Kim Dotcom, founder of the file hosting service Mega, is preparing to launch an encrypted video-calling and chat service that will shield its users’ communications from government surveillance.
“Mega will soon release a fully encrypted and browser-based video call and chat service including high-speed file transfers,” the entrepreneur known as Kim Dotcom said in a tweet.
Kim Dotcom is positioning the service as a more secure way to chat and collaborate online free of government surveillance or spying, partly by virtue of Mega being based in New Zealand. Kim Dotcom has been teasing the app for some time, though now it appears nearly ready for prime time.
(more)
Wednesday, January 7, 2015
Movie Scoop - The Man from U.N.C.L.E. (returns)
Henry Cavill (Man of Steel) stars as Napoleon Solo opposite Armie Hammer (The Social Network) as Illya Kuryakin in director Guy Ritchie’s action adventure The Man from U.N.C.L.E., a fresh take on the hugely popular 1960s television series. Set against the backdrop of the early 1960s, at the height of the Cold War, The Man from U.N.C.L.E. centers on CIA agent Solo and KGB agent Kuryakin. Forced to put aside longstanding hostilities, the two team up on a joint mission to stop a mysterious international criminal organization, which is bent on destabilizing the fragile balance of power through the proliferation of nuclear weapons and technology. The duo’s only lead is the daughter of a vanished German scientist, who is the key to infiltrating the criminal organization, and they must race against time to find him and prevent a worldwide catastrophe.
The Man of U.N.C.L.E. is expected in theaters from August 14th, 2015.
Until then...
The Man of U.N.C.L.E. is expected in theaters from August 14th, 2015.
Until then...
Weird Spy News - Man in trunk spying on car passenger, CIA admits UFOs, and more...
NJ - Two men were arrested Monday after police say they were found with drugs while trying to spy on someone else. ...police pulled Edguardo Mendez, 24, of Newark, over at 2:54 a.m. Monday while he was driving with a passenger... During the stop, officers found that another man, Trevor Torres, 21, of Belleville, was hiding in the car's trunk... Torres, “was a surprise to the front seat passenger whom (he) was allegedly spying on,” Bloomfield Sgt. Anthony Servedio said... Torres was arrested on multiple drug charges... Mendez was charged with marijuana possession... Police did not immediately respond to questions about the men’s relationship to the passenger, or why the two were trying to spy.
(more)
Spy on and play with your pet from afar with Petcube.
The Central Intelligence Agency (CIA) has recently taken responsibility for at least half of all UFO sightings between 1950s-60s... A previously confidential CIA document revealed that most of the sightings were actually U-2 spy planes.
(See Pages 72-73.)
And... What The Hell Is Going On In The Buick Commercial Where The Couple Is Spying On The Garcias?
(more)
Spy on and play with your pet from afar with Petcube.
The Central Intelligence Agency (CIA) has recently taken responsibility for at least half of all UFO sightings between 1950s-60s... A previously confidential CIA document revealed that most of the sightings were actually U-2 spy planes.
(See Pages 72-73.)
And... What The Hell Is Going On In The Buick Commercial Where The Couple Is Spying On The Garcias?
Tuesday, January 6, 2015
No Warrant Wiretaps - There is a Santa "Clause"
If you're in a public place, don't expect your phone calls and texts to stay private. At least not if the FBI flies a Cessna over your head or drives a car around your neighborhood while you're out for a walk.
The FBI won't bother to obtain search warrants before it uses interception devices on people in public, according to a letter written by Senate Judiciary Committee Chairman Patrick Leahy (D-Vt.) and staffer Sen. Chuck Grassley (R-Iowa).
These devices include Stingrays, the cell-tower decoy interception devices used to scoop up data from devices around it. The FBI puts Stingrays and similar devices known as dirtboxes in cars and small airplanes as a way to quickly dragnet data from a large number of devices while it is hunting for a device that belongs to a suspect.
(more)
![]() |
Warrant? |
These devices include Stingrays, the cell-tower decoy interception devices used to scoop up data from devices around it. The FBI puts Stingrays and similar devices known as dirtboxes in cars and small airplanes as a way to quickly dragnet data from a large number of devices while it is hunting for a device that belongs to a suspect.
(more)
Is it OK to spy on your kids? (CNN)
Whether you think spying on your kids is acceptable in today's digital age or a breach of trust seems to really depend on how you define "spying" in the first place.
In conversations over email with parents across the country, it's clear that people have dramatically different views about the definition and whether it's an appropriate behavior to help keep children safe.
"I don't call it spying. I call it parenting," said Amanda Rodriguez, a mom of three boys in Frederick, Maryland... On the other side are parents such as Lori Day, an educational psychologist and mom of a daughter in graduate school, who considers spying "an invasion or privacy and a violation of trust."
(more)
In conversations over email with parents across the country, it's clear that people have dramatically different views about the definition and whether it's an appropriate behavior to help keep children safe.
"I don't call it spying. I call it parenting," said Amanda Rodriguez, a mom of three boys in Frederick, Maryland... On the other side are parents such as Lori Day, an educational psychologist and mom of a daughter in graduate school, who considers spying "an invasion or privacy and a violation of trust."
(more)
Pest Control Tech Arrested for... Planting Bugs (update)
A southwest Iowa man (38-year-old Aaron Johnson) accused of planting audio recording devices in a woman’s home now faces a federal charge of being a felon in possession of firearms...
He’s pleaded not guilty to state charges of eavesdropping and being a felon in possession of a firearm...
The woman reported finding one of the audio bugs, and then authorities found another in her bedroom. She says the only person granted access to her residence was a pest control technician, Johnson.
Police say a search of Johnson’s home turned up similar devices and guns and ammunition.
(more) (background)
He’s pleaded not guilty to state charges of eavesdropping and being a felon in possession of a firearm...
The woman reported finding one of the audio bugs, and then authorities found another in her bedroom. She says the only person granted access to her residence was a pest control technician, Johnson.
Police say a search of Johnson’s home turned up similar devices and guns and ammunition.
(more) (background)
Monday, January 5, 2015
How to Travel Like a Spy
A 14-page document from the Central Intelligence Agency carrying the arduous bureaucratic title of “Surviving Secondary: An Identity Threat Assessment of Secondary Screening Procedures at International Airports”... Translated into normal English, this means how undercover agents can avoid trouble when going through passport and custom controls.
Although the study deals narrowly with the CIA’s concern that its clandestine agents will be stopped in passport checks and their false identities exposed, its information holds interest to anyone who travels internationally. Indeed, it’s a useful guide precisely to what not to do when landing in a foreign airport.
(more)
Although the study deals narrowly with the CIA’s concern that its clandestine agents will be stopped in passport checks and their false identities exposed, its information holds interest to anyone who travels internationally. Indeed, it’s a useful guide precisely to what not to do when landing in a foreign airport.
(more)
More Ops Against Cops for Taps in Turkey
At least 34 police officers, including former police chiefs, were detained on charges of illegal wiretapping in simultaneous dawn raids on Monday across multiple provinces as part of a new wave of investigations into the police.
Twenty-two police officers who formerly served at the intelligence unit of the Gaziantep Police Department were detained in 13 Turkish provinces, and another 14 were detained in 12 provinces in an operation based out of Şanlıurfa. There are reportedly police chiefs among those who were taken into custody in the Şanlıurfa-based operation.
(more)
Twenty-two police officers who formerly served at the intelligence unit of the Gaziantep Police Department were detained in 13 Turkish provinces, and another 14 were detained in 12 provinces in an operation based out of Şanlıurfa. There are reportedly police chiefs among those who were taken into custody in the Şanlıurfa-based operation.
(more)
SnoopSnitch App Detects IMSI Catchers ...on some Android phones
SnoopSnitch is a brand new app for Android users developed by the folks over at Security Research Labs. Its purpose is to bring more control in the hands of consumers by collecting and analyzing mobile radio data. The new app warns about Android users about such threats like fake base stations (IMSI catchers), user tracking, and SS7 attacks, but at the moment it will work only on rooted devices with a Qualcomm chip inside.
International Mobile Subscriber Identity (IMSI) catchers are eavesdropping devices that are being used for intercepting mobile phone traffic and tracking the movement of smartphone users. The guys over at Techopedia have a slightly more detailed explanation:
To prevent the subscriber from being identified and tracked by eavesdroppers on a radio interface, the IMSI is rarely transmitted. A randomly generated temporary mobile subscriber identity (TMSI) is sent instead of the IMSI, to ensure that the identity of the mobile subscriber remains confidential and eliminate the need to transfer it in an undeciphered fashion over radio links.
Security experts have discovered security flaws that could allow hackers to listen to private calls and read text messages by using IMSI catchers or ‘stingrays’. So if you are concerned about these things, the new SnoopSnitch can detect IMSI catchers and warn smartphone users if their devices are giving up their personal information. Besides intercepting traffic and tracking the movement, hackers can use this loophole to even manipulate the device remotely.
(more)
International Mobile Subscriber Identity (IMSI) catchers are eavesdropping devices that are being used for intercepting mobile phone traffic and tracking the movement of smartphone users. The guys over at Techopedia have a slightly more detailed explanation:
To prevent the subscriber from being identified and tracked by eavesdroppers on a radio interface, the IMSI is rarely transmitted. A randomly generated temporary mobile subscriber identity (TMSI) is sent instead of the IMSI, to ensure that the identity of the mobile subscriber remains confidential and eliminate the need to transfer it in an undeciphered fashion over radio links.
Security experts have discovered security flaws that could allow hackers to listen to private calls and read text messages by using IMSI catchers or ‘stingrays’. So if you are concerned about these things, the new SnoopSnitch can detect IMSI catchers and warn smartphone users if their devices are giving up their personal information. Besides intercepting traffic and tracking the movement, hackers can use this loophole to even manipulate the device remotely.
(more)
Labels:
App,
cell phone,
eavesdropping,
Hack,
tracking,
wiretapping
...thus upstaging Santa's naughty and nice list...
The US National Security Agency (NSA) published transparency reports on its web page at 1:30 pm on Christmas Eve.
Time span of the reports is from the fourth quarter of 2001 to the second quarter of 2013. The reports were released after the American Civil Liberties Union (ACLU) issued a Freedom of Information Act request for the information.
(more)

(more)
Lizard Patrol May Soon Be Able to Eavesdrop On Tor Users
Uh oh. Lizard Patrol, the hacking group claiming responsibility for the Christmas attacks on PlayStation and Xbox Live, has announced a new target: Tor, the anonymous internet service.
The hacker group appears to be attempting to dominate Tor's relays to the point where it can comprise anonymity. Tor keeps you anonymous by bouncing your communications around a network of volunteer nodes. But if one group is controlling the majority of the nodes, it could be able to eavesdrop on a substantial number of vulnerable users. Which means Lizard Squad could gain the power to track Tor users if it infiltrates enough of the network.
So far, they have already established over 3000 relays, nearly half of the total number. That's very not good.
(more)
The hacker group appears to be attempting to dominate Tor's relays to the point where it can comprise anonymity. Tor keeps you anonymous by bouncing your communications around a network of volunteer nodes. But if one group is controlling the majority of the nodes, it could be able to eavesdrop on a substantial number of vulnerable users. Which means Lizard Squad could gain the power to track Tor users if it infiltrates enough of the network.
So far, they have already established over 3000 relays, nearly half of the total number. That's very not good.
(more)
Tuesday, December 23, 2014
Companies May Get a New Weapon in the Fight Against Economic Espionage
Currently, intellectual property owners that want to file suit for trade secret theft can only do so in state court. Under the Senate’s Defend Trade Secrets Act and the House’s Trade Secrets Protection Act, plaintiffs could sue in federal court, where it can be easier to reach defendants that have fled to another state or country.
Both bills, which are similar in scope, have Democratic and Republican sponsors, who cited federal estimates that U.S. businesses lose $300 billion a year as a result of trade secret theft. (more)
Both bills, which are similar in scope, have Democratic and Republican sponsors, who cited federal estimates that U.S. businesses lose $300 billion a year as a result of trade secret theft. (more)
Kangaroo Knocks Out Drone
The kids are scared. What's a mother to do?
Army Needs Super Fly Robot Spy (wannahelp?)
Army invites investors, engineers to help develop technology like fingernail-sized fly bot whose wings flap without motors.
Researchers at the U.S. Army are taking advantage of an unusually unclassified approach to military systems development to ask for help turning a clever robotic fly into an almost undetectable spy.
The robotic flies are – or will be – semi-autonomous robots that look like real bugs and fly using wings that flap without being controlled by a motor. (more)
![]() |
Click to enlarge. |
The robotic flies are – or will be – semi-autonomous robots that look like real bugs and fly using wings that flap without being controlled by a motor. (more)
Skype for Android App - Eavesdropping - Feature or Flaw
The Skype for Android app reportedly features a flaw that allows other users to eavesdrop without any real effort.
As discovered by a Reddit user Ponkers (via Android Police), the security bug in Android app can "can force the Android version of Skype to answer, allowing you to eavesdrop."
As Ponkers explains, first it requires two devices signed into Skype account Android phone (device 1) and desktop (device 2). Now, if the user calls the target Android device (device 3) with the Android phone (device 1) and then disconnects from Internet while the target Android phone (device 3) has answered, it results in a call back from the target Android phone (device 3) to the user on desktop (device 2), and an automatic connection without the owner of the device necessarily knowing. (more)
As discovered by a Reddit user Ponkers (via Android Police), the security bug in Android app can "can force the Android version of Skype to answer, allowing you to eavesdrop."
![]() |
The old fashioned way. |
Monday, December 22, 2014
SpyCams in the Pathology Department - Staffers Bugged
Australia - SA Health has admitted using cameras hidden in smoke detectors to monitor its staff at SA Pathology premises in Adelaide.
Two cameras were installed in October in offices... as part of an investigation into processing delays for pathology reports...
A staff member, who did not want to be identified, said it did not take staff long to notice something suspicious. "The staff felt violated, there's also a microphone attachment to it so [we do not know] whether they were listening in or conversations were being recorded," they said.
However, a spokesperson for SA Health said the cameras were not used to record audio. (more)
Two cameras were installed in October in offices... as part of an investigation into processing delays for pathology reports...
A staff member, who did not want to be identified, said it did not take staff long to notice something suspicious. "The staff felt violated, there's also a microphone attachment to it so [we do not know] whether they were listening in or conversations were being recorded," they said.
However, a spokesperson for SA Health said the cameras were not used to record audio. (more)
Security Flaws Let Hackers Listen in on Cell Phone Calls
German researchers say the network that allows cellphone carriers to direct calls to one another is full of security holes. (more)
Man Bots Ex-Girlfriend's Computer... for several years
PA - A former Pennsbury School District computer technician from Doylestown Township was placed on probation for three years for remotely spying on his ex-girlfriend and their child.
Joseph Tarr, 31, admitted to controlling the Middletown woman’s home computer and its webcam for several years. By the time he was arrested, Tarr had numerous audio and video recordings of the activities in the woman’s home — all captured without her knowledge, authorities said. (more)
Joseph Tarr, 31, admitted to controlling the Middletown woman’s home computer and its webcam for several years. By the time he was arrested, Tarr had numerous audio and video recordings of the activities in the woman’s home — all captured without her knowledge, authorities said. (more)
PI Tip # 512 - Make: Coffee Cup SpyCam
Take your cup of Joe from classic to classified with a tilt-triggered spy camera.
The trick is to modify two paper coffee cups — install the device in one, slide it into the second, and align holes cut in the bottoms of each. Two LEDs can be seen through the standard plastic lid — one illuminates when the tilt switch is activated, the other flashes twice after a picture has been taken.
Think your cover has been blown? Simply rotate the cups to hide the camera... (more)
The trick is to modify two paper coffee cups — install the device in one, slide it into the second, and align holes cut in the bottoms of each. Two LEDs can be seen through the standard plastic lid — one illuminates when the tilt switch is activated, the other flashes twice after a picture has been taken.
Think your cover has been blown? Simply rotate the cups to hide the camera... (more)
Self-Destructing Spy Phone (Can't tell you any more right now.)
Chalk this up as one of the stranger corporate announcements this week, delivered by BlackBerry CEO John Chen...
“We are pleased to announce that Boeing is collaborating with BlackBerry to provide secure mobile solution for Android devices utilizing our BES 12 platform. That, by the way, is all they allow me to say. So sorry (if) it seems like I am reading it word for word. .. I’m true to my commitment here.”...
It’s a sealed device, with epoxy around the casing and tamper-proof screws to prevent it from being opened...
“Any attempt to break open the casing of the device would trigger functions that would delete the data and software contained within the device and make the device inoperable,” a lawyer for Boeing wrote in a letter to the FCC... (more)
![]() |
Click to enlarge. |
“We are pleased to announce that Boeing is collaborating with BlackBerry to provide secure mobile solution for Android devices utilizing our BES 12 platform. That, by the way, is all they allow me to say. So sorry (if) it seems like I am reading it word for word. .. I’m true to my commitment here.”...
It’s a sealed device, with epoxy around the casing and tamper-proof screws to prevent it from being opened...
“Any attempt to break open the casing of the device would trigger functions that would delete the data and software contained within the device and make the device inoperable,” a lawyer for Boeing wrote in a letter to the FCC... (more)
Thursday, December 18, 2014
How to Spy on Your Competition...
...by keeping tabs on their Internet presence. (And, how they may be spying on you!)
Connecticut's Quirky Recording Laws - Check Your State Laws Too
Daniel Schwartz, partner at Shipman & Goodwin LLP, recently pointed out some interesting facts about Connecticut's recording laws...
If you do a search on the Internet, you’re likely to discover that Connecticut is a “two-party” state when it comes to recording telephone conversations. What does that mean? In plain English, it means that both parties to a phone conversation must consent to the recording for it to be legal. You can read the law (Conn. Gen. Stat. Sec. 52-570d) for yourself here...
For ordinary, in-person communications, Connecticut is a one-party state — meaning that only one party’s consent is needed to record a conversation. (You can find the law regarding eavesdropping at Conn. Gen. Stat. Sec. 53a-189.)
What does this mean in the workplace? It means that your employees can legally record conversations with their bosses and then try to use those communications as evidence to prove a discrimination claim or another employment-related claim.
Employers can set up reasonable rules in the workplace prohibiting the taping of conversations and tell employees that they cannot record it, but that only means that the records violate the employer’s rules, not Connecticut law.
And what this also means is that the employee cannot record a conversation between two other people; one party must always consent to the conversation. (more)
P.S. A FREE Security White Paper - "Surreptitious Workplace Recording ...and what you can do about it," is available to Murray Associates clients. Contact me for your copy.
If you do a search on the Internet, you’re likely to discover that Connecticut is a “two-party” state when it comes to recording telephone conversations. What does that mean? In plain English, it means that both parties to a phone conversation must consent to the recording for it to be legal. You can read the law (Conn. Gen. Stat. Sec. 52-570d) for yourself here...
For ordinary, in-person communications, Connecticut is a one-party state — meaning that only one party’s consent is needed to record a conversation. (You can find the law regarding eavesdropping at Conn. Gen. Stat. Sec. 53a-189.)
What does this mean in the workplace? It means that your employees can legally record conversations with their bosses and then try to use those communications as evidence to prove a discrimination claim or another employment-related claim.
Employers can set up reasonable rules in the workplace prohibiting the taping of conversations and tell employees that they cannot record it, but that only means that the records violate the employer’s rules, not Connecticut law.
And what this also means is that the employee cannot record a conversation between two other people; one party must always consent to the conversation. (more)
P.S. A FREE Security White Paper - "Surreptitious Workplace Recording ...and what you can do about it," is available to Murray Associates clients. Contact me for your copy.
Steal from Apple - Patent - Then Sue Apple (Industrial Espionage?)
You decide...
Chinese phone vendor claims Apple's iPhone 6 looks too similar.
Few have probably heard about Digione, but one of the Chinese company’s latest products looks quite similar to the iPhone 6, and could potentially spark a patent dispute with Apple.
The little-known Chinese smartphone maker revealed Monday it sent a letter to Apple in September, claiming that the iPhone 6 may infringe on a company-registered patent.
The patent in question covers a mobile phone design that features an exterior look very similar to the iPhone 6’s. Digione’s subsidiary applied for the patent in January and the company was granted the patent in July, according to China’s State Intellectual Property Office.
To publicize the issue, Digione’s smartphone brand 100+ took to a social networking site Monday and posted the letter it had sent to Apple. (more)
Chinese phone vendor claims Apple's iPhone 6 looks too similar.
Few have probably heard about Digione, but one of the Chinese company’s latest products looks quite similar to the iPhone 6, and could potentially spark a patent dispute with Apple.
The little-known Chinese smartphone maker revealed Monday it sent a letter to Apple in September, claiming that the iPhone 6 may infringe on a company-registered patent.
The patent in question covers a mobile phone design that features an exterior look very similar to the iPhone 6’s. Digione’s subsidiary applied for the patent in January and the company was granted the patent in July, according to China’s State Intellectual Property Office.
To publicize the issue, Digione’s smartphone brand 100+ took to a social networking site Monday and posted the letter it had sent to Apple. (more)
So, what's the penality for wiretapping in Turkey? (hit the Zildjian)
Turkey - An Ankara prosecutor submitted an indictment to court on Friday
regarding the illegal wiretapping activities by members of the Gülen
Movement who infiltrated key government bodies in an attempt to topple
the government... Prosecutor Tekin Küçük accused the former chief of the intelligence unit
of the National Police Department, Ömer Altınparmak, of spying and is
seeking up to 290 years in jail for the suspect. (more) (rimshot)
What is the Largest Spy Network in the Planet?
The non-state actor behind the most pervasive surveillance network in human history has managed to avoid scrutiny. Until now. Revealed: Santa the spymaster.
Here is what we know about the man identified as Santa Claus. He operates under several aliases, to include Father Christmas, St. Nicholas, and Kris Kringle. His outfit is reportedly based out of the North Pole, though reconnaissance platforms have yet to capture his base of operations. His surveillance network is peerless, invasive, and worldwide. He spearheads a single annual clandestine mission. We know he’s coming to town, and we know when, and yet he has eluded capture for two centuries. (He is also, apparently, immortal.)
Santa Claus is, in short, the single most successful spymaster in human history. And while total global surveillance by a non-state actor isn’t necessarily to be applauded, he has earned the world’s begrudging respect for his organization’s sheer competence. Despite his old and sprawling operation, Claus has thus far managed to avoid the sort of intelligence leaks that have proved catastrophic in recent years to the National Security Agency and U.S. Department of State. Indeed, his secrets are kept not only by members of his inner circle, but also a vast swath of the adult world. Accordingly, young people generally under the age of 12 are left entirely in the dark as to Claus’s intentions and temperament. (more)
Here is what we know about the man identified as Santa Claus. He operates under several aliases, to include Father Christmas, St. Nicholas, and Kris Kringle. His outfit is reportedly based out of the North Pole, though reconnaissance platforms have yet to capture his base of operations. His surveillance network is peerless, invasive, and worldwide. He spearheads a single annual clandestine mission. We know he’s coming to town, and we know when, and yet he has eluded capture for two centuries. (He is also, apparently, immortal.)
Santa Claus is, in short, the single most successful spymaster in human history. And while total global surveillance by a non-state actor isn’t necessarily to be applauded, he has earned the world’s begrudging respect for his organization’s sheer competence. Despite his old and sprawling operation, Claus has thus far managed to avoid the sort of intelligence leaks that have proved catastrophic in recent years to the National Security Agency and U.S. Department of State. Indeed, his secrets are kept not only by members of his inner circle, but also a vast swath of the adult world. Accordingly, young people generally under the age of 12 are left entirely in the dark as to Claus’s intentions and temperament. (more)
Scoop - Corporate Espionage Show
FutureWatch - Showtime is developing a half-hour comedy... Titled “Professionals,” the laffer centers on two partially broken mid-level employees who become ensnared in a dangerous game of corporate espionage. The project commitment is for three scripts, written by David J. Rosen, with Marc Webb attached to direct. (more)
Wednesday, December 17, 2014
Cops Can't Spy on Your Yard and Home Without Warrant... sometimes
WA - A federal judge on Monday tossed evidence that was gathered by a webcam turned on for six weeks—that the authorities nailed to a utility pole 100 yards from a suspected drug dealer's rural Washington state house.

"After reviewing relevant Fourth Amendment jurisprudence and applying such to the facts here, the Court rules that the Constitution permits law enforcement officers to remotely and continuously view and record an individual’s front yard (and the activities and people thereon) through the use of a hidden video camera concealed off of the individual’s property but only upon obtaining a search warrant from a judge based on a showing of probable cause to believe criminal activity was occurring. The American people have a reasonable expectation of privacy in the activities occurring in and around the front yard of their homes particularly where the home is located in a very rural, isolated setting. This reasonable expectation of privacy prohibits the warrantless, continuous, and covert recording of Mr. Vargas’ front yard for six weeks. Mr. Vargas’ motion to suppress the evidence obtained as a result of the video feed is granted." (more)
Norway - Eavesdropping Devices Found - UPDATE
Stingray mobile phone surveillance equipment estimated to cost up to £200,000 has been found hidden near the Norwegian parliament, believed to be snooping on legislators.
Following a two week investigation, Norway's Aftenposten newspaper reported to the Norwegian National Security Authority (NSM) that it had discovered IMSI-catchers (International Mobile Subscriber Identity) of a type believed sold by Harris Corporation, located inside fake mobile phone stations near government and parliamentary buildings in Oslo. At least six devices were found, each about the size of a suitcase. Potential targets within a radius of one kilometre of the equipment include the prime minister's office, the ministry of defence, Stortinget (parliament) and the central bank, Norges Bank, ministers, state secretaries, members of parliament, state officials, the American and Israeli embassies as well as many private businesses...
Initially IMSI-catchers only collect data from the sim-card but the intrusion can escalate, as the Aftenposten report explains: The most advanced versions can register several hundred numbers in just a few minutes. Once a mobile phone has been detected by a fake base station, the IMSI-catcher can enter an active mode to eavesdrop on certain conversations. Then it will transmit the conversation to the real GSM-system acting as a ‘man-in-the-middle.
The fake base station can even register SMS-messages and install spyware enabling its operator to switch on the microphone so that the mobile phone can be used to bug rooms and meetings. (more)
Following a two week investigation, Norway's Aftenposten newspaper reported to the Norwegian National Security Authority (NSM) that it had discovered IMSI-catchers (International Mobile Subscriber Identity) of a type believed sold by Harris Corporation, located inside fake mobile phone stations near government and parliamentary buildings in Oslo. At least six devices were found, each about the size of a suitcase. Potential targets within a radius of one kilometre of the equipment include the prime minister's office, the ministry of defence, Stortinget (parliament) and the central bank, Norges Bank, ministers, state secretaries, members of parliament, state officials, the American and Israeli embassies as well as many private businesses...
Initially IMSI-catchers only collect data from the sim-card but the intrusion can escalate, as the Aftenposten report explains: The most advanced versions can register several hundred numbers in just a few minutes. Once a mobile phone has been detected by a fake base station, the IMSI-catcher can enter an active mode to eavesdrop on certain conversations. Then it will transmit the conversation to the real GSM-system acting as a ‘man-in-the-middle.
The fake base station can even register SMS-messages and install spyware enabling its operator to switch on the microphone so that the mobile phone can be used to bug rooms and meetings. (more)
Labels:
cell phone,
eavesdropping,
espionage,
find,
government,
GSM,
spybot,
wiretapping
Tuesday, December 16, 2014
Constables Gone Wild
UK - A detective constable accused of spying on unsuspecting hotel guests during a 10-month voyeurism spree appeared in court.
DC Daniel Williams, 36, is said to have watched the victims at the Jurys Inn in Milton Keynes and the The Mandolay Hotel, Guildford, Surrey between January and October this year... Williams, who has been suspended from duty, also faces separate allegations of involvement in the sex trade.
He allegedly incited girls work as prostitutes and hid the profits in socks stuffed into his chimney... Williams, who was working at Tooting police station at the time of the alleged offenses, is further charged with using the police computer to run checks on his clients. (more)
USA - A Kingston constable is facing charges of spying on two teenage girls known to him through a two-way mirror while they were camping in a recreational vehicle in Northumberland County.
Point Township (PA) police charged John C. Gould, 54, of Market Street, with six counts of invasion of privacy... Two girls ages 15 and 17 told Kingston police in early July they suspected Gould spied on them while they showered inside the RV while camping... A two-way mirror was attached to the bathroom wall permitting a one-way view of the bathroom from a bedroom, according to the complaint. A lamp without a shade was placed near the mirror to diminish visibility of the mirror, according to the complaint. (more)
DC Daniel Williams, 36, is said to have watched the victims at the Jurys Inn in Milton Keynes and the The Mandolay Hotel, Guildford, Surrey between January and October this year... Williams, who has been suspended from duty, also faces separate allegations of involvement in the sex trade.
He allegedly incited girls work as prostitutes and hid the profits in socks stuffed into his chimney... Williams, who was working at Tooting police station at the time of the alleged offenses, is further charged with using the police computer to run checks on his clients. (more)
USA - A Kingston constable is facing charges of spying on two teenage girls known to him through a two-way mirror while they were camping in a recreational vehicle in Northumberland County.
Point Township (PA) police charged John C. Gould, 54, of Market Street, with six counts of invasion of privacy... Two girls ages 15 and 17 told Kingston police in early July they suspected Gould spied on them while they showered inside the RV while camping... A two-way mirror was attached to the bathroom wall permitting a one-way view of the bathroom from a bedroom, according to the complaint. A lamp without a shade was placed near the mirror to diminish visibility of the mirror, according to the complaint. (more)
Elf on the Shelf - Naughty or nice – or maybe just creepy?
Since 2005, the Elf on the Shelf has been a holiday tradition in homes. Children love seeing the little elf pop up in unexpected places. But one Canadian professor says the doll is not all fun and games — it’s teaching children to accept people spying on them.
In her paper, published in the Canadian Center for Policy Alternatives, Laura Pinto... argues that the children with an elf in their home, often cater to and try to always be on their best behavior for the doll, a fictional representation of power, instead of “engaging in and honing understandings of social relationships with peers, parents, teachers, and ‘real life’ others.”
The professor tells the Toronto Star, “If you grow up thinking it’s cool for the elves to watch me and report back to Santa, well, then it’s cool for the NSA to watch me and report back to the government.” (more)
In her paper, published in the Canadian Center for Policy Alternatives, Laura Pinto... argues that the children with an elf in their home, often cater to and try to always be on their best behavior for the doll, a fictional representation of power, instead of “engaging in and honing understandings of social relationships with peers, parents, teachers, and ‘real life’ others.”
The professor tells the Toronto Star, “If you grow up thinking it’s cool for the elves to watch me and report back to Santa, well, then it’s cool for the NSA to watch me and report back to the government.” (more)
Labels:
eavesdropping,
ethics,
mores,
Ra-parents,
Santa,
spybot,
weird
More Fake Cell Phone Sites Discovered
A WUSA9 investigation has identified "very high suspicion" levels for cell phone spying in Washington, D.C. and in tests in the Ferguson, Mo. area.
WUSA9 recorded the suspicious activity using a device that detects unauthorized external access to a test phone connected to a standard cellular network.
The findings come as a Chinese website promises cell phone interception equipment for as little as $1,800 a unit in a spy world that was once controlled by government officials at costs near $500,000 a piece. (more)
WUSA9 recorded the suspicious activity using a device that detects unauthorized external access to a test phone connected to a standard cellular network.
The findings come as a Chinese website promises cell phone interception equipment for as little as $1,800 a unit in a spy world that was once controlled by government officials at costs near $500,000 a piece. (more)
Sony's Industrial Espionage Grand Slam
The Sony e-mail hack is too irresistible to ignore. The confiding messages trash stars like Angelina Jolie and Adam Sandler. The seven-figure salaries of studio execs, nearly all men, are underlined. Juicy remarks — all the more believable because of misspellings and bad grammar — kid about President Obama’s taste in movies. To top it off, North Korea might be behind it all.
It’s the kind of tinsel town mess that is too good not to be true...
It was theft, a cyber break-in, that led to the disclosures. Hackers broke into the Sony Pictures Entertainment system and stole a boatload of private information: salaries, e-mails and personal data, with only a fraction trotted out so far.
It’s industrial espionage on a grand scale. Repairing Sony’s computer systems will cost tens of millions while some 30,000 Sony employees are left exposed... It’s a mugging, tech-style.
There are takeaways for the rest of us.
• Never e-mail anything you can’t explain in public.
• Think twice before hitting the send key.
• Don’t assume anything remains secret after it’s typed out on screen. (more)
![]() |
Click to enlarge. |
It was theft, a cyber break-in, that led to the disclosures. Hackers broke into the Sony Pictures Entertainment system and stole a boatload of private information: salaries, e-mails and personal data, with only a fraction trotted out so far.
It’s industrial espionage on a grand scale. Repairing Sony’s computer systems will cost tens of millions while some 30,000 Sony employees are left exposed... It’s a mugging, tech-style.
There are takeaways for the rest of us.
• Never e-mail anything you can’t explain in public.
• Think twice before hitting the send key.
• Don’t assume anything remains secret after it’s typed out on screen. (more)
After 50 Years, Charlie is Finally Employed
The US military has been developing a robotic tuna that can infiltrate enemy territory.
The spy fish, which is made to look like a bluefin tuna, weighs a hundred pounds and is 5ft long.
Dubbed Project Silent Nemo, The United States Office of Naval Research is in the process of testing the tuna. The robot is controlled by remote control but can also be programmed to swim a pre-determined route.
Nemo could see active service in as little as a year’s time. (more)
The spy fish, which is made to look like a bluefin tuna, weighs a hundred pounds and is 5ft long.
Dubbed Project Silent Nemo, The United States Office of Naval Research is in the process of testing the tuna. The robot is controlled by remote control but can also be programmed to swim a pre-determined route.
Nemo could see active service in as little as a year’s time. (more)
Monday, December 15, 2014
Thus, giving new meaning to watching the submarine "raceys"...
The Navy has issued a new report confirming the involvement of 12 sailors and petty officers in watching a series of secretly recorded videos
taken over a period of ten months of fellow female shipmates undressing and showering. Only one of the men is accused of recording the videos.
"This was not 11 guys, each with different [cameras]," an anonymous source told the Navy Times. "It was really one guy doing the videography piece and then sharing it with other people." (more) (sing-a-long)
taken over a period of ten months of fellow female shipmates undressing and showering. Only one of the men is accused of recording the videos.
"This was not 11 guys, each with different [cameras]," an anonymous source told the Navy Times. "It was really one guy doing the videography piece and then sharing it with other people." (more) (sing-a-long)
James Bond Held by Hackers - Cue Q
The producers of James Bond films have acknowledged that an early version of the screenplay for the new movie "SPECTRE" was among the material stolen in the massive cyberattack on Sony Pictures Entertainment.
The producers said in a statement Saturday that they are concerned that third parties who received the screenplay might seek to publish it — and warned the material is subject to copyright protection around the world.
The producers promised to "take all necessary steps to protect their rights against the persons who stole the screenplay, and against anyone who makes infringing uses of it or attempts to take commercial advantage of confidential property it knows to be stolen." (more)
The producers said in a statement Saturday that they are concerned that third parties who received the screenplay might seek to publish it — and warned the material is subject to copyright protection around the world.
The producers promised to "take all necessary steps to protect their rights against the persons who stole the screenplay, and against anyone who makes infringing uses of it or attempts to take commercial advantage of confidential property it knows to be stolen." (more)
Norway Alerts Politicians After Eavesdropping Devices Found
Norwegian police said Sunday they have warned politicians about possible eavesdropping of cellphone calls after several listening devices were reportedly found in central Oslo, including near government buildings and Parliament.
Siv Alsen from the security police said the National Security Authority has begun an investigation, but could not provide more information pending the agency's report...
Her comments followed media reports that illegal listening and tracking devices were found in fake mobile base stations, which could be used to monitor calls and data, as well as trace the movement of people in the area. (more)
Siv Alsen from the security police said the National Security Authority has begun an investigation, but could not provide more information pending the agency's report...
Her comments followed media reports that illegal listening and tracking devices were found in fake mobile base stations, which could be used to monitor calls and data, as well as trace the movement of people in the area. (more)
Double Check Your Tech
via Bruce Schneier...
This is a creepy story. The FBI wanted access to a hotel guest's room without a warrant. So agents broke his Internet connection, and then posed as Internet technicians to gain access to his hotel room without a warrant.
From the motion to suppress:
The next time you call for assistance because the internet
service in your home is not working, the "technician" who comes
to your door may actually be an undercover government agent.
He will have secretly disconnected the service, knowing that
you will naturally call for help and -- when he shows up at
your door, impersonating a technician -- let him in. He will
walk through each room of your house, claiming to diagnose the
problem. Actually, he will be videotaping everything (and
everyone) inside. He will have no reason to suspect you have
broken the law, much less probable cause to obtain a search
warrant. But that makes no difference, because by letting him
in, you will have "consented" to an intrusive search of your
home.
Basically, the agents snooped around the hotel room, and gathered evidence that they submitted to a magistrate to get a warrant. Of course, they never told the judge that they had engineered the whole outage and planted the fake technicians. (more)
This is a creepy story. The FBI wanted access to a hotel guest's room without a warrant. So agents broke his Internet connection, and then posed as Internet technicians to gain access to his hotel room without a warrant.
From the motion to suppress:
The next time you call for assistance because the internet
service in your home is not working, the "technician" who comes
to your door may actually be an undercover government agent.
He will have secretly disconnected the service, knowing that
you will naturally call for help and -- when he shows up at
your door, impersonating a technician -- let him in. He will
walk through each room of your house, claiming to diagnose the
problem. Actually, he will be videotaping everything (and
everyone) inside. He will have no reason to suspect you have
broken the law, much less probable cause to obtain a search
warrant. But that makes no difference, because by letting him
in, you will have "consented" to an intrusive search of your
home.
Basically, the agents snooped around the hotel room, and gathered evidence that they submitted to a magistrate to get a warrant. Of course, they never told the judge that they had engineered the whole outage and planted the fake technicians. (more)
Labels:
cautionary tale,
espionage,
FBI,
government,
law,
lawsuit,
mores,
privacy,
social engineering,
Tips
Woman Hides Spycam in Her Butt - Cookie Monster Digs It
There is an important lesson this spycam will teach all men...
Friday, December 12, 2014
Interesting Spy Stories of the Week
A former computer technician at HSBC Holdings’ Swiss unit, “celebrated as a hero abroad,” was indicted in Switzerland on charges of industrial espionage and violating bank secrecy laws, prosecutors said... accused of stealing
client data in 2008 from HSBC’s Geneva office and passing it to
French authorities... (more)
Verizon Voice Cypher, the product introduced with the encryption company Cellcrypt, offers business and government customers end-to-end encryption for voice calls on iOS, Android, or BlackBerry devices equipped with a special app. The encryption software provides secure communications for people speaking on devices with the app, regardless of their wireless carrier, and it can also connect to an organization's secure phone system. Cellcrypt and Verizon both say that law enforcement agencies will be able to access communications that take place over Voice Cypher, so long as they're able to prove that there's a legitimate law enforcement reason for doing so. (more)
Verizon Voice Cypher, the product introduced with the encryption company Cellcrypt, offers business and government customers end-to-end encryption for voice calls on iOS, Android, or BlackBerry devices equipped with a special app. The encryption software provides secure communications for people speaking on devices with the app, regardless of their wireless carrier, and it can also connect to an organization's secure phone system. Cellcrypt and Verizon both say that law enforcement agencies will be able to access communications that take place over Voice Cypher, so long as they're able to prove that there's a legitimate law enforcement reason for doing so. (more)
US-based cyber security solutions firm FireEye has just uncovered a
business espionage racket targeting over 100 corporates, to steal
information. The FIN4 group, as FireEye calls the hacking outfit, has a deep
knowledge of how business deals are reached and how corporate entities
communicate within and outside the organization. Unlike in other attacks, the hacker group is said to be very focused.
It targets people who might have access to confidential information. (more)
An electrical engineer for a defense contractor was fined $5,000 and sentenced to 180 hours of community service for falsely accusing his boss of spying for another country. (more)
Two Private Eyes, One GPS, One Fake DUI Tip = 200 x "I Take the 5th."
Two private investigators accused of tailing an Orange County councilman with a GPS device and setting up another by calling in a false drunk driving report were charged Thursday with false imprisonment and conspiracy to commit a crime, the district attorney's office said.
The Costa Mesa councilmen were targeted in the midst of a protracted city-police fight in 2012. The detectives were hired hands for an Upland law firm that had an advertised client list of more than 120 public safety unions and a reputation for aggressive attacks on City Hall, prosecutors say.
Christopher Joseph Lanzillo, 45, of Lake Arrowhead and Scott Alan Impola, 46, of Canyon Lake put a GPS monitor on Councilman Steve Mensinger's car in July 2012, prosecutors say, and tracked him for about a month. (more)
Private eye takes the 5th more than 200 times in fake-DUI case |
Christopher Joseph Lanzillo, 45, of Lake Arrowhead and Scott Alan Impola, 46, of Canyon Lake put a GPS monitor on Councilman Steve Mensinger's car in July 2012, prosecutors say, and tracked him for about a month. (more)
Thursday, December 11, 2014
EU Court Say NO and YES to Private Surveillance Cameras
The European Union's highest court ruled on Thursday that private individuals generally cannot install surveillance cameras to film people on a public path.
It said, however, that exceptions can be made if they help prevent and prosecute criminal acts.
The case arose after a Czech man installed a surveillance camera under the eaves of his family home from October 2007 to April 2008 after attacks, in some of which windows were smashed. (more)
It said, however, that exceptions can be made if they help prevent and prosecute criminal acts.
The case arose after a Czech man installed a surveillance camera under the eaves of his family home from October 2007 to April 2008 after attacks, in some of which windows were smashed. (more)
A Guide to Electronically Stored Information Preservation Responsibilities
The litigation-related duty to preserve relevant evidence, including electronically stored information (ESI), is well established and widely known in the legal community and the business world...
In today’s legal climate, even a company’s seemingly innocent delay in implementing an appropriate method to preserve ESI may be catastrophic...
This white paper guides litigants through their responsibilities to preserve evidence and provides valuable information on implementing a defensible legal hold process. (more) (pdf)
In today’s legal climate, even a company’s seemingly innocent delay in implementing an appropriate method to preserve ESI may be catastrophic...
This white paper guides litigants through their responsibilities to preserve evidence and provides valuable information on implementing a defensible legal hold process. (more) (pdf)
Blackphone Improves - Now with Apps and a Silent Space!
Blackphone, a joint venture between SGP Technologies, Silent Circle, and others, will introduce world's first privacy-focused app store.
PrivatOS1.1 empowers users to take control of their privacy, without the tradeoffs...
With most smartphones, separating work and play means compromising either privacy or convenience: either work apps and data live in the same place as personal games and social media apps, or users carry two devices to guarantee privacy and separation. Spaces can separate work life from personal life, a "parents only" space from a kid-friendly one, or any other separation users can dream up – no compromises needed.
A "Silent Space" is featured by default and includes the Silent Suite of apps for encrypted communication, Blackphone app store and a bundle of pre-loaded privacy apps. From there, build additional Spaces as you see fit – for whatever purpose you need – with the Blackphone Security Center and PrivatOS keeping you safe across each one.
The accompanying launch of the Blackphone app store ‐ the first one in the world that focuses solely on privacy-focused applications – solidifies Blackphone's position as a global leader in privacy and security.
Available January 2015, the Blackphone app store features curated apps specifically selected by Blackphone as the most secure privacy-optimized apps on the market. Several pre-loaded apps will be immediately available with the latest PrivatOS update in early 2015. (more)
PrivatOS1.1 empowers users to take control of their privacy, without the tradeoffs...
With most smartphones, separating work and play means compromising either privacy or convenience: either work apps and data live in the same place as personal games and social media apps, or users carry two devices to guarantee privacy and separation. Spaces can separate work life from personal life, a "parents only" space from a kid-friendly one, or any other separation users can dream up – no compromises needed.
A "Silent Space" is featured by default and includes the Silent Suite of apps for encrypted communication, Blackphone app store and a bundle of pre-loaded privacy apps. From there, build additional Spaces as you see fit – for whatever purpose you need – with the Blackphone Security Center and PrivatOS keeping you safe across each one.
The accompanying launch of the Blackphone app store ‐ the first one in the world that focuses solely on privacy-focused applications – solidifies Blackphone's position as a global leader in privacy and security.
Available January 2015, the Blackphone app store features curated apps specifically selected by Blackphone as the most secure privacy-optimized apps on the market. Several pre-loaded apps will be immediately available with the latest PrivatOS update in early 2015. (more)
Friday, December 5, 2014
Update: Jersey Girls Never Say Die and I'm Not a Spy
A New York judge has rejected a 98-year-old woman's request to erase her 1950 conviction for conspiracy to obstruct justice in the run-up to the atomic spying trial of Julius and Ethel Rosenberg.
Manhattan Judge Alvin Hellerstein said Thursday that Miriam Moskowitz's lawyers could not show that newly released records would have changed her trial's result. Moskowitz lives in Washington Township in Bergen County, New Jersey. She served a two-year prison sentence.
She said afterward: "Too bad." She says she's disappointed. (more)
Manhattan Judge Alvin Hellerstein said Thursday that Miriam Moskowitz's lawyers could not show that newly released records would have changed her trial's result. Moskowitz lives in Washington Township in Bergen County, New Jersey. She served a two-year prison sentence.
She said afterward: "Too bad." She says she's disappointed. (more)
Eavesdropping Lies, Coverups and Other Dumb Politico Moves
Australia - The future of Federal Parliament's top bureaucrat is under a cloud following the release of a scathing report by the Senate's powerful Privileges Committee.
It found Carol Mills provided "contradictory" and "misleading" information to a parliamentary committee about the use of security cameras inside Parliament House.
At issue was whether internal cameras were used to investigate a Parliament House employee who allegedly leaked information to Labor senator John Faulkner... previously said she only became aware in May that security footage had been used... other documents indicated Ms Mills was aware of the issue in February and had approved the use of security camera footage...
Her position as the chief bureaucrat in charge of Parliament House has come under question in recent months, following her decision earlier this year to downgrade security to save money.
That decision was subsequently reversed. (more)
Australia - The release of a secret report into a police bugging scandal has been blocked by Premier Mike Baird's department, leading to warnings the dispute may end up before the Supreme Court.
The Strike Force Emblems report examines allegations of illegal bugging by the NSW police's Special Crime and Internal Affairs (SCIA) and the NSW Crime Commission between 1999 and 2001, but has never been made public. (more)

At issue was whether internal cameras were used to investigate a Parliament House employee who allegedly leaked information to Labor senator John Faulkner... previously said she only became aware in May that security footage had been used... other documents indicated Ms Mills was aware of the issue in February and had approved the use of security camera footage...
Her position as the chief bureaucrat in charge of Parliament House has come under question in recent months, following her decision earlier this year to downgrade security to save money.
That decision was subsequently reversed. (more)
Australia - The release of a secret report into a police bugging scandal has been blocked by Premier Mike Baird's department, leading to warnings the dispute may end up before the Supreme Court.
The Strike Force Emblems report examines allegations of illegal bugging by the NSW police's Special Crime and Internal Affairs (SCIA) and the NSW Crime Commission between 1999 and 2001, but has never been made public. (more)
Malware Planted In Chinese E-Cigarettes
Electronic cigarette manufacturers may have highlighted its numerous benefits to let you lead a healthy, stress-free life.
What they certainly did not highlight was that the device can be used for malware distribution as well...
To avoid such risks, it is advised to disable data pins on the USB and keep only cable charge to prevent any information exchange between the devices it connects.
Alternatively, use a USB Condom, a gadget that connects to USB and makes data pins ineffective. (more)
What they certainly did not highlight was that the device can be used for malware distribution as well...
To avoid such risks, it is advised to disable data pins on the USB and keep only cable charge to prevent any information exchange between the devices it connects.
Alternatively, use a USB Condom, a gadget that connects to USB and makes data pins ineffective. (more)
The History of the Telephone - Infographic
The history of the telephone...
(Wiretapping started in the 1800's. First on telegraph lines, then on the telephone lines.)
The History of the Telephone by ITS Limited, a provider of telecommunication solutions.
(Wiretapping started in the 1800's. First on telegraph lines, then on the telephone lines.)
The History of the Telephone by ITS Limited, a provider of telecommunication solutions.
Thursday, December 4, 2014
Cricket Can't Overbill for Wiretaps in Good Conscious
Cricket Communications has agreed to fork over nearly $2.2 million to resolve claims that it over-billed federal law enforcement agencies for the costs of conducting wiretaps and pen registers, federal authorities announced this week...
“A joint investigation by the Office of Inspector General and the U.S. Attorney’s Office revealed that Cricket overcharged federal law enforcement agencies for executing wiretaps and pen registers from 2007 until Cricket lowered its fees in 2010," the U.S. Attorney’s Office said in the press release. “The settlement agreement resolves the United States’ civil claims against Cricket based on the over-billing." (more)
“A joint investigation by the Office of Inspector General and the U.S. Attorney’s Office revealed that Cricket overcharged federal law enforcement agencies for executing wiretaps and pen registers from 2007 until Cricket lowered its fees in 2010," the U.S. Attorney’s Office said in the press release. “The settlement agreement resolves the United States’ civil claims against Cricket based on the over-billing." (more)
Subscribe to:
Posts (Atom)