones, not to mention a plethora of apps, have existed for years. Mostly, these phones have been sold to governments and have commanded high prices. Now, as the demand heats up, prices are dropping.
Want a government-level secure, encrypted smartphone at a reduced price? (You know you do. Even if only to attract attention.)
Cryptophone™ today announced. "...special prices on the first two phones of any order placed this week." (more)
Friday, February 28, 2014
Eavesdropping News of the Day
IL - Warren Township High School board member Liz Biondi claimed at a meeting this week that "someone in the district" has wiretapped her telephone. Biondi made the accusation while bantering with John Anderson, board president at Gurnee-based Warren District 121. She did not respond to emailed questions Thursday on why Warren officials would eavesdrop on her or whether she has evidence supporting the wiretap claim. (more)
Alert - Unless you want a public sex tape, you should probably stop using any kind of digital machine to record your intimate acts. The latest leak from Edward Snowden shows how the NSA and the British equivalent Government Communications Headquarters collaborated to intercept webcam images from innocent Internet users. (more)
Turkey - Prime Minister Recep Tayyip ErdoÄŸan has hit back against unprecedented accusations of corruption after the leak of incriminating phone conversations, accusing both prosecutors and police of spying for another country. (more)
Scotland - Michelle Mone's bra firm ordered to pay former director £16k after bugging pot plant in his office. (more)
Alert - Unless you want a public sex tape, you should probably stop using any kind of digital machine to record your intimate acts. The latest leak from Edward Snowden shows how the NSA and the British equivalent Government Communications Headquarters collaborated to intercept webcam images from innocent Internet users. (more)
Turkey - Prime Minister Recep Tayyip ErdoÄŸan has hit back against unprecedented accusations of corruption after the leak of incriminating phone conversations, accusing both prosecutors and police of spying for another country. (more)
Scotland - Michelle Mone's bra firm ordered to pay former director £16k after bugging pot plant in his office. (more)
Thursday, February 27, 2014
Boeing to Launch its Own Black Phone
The world's biggest aerospace company is jumping into the business of making high-security smartphones.
Boeing Co. filed plans this week with the Federal Communications Commission for a smartphone dubbed Boeing Black, which is designed for defense and security customers and won't be available to average consumers. The phone is based on a modified version of Google Inc.'s Android operating system...
Boeing is being stealthy about the project. Without publicly announcing the product, the company posted a description on its website. It said the modular construction of the phone's 5.2-inch-tall body would allow users to attach devices that add such features as advanced location tracking, solar charging, satellite transceivers and biometric sensors.
In Monday's FCC filing, Boeing detailed plans to keep the phone's technology secret, saying it will be sold "in a manner such that low-level technical and operational information about the product will not be provided to the general public."
The filing documents also said the phone, which is about 50% heavier than Apple Inc.'s iPhone 5s and twice as thick, is designed to effectively self-destruct if tampered with: "Any attempt to break open the casing of the device would trigger functions that would delete the data and software contained within the device and make the device inoperable." (more)
Boeing Co. filed plans this week with the Federal Communications Commission for a smartphone dubbed Boeing Black, which is designed for defense and security customers and won't be available to average consumers. The phone is based on a modified version of Google Inc.'s Android operating system...
Boeing is being stealthy about the project. Without publicly announcing the product, the company posted a description on its website. It said the modular construction of the phone's 5.2-inch-tall body would allow users to attach devices that add such features as advanced location tracking, solar charging, satellite transceivers and biometric sensors.
In Monday's FCC filing, Boeing detailed plans to keep the phone's technology secret, saying it will be sold "in a manner such that low-level technical and operational information about the product will not be provided to the general public."
The filing documents also said the phone, which is about 50% heavier than Apple Inc.'s iPhone 5s and twice as thick, is designed to effectively self-destruct if tampered with: "Any attempt to break open the casing of the device would trigger functions that would delete the data and software contained within the device and make the device inoperable." (more)
Wednesday, February 26, 2014
New Tiny Ultrasound Camera Sees What's in Your Heart ...really
Developed by a team at the Georgia Institute of Technology, the device consists of a 1.5-mm-wide disc-shaped head, from which trails 13 tiny joined cables. The idea is that it will be inserted into a patient's coronary blood vessels or heart, snaking its way through while being pushed or pulled from outside the body via an integrated 430-micron-wide guide wire, all the while using the cables to transmit ultrasound imagery.
Its head is built around a single silicon chip, which is equipped with a dual-ring array of 56 ultrasound transmit elements and 48 receive elements. Much of the processing of the ultrasound data is performed onboard the chip itself, meaning that less information has to carried outside the body – this is why it requires no more than 13 cables, allowing its consolidated "umbilical cord" to stay skinny and flexible enough to easily move through blood vessels. (more)
Its head is built around a single silicon chip, which is equipped with a dual-ring array of 56 ultrasound transmit elements and 48 receive elements. Much of the processing of the ultrasound data is performed onboard the chip itself, meaning that less information has to carried outside the body – this is why it requires no more than 13 cables, allowing its consolidated "umbilical cord" to stay skinny and flexible enough to easily move through blood vessels. (more)
Off-Hook Telecoms Call for Attorneys' Fees - Disconnected
AT&T, Verizon and other telecoms cannot recover attorneys' fees after ducking claims that they overcharged for electronic surveillance, a federal judge ruled.
Former New York Deputy Attorney General John Prather had filed the lawsuit on behalf of the U.S. government, claiming that AT&T, Verizon, Qwest Communications International and Sprint Nextel overcharged federal, state and city governments for services under the Communications Assistance to Law Enforcement Agencies Act (CALEA), which requires the companies to provide the government with electronic surveillance of their customers in exchange for reasonable expenses.
Prather claimed to have "observed eavesdropping charges increase tenfold after CALEA despite changes in technology that should have made it easier for Telecoms to provide wiretaps, and believed that the Telecoms were overcharging for wiretaps." (more)
Former New York Deputy Attorney General John Prather had filed the lawsuit on behalf of the U.S. government, claiming that AT&T, Verizon, Qwest Communications International and Sprint Nextel overcharged federal, state and city governments for services under the Communications Assistance to Law Enforcement Agencies Act (CALEA), which requires the companies to provide the government with electronic surveillance of their customers in exchange for reasonable expenses.
Prather claimed to have "observed eavesdropping charges increase tenfold after CALEA despite changes in technology that should have made it easier for Telecoms to provide wiretaps, and believed that the Telecoms were overcharging for wiretaps." (more)
Tuesday, February 25, 2014
Wiretapping Case Costs South Bend, IN almost $1 Million... so far
Summary: Former police communications director KarenDePaepe was fired in 2012 in the wake of an investigation into whether
she and Chief Boykins violated the federal Wiretap Act by recording certain
telephone conversations between Metro Homicide Commander Tim Corbett,
officers Steve Richmond, David Wells and Brian Young and Young’s wife
Sandy Young.
Timeline of the case.
TV report.
Timeline of the case.
TV report.
Brazil, Europe Plan Undersea Cable to Skirt Spying
Brazil and the European Union agreed on Monday to lay an undersea
communications cable from Lisbon to Fortaleza to reduce Brazil’s
reliance on the United States after Washington spied on Brasilia.
At a summit in Brussels, Brazilian President Dilma Rousseff said the $185 million cable project was central to “guarantee the neutrality” of the Internet, signaling her desire to shield Brazil’s Internet traffic from U.S. surveillance. (more)
Shhhh... Apparently, they missed reading this, this 1918 experiment and this modern day story. Not to mention... Operation Ivy Bells, Operation Tempora and Glimmerglass.
At a summit in Brussels, Brazilian President Dilma Rousseff said the $185 million cable project was central to “guarantee the neutrality” of the Internet, signaling her desire to shield Brazil’s Internet traffic from U.S. surveillance. (more)
Shhhh... Apparently, they missed reading this, this 1918 experiment and this modern day story. Not to mention... Operation Ivy Bells, Operation Tempora and Glimmerglass.
Computer Allegedly Bugged by Ethiopians
A Maryland man is suing the Ethiopian government after it was discovered that it infected his computer with spyware, wiretapped his calls made via Skype, and monitored his family’s computers for months.
"We have clear evidence of a foreign government secretly infiltrating an American's computer in America, listening to his calls, and obtaining access to a wide swath of his private life," said Electronic Frontier Foundation staff attorney Nate Cardozo.
"The current Ethiopian government has a well-documented history of human rights violations against anyone it sees as political opponents. (more)
"We have clear evidence of a foreign government secretly infiltrating an American's computer in America, listening to his calls, and obtaining access to a wide swath of his private life," said Electronic Frontier Foundation staff attorney Nate Cardozo.
"The current Ethiopian government has a well-documented history of human rights violations against anyone it sees as political opponents. (more)
Turkish Watergate - Surprise - The Guard Gets Blamed for Bugging the Place
Turkey - A police officer only known as S.D., allegedly responsible for placing a bugging device in Prime Minister Recep Tayyip ErdoÄŸan's study inside his Ankara residence, has reportedly been working as a bodyguard for Saudi Arabian businessman Yasin al-Qadi, the Taraf daily claimed on Tuesday.
“It has come out that S.D., who has been accused in connection with the bugging device discovered in Prime Minister ErdoÄŸan's Ankara house, was assigned to protect Yasin al-Qadi,” Emre Uslu wrote in his Taraf column, which was also the daily's headline story.
Four covert listening devices, as ErdoÄŸan explained in December 2012, had been discovered in the office of his Subayevleri home in Ankara, without detailing exactly when the devices had been found, adding that an investigation was being launched. (more)
“It has come out that S.D., who has been accused in connection with the bugging device discovered in Prime Minister ErdoÄŸan's Ankara house, was assigned to protect Yasin al-Qadi,” Emre Uslu wrote in his Taraf column, which was also the daily's headline story.
Four covert listening devices, as ErdoÄŸan explained in December 2012, had been discovered in the office of his Subayevleri home in Ankara, without detailing exactly when the devices had been found, adding that an investigation was being launched. (more)
Netflix New Drone Delivery Service
Another nail in the Post Office's Coffin...
Sorry, this just couldn't wait until April 1st.
Sorry, this just couldn't wait until April 1st.
Going Down - Goldman Elevator Eavesdropper Exposed
The author of the anonymous Twitter feed purportedly recounting conversations in the elevators of Goldman Sachs has been unmasked as a former bond executive living in Texas who has never worked at the bank. The revelation hasn't affected John Lefevre's six-figure book deal with Simon & Schuster based on the feed @GSElevator. (more)
Monday, February 24, 2014
"My ankle bracelets are so good, I wear one myself!"
CA - FBI agents arrested a Mexican tycoon named Jose Susumo Azano Matsura at his Coronado, Calif. home on Wednesday as part of a political bribery investigation based on captured emails, seized banking records, and covertly recorded conversations.
The unfolding scandal is soaked in irony: Azano is a surveillance evangelist whose company won a secret, no-bid contract with the Mexican military for computer and mobile phone hacking and spying technology in 2011. He is chairman of a company called Security Tracking Devices SA de CV, and he is now chained to a tracking device—on house arrest. (more)
The unfolding scandal is soaked in irony: Azano is a surveillance evangelist whose company won a secret, no-bid contract with the Mexican military for computer and mobile phone hacking and spying technology in 2011. He is chairman of a company called Security Tracking Devices SA de CV, and he is now chained to a tracking device—on house arrest. (more)
Labels:
business,
cell phone,
Darwin,
employee,
ethics,
government,
lawsuit,
political,
product,
tracking,
weird
Privacy Art that Tells You a Story... really
This company (lithographs.com) turns the text of various books into a piece of
appropriately themed text-art and makes lithographs, tees and tote-bags
out of it.
Cory Doctorow announced that the company has produced a line of Lithographs based on his novel Little Brother, with a gorgeous anti-surveillance design by Benjy Brooke. (more)
via wikipedia.com...
Little Brother is a novel by Cory Doctorow, published by Tor Books. It was released on April 29, 2008. The novel is about four teenagers in San Francisco who, in the aftermath of a terrorist attack on the San Francisco – Oakland Bay Bridge and BART system, defend themselves against the Department of Homeland Security's attacks on the Bill of Rights. The novel is available for free on the author's website under a Creative Commons license, keeping it accessible to all.
The book debuted at No. 9 on The New York Times Best Seller list, children's chapter book section, in May 2008. As of July 2, it had spent a total of six weeks on the list, rising to the No. 8 spot. Little Brother won the 2009 White Pine Award, the 2009 Prometheus Award. and the 2009 John W. Campbell Memorial Award. It also was a finalist for the Hugo Award for Best Novel. Little Brother received the Sunburst Award in the young adult category.
The New York Times says, “Little Brother isn't shy about its intent to disseminate subversive ideas to a young audience. The novel comes with two afterword essays by cryptographer and computer security specialist Bruce Schneier, and hacker Andrew "bunnie" Huang, and has a bibliography of techno-countercultural writings, from Jack Kerouac's "On the Road" to Schneier’s "Applied Cryptography." (more)
Cory Doctorow announced that the company has produced a line of Lithographs based on his novel Little Brother, with a gorgeous anti-surveillance design by Benjy Brooke. (more)
via wikipedia.com...
Little Brother is a novel by Cory Doctorow, published by Tor Books. It was released on April 29, 2008. The novel is about four teenagers in San Francisco who, in the aftermath of a terrorist attack on the San Francisco – Oakland Bay Bridge and BART system, defend themselves against the Department of Homeland Security's attacks on the Bill of Rights. The novel is available for free on the author's website under a Creative Commons license, keeping it accessible to all.
The book debuted at No. 9 on The New York Times Best Seller list, children's chapter book section, in May 2008. As of July 2, it had spent a total of six weeks on the list, rising to the No. 8 spot. Little Brother won the 2009 White Pine Award, the 2009 Prometheus Award. and the 2009 John W. Campbell Memorial Award. It also was a finalist for the Hugo Award for Best Novel. Little Brother received the Sunburst Award in the young adult category.
The New York Times says, “Little Brother isn't shy about its intent to disseminate subversive ideas to a young audience. The novel comes with two afterword essays by cryptographer and computer security specialist Bruce Schneier, and hacker Andrew "bunnie" Huang, and has a bibliography of techno-countercultural writings, from Jack Kerouac's "On the Road" to Schneier’s "Applied Cryptography." (more)
Blackphone - A Smartphone That Keeps Its Mouth Shut
via the Blackphone store...
Blackphone. The high-end smartphone which puts privacy and security ahead of everything else.
Blackphone includes a unique combination of operating system and application tools which offer unparalleled security and privacy to information workers, executives, public figures, and anyone else unwilling to cede ownership of their privacy to other authorities. Blackphone's PrivatOS, built on Android™, and combined with a full suite of privacy-enabled applications, allows users to regain control over their communications activities.
No longer will the use of a smartphone demand acceptance of unauthorized surveillance, commercial exploitation of activity data, and the loss of privacy, security and fundamental human rights...
Selling for US$629 (plus shipping and any local taxes or duties for the destination address), Blackphone is a real no-excuses solution for traveling executives looking to BYOD...
Blackphone comes unlocked and features several pre-installed privacy tools, all of which are fully enabled for at least two years of usage. These tools include the Silent Circle suite of apps, including Silent Phone, Silent Text, and Silent Contacts; anonymous search, private browsing, and VPN from Disconnect; and secure cloud file storage from SpiderOak. In addition, Blackphone ships with the Smart WiFi Manager from Mike Kershaw, Chief Architect for SGP Technologies, and a powerful remote-wipe and device recovery tool. (more)
Blackphone. The high-end smartphone which puts privacy and security ahead of everything else.
Blackphone includes a unique combination of operating system and application tools which offer unparalleled security and privacy to information workers, executives, public figures, and anyone else unwilling to cede ownership of their privacy to other authorities. Blackphone's PrivatOS, built on Android™, and combined with a full suite of privacy-enabled applications, allows users to regain control over their communications activities.
No longer will the use of a smartphone demand acceptance of unauthorized surveillance, commercial exploitation of activity data, and the loss of privacy, security and fundamental human rights...
Selling for US$629 (plus shipping and any local taxes or duties for the destination address), Blackphone is a real no-excuses solution for traveling executives looking to BYOD...
Blackphone comes unlocked and features several pre-installed privacy tools, all of which are fully enabled for at least two years of usage. These tools include the Silent Circle suite of apps, including Silent Phone, Silent Text, and Silent Contacts; anonymous search, private browsing, and VPN from Disconnect; and secure cloud file storage from SpiderOak. In addition, Blackphone ships with the Smart WiFi Manager from Mike Kershaw, Chief Architect for SGP Technologies, and a powerful remote-wipe and device recovery tool. (more)
Guzman Trapped By Tap
After fruitlessly pursuing one of the world's top drug lords for years, authorities finally drew close to Joaquin "El Chapo" Guzman using a cellphone found at a house where drugs were stored.
The phone belonging to a Guzman aide was recovered with clues from a U.S. wiretap and provided a key break in the long chase to find Guzman, officials told The Associated Press on Sunday.
Another big leap forward came after police analyzed information from a different wiretap that pointed them to a beachfront condo where the legendary leader of the Sinaloa cartel was hiding, according to a U.S. government official and a senior federal law enforcement official. (more)
The phone belonging to a Guzman aide was recovered with clues from a U.S. wiretap and provided a key break in the long chase to find Guzman, officials told The Associated Press on Sunday.
Another big leap forward came after police analyzed information from a different wiretap that pointed them to a beachfront condo where the legendary leader of the Sinaloa cartel was hiding, according to a U.S. government official and a senior federal law enforcement official. (more)
Privacy Hero - Keep Your Snooping Nose Out of My Car
NY - Sen. Chuck Schumer is calling on federal regulators to set guidelines to protect consumers as car companies collect personal information through “smart car” technology and sell it to third parties.
The New York Democrat announced Sunday that he’s asking the Federal Trade Commission and the National Highway Traffic Safety Administration to establish guidelines requiring carmakers to notify drivers when they are being tracked and allow drivers to opt out from sharing information. (more)
The New York Democrat announced Sunday that he’s asking the Federal Trade Commission and the National Highway Traffic Safety Administration to establish guidelines requiring carmakers to notify drivers when they are being tracked and allow drivers to opt out from sharing information. (more)
Sunday, February 23, 2014
Ireland's Watergate Reveals Bug Sweeps (TSCM) are Common Business Practice
Ireland - The Department of Finance and the National Treasury Management Agency carry out regular sweeps to ensure they are not subject to any bugging or surveillance.
Minister for Finance Michael Noonan confirmed the steps were taken due to the commercial sensitivity of issues being discussed within the department... Mr Noonan said he was “aware of the importance of maintaining security given the commercially sensitive meetings held in the department and the sensitive information held by the department”...
A spokesman for the NTMA said it also carries out sweeps.
“Given the sensitivity of the business activities of the NTMA and its various linked business units, including Nama, the agency carries out regular, comprehensive security checks, including sweeps for any evidence of bugging. ” (more)
Minister for Finance Michael Noonan confirmed the steps were taken due to the commercial sensitivity of issues being discussed within the department... Mr Noonan said he was “aware of the importance of maintaining security given the commercially sensitive meetings held in the department and the sensitive information held by the department”...
A spokesman for the NTMA said it also carries out sweeps.
“Given the sensitivity of the business activities of the NTMA and its various linked business units, including Nama, the agency carries out regular, comprehensive security checks, including sweeps for any evidence of bugging. ” (more)
Saturday, February 22, 2014
Business Espionage: Casino Caught Spying - Fine $1 million
NV - The commission considered a two-count complaint by the Gaming Control
Board against Peppermill Casinos Inc., which owns operations in Reno,
Sparks, Henderson and Wendover, for sending out an employee to illegally
gather information on the slot machine win percentages of its
competitors. The complaint also recommended a $1 million fine.
The complaint alleged that since 2011, Peppermill employee Ryan Tors had a slot machine "reset" key that allowed him to enter the slots in other competitors to determine the amount of hold — the amount kept by casinos on wagers.
On July 12, hotel security officers at the Grand Sierra Resort in Reno caught Tors using a reset key at their property. An investigation revealed that, beginning at least in 2011, Tors had used the reset key to obtain the information in 10 other casinos in the Reno-Sparks and Wendover areas. (more)
The complaint alleged that since 2011, Peppermill employee Ryan Tors had a slot machine "reset" key that allowed him to enter the slots in other competitors to determine the amount of hold — the amount kept by casinos on wagers.
On July 12, hotel security officers at the Grand Sierra Resort in Reno caught Tors using a reset key at their property. An investigation revealed that, beginning at least in 2011, Tors had used the reset key to obtain the information in 10 other casinos in the Reno-Sparks and Wendover areas. (more)
FutureWatch: Your Visitors are Spying, Just by Walking Around
Google on Thursday unveiled Project Tango, an effort to "give mobile devices a human-scale understanding of space and motion" using a combination of robotics and computer vision.
The project has a prototype phone loaded with sensors and software "designed to track the full 3D motion of the device, while simultaneously creating a map of the environment," the Project Tango leader Johnny Lee said in a blog post. (more)
FutureWatch...
Smartphone business espionage spy tools are coming. A visitor to your organization will be able to walk out with a floor map, record the sounds of your manufacturing process (for later analysis), and use other sensors to gather competitive intelligence. And, they won't be as obvious as the folks you saw in the video.
Security Directors: I wasn't kidding. It is time to create a Surreptitious Workplace Recording Policy.
Need help?
Call me.
The project has a prototype phone loaded with sensors and software "designed to track the full 3D motion of the device, while simultaneously creating a map of the environment," the Project Tango leader Johnny Lee said in a blog post. (more)
FutureWatch...
Smartphone business espionage spy tools are coming. A visitor to your organization will be able to walk out with a floor map, record the sounds of your manufacturing process (for later analysis), and use other sensors to gather competitive intelligence. And, they won't be as obvious as the folks you saw in the video.
Security Directors: I wasn't kidding. It is time to create a Surreptitious Workplace Recording Policy.
Need help?
Call me.
Security Director Alert - New Audio & Video Bug. Records and Stores 24-hours. Blasts it out via Wi-Fi in 5-minutes.
This is the new eavesdropping technology you are up against.
• Do you conduct regular information security surveys (TSCM)?
• Are your current current TSCM bug sweeps capable of detecting new technologies like the device shown?
If the answer to either question is no, contact me.
via Acustek...
The concept of the GEM AUDIO/VIDEO is... storing audio and video files on micro-SD card up to 32 GB and then forward, ultra-fast download, through protected WiFi connection.
DESIGNED FOR COVERT USE
The GEM WiFi A/V is a small device integrating a small powerful audio-video recorder, external miniature video camera and concealed built-in Wifi antenna for transmission together. This allows the user ultra fast download of large volumes of high quality audio and video without the need of direct connection with the recorder. It can be set up to record with multiple advanced timers or by voice activation mode. The supplied video camera is capable to provide good quality picture at very low light conditions, with sensitivity of .3lux.
HIGH AUTONOMY AND CAPACITY All audio records are stored to micro SD memory (up-to 32Gb) and can be downloaded at any time, or listened to "Live".
ULTRA FAST DOWNLOAD SPEED Downloading over WiFi is very fast and takes approx. 5 minutes for every 24 hours stored audio record.
DEDICATED FOR CONCEALED OPERATION All records are exported or reviewed securely via the included software. GEM WiFi doesn't transmit anything on air when disconnected from the host computer. It searches for the WiFi signal only from user host computer; this makes this device very confidential and makes it virtually impossible to find by any WiFi wireless spy detection technology such as RF Analysers. (We know how to find it.)
SECURITY The audio data transfer is encrypted, each record has a precision timeline and can only be reviewed using the supplied software, the records may also be password protected. If the recorder is intercepted then the micro SD card is unusable. (more)
• Do you conduct regular information security surveys (TSCM)?
• Are your current current TSCM bug sweeps capable of detecting new technologies like the device shown?
If the answer to either question is no, contact me.
via Acustek...
The concept of the GEM AUDIO/VIDEO is... storing audio and video files on micro-SD card up to 32 GB and then forward, ultra-fast download, through protected WiFi connection.
DESIGNED FOR COVERT USE
The GEM WiFi A/V is a small device integrating a small powerful audio-video recorder, external miniature video camera and concealed built-in Wifi antenna for transmission together. This allows the user ultra fast download of large volumes of high quality audio and video without the need of direct connection with the recorder. It can be set up to record with multiple advanced timers or by voice activation mode. The supplied video camera is capable to provide good quality picture at very low light conditions, with sensitivity of .3lux.
HIGH AUTONOMY AND CAPACITY All audio records are stored to micro SD memory (up-to 32Gb) and can be downloaded at any time, or listened to "Live".
ULTRA FAST DOWNLOAD SPEED Downloading over WiFi is very fast and takes approx. 5 minutes for every 24 hours stored audio record.
DEDICATED FOR CONCEALED OPERATION All records are exported or reviewed securely via the included software. GEM WiFi doesn't transmit anything on air when disconnected from the host computer. It searches for the WiFi signal only from user host computer; this makes this device very confidential and makes it virtually impossible to find by any WiFi wireless spy detection technology such as RF Analysers. (We know how to find it.)
SECURITY The audio data transfer is encrypted, each record has a precision timeline and can only be reviewed using the supplied software, the records may also be password protected. If the recorder is intercepted then the micro SD card is unusable. (more)
Sinn Féin's Gerry Adams on Electronic Surveillance Bugs
Bugging devices in all shapes and forms, tracking devices to monitor movement, and remote controlled surveillance cameras were all an integral part of the British government’s war in the north. Over the years they were found in the homes of republican activists, under floor boards and cabinets, attached to wooden beams in attics, and hidden in the insides of cars.
In the years since the war ended the surveillance war has continued. It has become ever more sophisticated. Now according to some reports they can even bug your clothes...
The surveillance technology involved today reads like science fiction but it is real not imagined and very effective, and most times you don’t know that it is there. (more)
In the years since the war ended the surveillance war has continued. It has become ever more sophisticated. Now according to some reports they can even bug your clothes...
The surveillance technology involved today reads like science fiction but it is real not imagined and very effective, and most times you don’t know that it is there. (more)
Thursday, February 20, 2014
Thank You for Punching Those Goofy Little Buttons
TSCM Find Confirmed - Three Bugs Found in Jakarta Governor's Home Office
Indonesia - Jakarta Governor, Joko `Jokowi` Widodo confirmed the bugging device findings at his home office...
Jokowi stated that the findings of some bugging devices in his home office was found using a detector device in December 2013...
He described, those bugging devices were found in three different places, such as bedroom, private living room, and dining room used to hold meetings "Actually, I don`t want to talk about this. But in fact there are three devices in the home office found," he disclosed. (more)
Jokowi stated that the findings of some bugging devices in his home office was found using a detector device in December 2013...
He described, those bugging devices were found in three different places, such as bedroom, private living room, and dining room used to hold meetings "Actually, I don`t want to talk about this. But in fact there are three devices in the home office found," he disclosed. (more)
Hero: TSCM Bug Report Author Fired for Not Changing Report Under Political Pressure
Turkey - The former head of the Scientific and Technological Research Council of Turkey's (TÃœBÄ°TAK) Research Center for Advanced Technologies on Informatics and Information Security (BÄ°LGEM) has said he was forced to make changes in a report as part of an investigation into a "bugging device" found at the prime minister's office.
In a blistering statement over his dismissal from the top post at BÄ°LGEM, a critical department within TÃœBÄ°TAK that prepares expert reports for court cases and state agencies, Hasan Palaz said he was forced to make changes on a scientific report that was prepared as part of a criminal investigation into the installment of bugging devices at Prime Minister Recep Tayyip ErdoÄŸan's office in Parliament and his home in 2012...
In a stern warning, he said the government's interference in TÃœBÄ°TAK reports and politicians' meddling in scientific inquiries would be suicide for the science world.
The discovery of the bugging devices led to an outcry and fueled a debate over who is responsible for monitoring and bugging the prime minister's office. (more)
Note: Although this translated news story makes it sound as if he did make the change, a careful reading of the whole story indicates he did not, hence his dismissal.
From the other side of the fence in Turkey today...
Turkey - Battling a corruption scandal, Turkish Prime Minister Tayyip Erdogan is seeking broader powers for his intelligence agency, including more scope for eavesdropping and legal immunity for its top agent, according to a draft law seen by Reuters. (more)
UPDATE: (2/22/14) - Turkish prime minister Recep Tayyip Erdogan has said that two suspects believed to be involved in a bugging scandal have fled the country. (more)
In a blistering statement over his dismissal from the top post at BÄ°LGEM, a critical department within TÃœBÄ°TAK that prepares expert reports for court cases and state agencies, Hasan Palaz said he was forced to make changes on a scientific report that was prepared as part of a criminal investigation into the installment of bugging devices at Prime Minister Recep Tayyip ErdoÄŸan's office in Parliament and his home in 2012...
In a stern warning, he said the government's interference in TÃœBÄ°TAK reports and politicians' meddling in scientific inquiries would be suicide for the science world.
The discovery of the bugging devices led to an outcry and fueled a debate over who is responsible for monitoring and bugging the prime minister's office. (more)
Note: Although this translated news story makes it sound as if he did make the change, a careful reading of the whole story indicates he did not, hence his dismissal.
From the other side of the fence in Turkey today...
Turkey - Battling a corruption scandal, Turkish Prime Minister Tayyip Erdogan is seeking broader powers for his intelligence agency, including more scope for eavesdropping and legal immunity for its top agent, according to a draft law seen by Reuters. (more)
UPDATE: (2/22/14) - Turkish prime minister Recep Tayyip Erdogan has said that two suspects believed to be involved in a bugging scandal have fled the country. (more)
Audio & Video Eavesdropping on NASCAR
NASCAR fans can listen to an uncensored buffet of communication ranging from foul-mouthed rants to finish line screams of victory on FanVision controllers that provide access to live broadcast feeds, onboard cameras, official timing, data, statistics, instant replays and a digital radio scanner.
At Daytona, the device rents for $59.99 for the weekend. (Or, it may be purchased, plus a per race subscription.) They have to be returned no later than 90 minutes after the race ends. (more)
Other NASCAR eavesdropping options...
• Sportstronics NASCAR Proscan 100 Scanner
• eBay
At Daytona, the device rents for $59.99 for the weekend. (Or, it may be purchased, plus a per race subscription.) They have to be returned no later than 90 minutes after the race ends. (more)
Other NASCAR eavesdropping options...
• Sportstronics NASCAR Proscan 100 Scanner
• eBay
Wednesday, February 19, 2014
Just Change 'Baby Monitor' to 'Bug' for High Tech Eavesdropping
Smart Baby Monitor (Bug) in your pocket!
The baby monitor (bug) for the smartphone age. Includes all standard features of a hardware baby monitor (bug) and some surprising extras.
Works at any distance. Dormi can use any available route to connect parent and child units (WiFi, mobile data), and can work even when Internet is not available (WiFi Direct, HotSpot / AP)
Ultimate feature?
You can connect MULTIPLE devices in parent mode to a single child device simultaneously.
Intelligent audio
You don't need to configure microphone sensitivity - Dormi adjusts to noise levels automatically. Leave the device several meters away from the sleeping baby (target) and it will still be able to detect when it cries (or plans a corporate takeover) and amplify the sound for the parent device as if it were placed right next to the baby (target).
Press and hold the Listen button to hear sound from the child device even while the baby (target) is not crying (or selling stocks). Equally, use the Talk button to talk back to soothe or calm the baby (or spook the hell out of your target).
Convenient info-center
With Dormi you always know what's going on. All important information about the child device is always available while monitoring. If connection with the child device is lost, the parent device will notify you.
Dormi will even notify you about missed calls and new text messages received on the child device, so you will not miss something important while not having direct access to the device.
If the baby (target) starts crying (or talking with the General Counsel) while you are on the phone, you will be notified with vibrations and a gentle beep to your ear - without abruptly disturbing the phone call, yet letting you know.
Of course, Dormi works in the background, even when the device screen is off. Great care has been taken to limit battery usage - you can monitor for many hours on one charge.
Have you got an old Android device sitting in the drawer that you have no use for? Not anymore - try using it as the child device with Dormi. We have made the effort to ensure it runs from Android 2.3 onwards.
Start right away...
All you have to do after install is pair two devices together (our autodiscovery feature makes this a breeze) and start monitoring right away.
Although unlimited monitoring is paid, you will get 4 hours of monitoring for free every month.
If you do decide to make a purchase, you only have to do so on one of the devices participating in the monitoring. (more)
Why do I mention it?
So you will know what you are up against.
The baby monitor (bug) for the smartphone age. Includes all standard features of a hardware baby monitor (bug) and some surprising extras.
Works at any distance. Dormi can use any available route to connect parent and child units (WiFi, mobile data), and can work even when Internet is not available (WiFi Direct, HotSpot / AP)
Ultimate feature?
You can connect MULTIPLE devices in parent mode to a single child device simultaneously.
Intelligent audio
You don't need to configure microphone sensitivity - Dormi adjusts to noise levels automatically. Leave the device several meters away from the sleeping baby (target) and it will still be able to detect when it cries (or plans a corporate takeover) and amplify the sound for the parent device as if it were placed right next to the baby (target).
Press and hold the Listen button to hear sound from the child device even while the baby (target) is not crying (or selling stocks). Equally, use the Talk button to talk back to soothe or calm the baby (or spook the hell out of your target).
Convenient info-center
With Dormi you always know what's going on. All important information about the child device is always available while monitoring. If connection with the child device is lost, the parent device will notify you.
Dormi will even notify you about missed calls and new text messages received on the child device, so you will not miss something important while not having direct access to the device.
If the baby (target) starts crying (or talking with the General Counsel) while you are on the phone, you will be notified with vibrations and a gentle beep to your ear - without abruptly disturbing the phone call, yet letting you know.
Of course, Dormi works in the background, even when the device screen is off. Great care has been taken to limit battery usage - you can monitor for many hours on one charge.
Have you got an old Android device sitting in the drawer that you have no use for? Not anymore - try using it as the child device with Dormi. We have made the effort to ensure it runs from Android 2.3 onwards.
Start right away...
All you have to do after install is pair two devices together (our autodiscovery feature makes this a breeze) and start monitoring right away.
Although unlimited monitoring is paid, you will get 4 hours of monitoring for free every month.
If you do decide to make a purchase, you only have to do so on one of the devices participating in the monitoring. (more)
Why do I mention it?
So you will know what you are up against.
Jazzpunk: A Spy Game Full Of Jokes
Jazzpunk has been nominated for the grand prize at the 2014 Independent Games Festival, is to video games what movies like Airplane!, The Naked Gun and Hot Shots are to film...
The setup is charmingly basic and silly, like the rest of the game. After an upbeat and stylized Saul Bass-inspired intro, you are plopped into your role as Polyblank, a spy for an unnamed organization helmed by a bureau chief who makes his office in a subway car and sounds like the person that delivered Ethan Hunt his impossible missions, perhaps if he was talking through a fishbowl.
With the satisfying wheeze of an obviously placed whoopee cushion, the game wastes no time letting you know you are here for the gags, not the story. (more)
Jazzpunk is a first-person comedy adventure game set in an alternate-reality Cold War World, plagued with Corporate Espionage, CyberCrime™, and Sentient Martinis. Gameplay is inspired by spoof comedy films and cartoons of yester-year (eg: Naked Gun, Airplane!, Hot Shots, etc), with a focus on weird gadgets, exotic locales, and open-world style exploration.
The setup is charmingly basic and silly, like the rest of the game. After an upbeat and stylized Saul Bass-inspired intro, you are plopped into your role as Polyblank, a spy for an unnamed organization helmed by a bureau chief who makes his office in a subway car and sounds like the person that delivered Ethan Hunt his impossible missions, perhaps if he was talking through a fishbowl.
With the satisfying wheeze of an obviously placed whoopee cushion, the game wastes no time letting you know you are here for the gags, not the story. (more)
Jazzpunk is a first-person comedy adventure game set in an alternate-reality Cold War World, plagued with Corporate Espionage, CyberCrime™, and Sentient Martinis. Gameplay is inspired by spoof comedy films and cartoons of yester-year (eg: Naked Gun, Airplane!, Hot Shots, etc), with a focus on weird gadgets, exotic locales, and open-world style exploration.
Subscribe to:
Posts (Atom)