from the creator...
"I wanted to know how small a FM spy bug could be build when manually assembled.
This is what I came up with, it measures about 0.05 square inches and is powered by a single 1.55V silver oxide battery.
Frankly, this is just a fun object, I don`t have a practical use for it.
I`m sure professionally made spy bugs could even be smaller and work at higher frequencies which allows the antenna to be made smaller." more
The complete instructions and Gerber files (for PCB manufacturing) for this FM spy bug are available on Gumroad and Payhip:
https://gum.co/GRouL
https://payhip.com/b/YXVd
Monday, April 25, 2016
Thursday, April 21, 2016
Every Goverment Has These Spy Warnings... but love is blind.
via boingboing...
In this Chinese government comic book, women are warned that mysterious foreign strangers who pitch woo at them are secretly Western spies trying to get at their government secrets.
The reader is warned that they could go to jail for 10 years if they are foolish enough to let these Lotharios trick them into revealing state secrets.
It's a charmingly sexist and xenophobic piece of work, with shades of Jack Chick. More interesting is the parallels to the materials that the US Government has produced for their own employees to warn them about the spies who might use breached data from the Office of Personnel Management to chat them up at conferences and trick them out of America's state secrets. more
You can see the full comic here. ~Kevin
In this Chinese government comic book, women are warned that mysterious foreign strangers who pitch woo at them are secretly Western spies trying to get at their government secrets.
The reader is warned that they could go to jail for 10 years if they are foolish enough to let these Lotharios trick them into revealing state secrets.
It's a charmingly sexist and xenophobic piece of work, with shades of Jack Chick. More interesting is the parallels to the materials that the US Government has produced for their own employees to warn them about the spies who might use breached data from the Office of Personnel Management to chat them up at conferences and trick them out of America's state secrets. more
You can see the full comic here. ~Kevin
Information Security and Cryptography Seminar - Zurich, Switzerland
Time to make your travel plans...
As a friendly reminder, we are pleased to announce our seminar in Information Security and Cryptography. A full description of the seminar, including a detailed listing of topics covered, is available at www.infsec.ch.
INFORMATION SECURITY AND CRYPTOGRAPHY, FUNDAMENTALS AND APPLICATIONS (June 13-15, 2016)
This seminar provides an in-depth coverage of Information Security and Cryptography. Concepts are explained in a way understandable to a wide audience, as well as mathematical, algorithmic, protocol-specific, and system-oriented aspects.
The topics covered include cryptography and its foundations, system and network security, PKIs and key management, authentication and access control, privacy and data protection, and advanced topics in cryptography.
The seminar takes place in Zurich, Switzerland. The lectures and all course material are in English.
With kind regards,
Ueli Maurer and David Basin
Advanced Technology Group
As a friendly reminder, we are pleased to announce our seminar in Information Security and Cryptography. A full description of the seminar, including a detailed listing of topics covered, is available at www.infsec.ch.
INFORMATION SECURITY AND CRYPTOGRAPHY, FUNDAMENTALS AND APPLICATIONS (June 13-15, 2016)
This seminar provides an in-depth coverage of Information Security and Cryptography. Concepts are explained in a way understandable to a wide audience, as well as mathematical, algorithmic, protocol-specific, and system-oriented aspects.
The topics covered include cryptography and its foundations, system and network security, PKIs and key management, authentication and access control, privacy and data protection, and advanced topics in cryptography.
The seminar takes place in Zurich, Switzerland. The lectures and all course material are in English.
With kind regards,
Ueli Maurer and David Basin
Advanced Technology Group
FutureWatch: Your Brain Will Replace Your Fingerprints for ID
Psychologists and engineers at Binghamton University in New York have hit a milestone in the quest to use the unassailable inner workings of your brain as a form of biometric identification. They came up with an electroencephalograph system that proved 100 percent accurate at identifying individuals by the way their brains responded to a series of images.
“It's a big deal going from 97 to 100 percent because we imagine the applications for this technology being for high-security situations,” says Sarah Lazlo, assistant professor of psychology at Binghamton who led the research with electrical engineering professor Zhanpeng Jin.
Perhaps only one other such experiment in the long quest for this ultimate biometric has hit the 100 percent mark, and the Binghamton system has some advantages over even that one. For one it proved itself with less complex equipment and in a larger group, identifying 50 people. But perhaps more importantly this new form of ID can do something fingerprints and retinal scans can’t: It can be “cancelled.” That’s important because hackers have shown that fingerprints can be stolen and faked. more
“It's a big deal going from 97 to 100 percent because we imagine the applications for this technology being for high-security situations,” says Sarah Lazlo, assistant professor of psychology at Binghamton who led the research with electrical engineering professor Zhanpeng Jin.
Perhaps only one other such experiment in the long quest for this ultimate biometric has hit the 100 percent mark, and the Binghamton system has some advantages over even that one. For one it proved itself with less complex equipment and in a larger group, identifying 50 people. But perhaps more importantly this new form of ID can do something fingerprints and retinal scans can’t: It can be “cancelled.” That’s important because hackers have shown that fingerprints can be stolen and faked. more
Tuesday, April 19, 2016
"I've got your number," The Telephone Wiretap Hack
A US Congressman has learned first-hand just how vulnerable cellphones are to eavesdropping and geographic tracking after hackers were able to record his calls and monitor his movements using nothing more than the public ten-digit phone number associated with the handset he used.
The stalking of US Representative Ted Lieu's smartphone was carried out with his permission for a piece broadcast Sunday night by 60 Minutes. Karsten Nohl of Germany-based Security Research Labs was able to record any call made to or from the phone and to track its precise location in real-time as the California congressman traveled to various points in the southern part of the state. At one point, 60 minutes played for Lieu a crystal-clear recording Nohl made of one call that discussed data collection practices by the US National Security Agency. While SR Labs had permission to carry out the surveillance, there's nothing stopping malicious hackers from doing the same thing.
The representative said he had two reactions: "First it's really creepy," he said. "And second it makes me angry. They could hear any call. Pretty much anyone has a cell phone. It could be stock trades you want someone to execute. It could be a call with a bank." more
The stalking of US Representative Ted Lieu's smartphone was carried out with his permission for a piece broadcast Sunday night by 60 Minutes. Karsten Nohl of Germany-based Security Research Labs was able to record any call made to or from the phone and to track its precise location in real-time as the California congressman traveled to various points in the southern part of the state. At one point, 60 minutes played for Lieu a crystal-clear recording Nohl made of one call that discussed data collection practices by the US National Security Agency. While SR Labs had permission to carry out the surveillance, there's nothing stopping malicious hackers from doing the same thing.
The representative said he had two reactions: "First it's really creepy," he said. "And second it makes me angry. They could hear any call. Pretty much anyone has a cell phone. It could be stock trades you want someone to execute. It could be a call with a bank." more
Why Blackberry is No Apple
BlackBerry appeared Monday, April 18, to acknowledge it helped Canadian federal police crack a Montreal crime syndicate that had been using its messaging system,
while insisting its smartphone security remains impenetrable.
In a blog post, BlackBerry chief executive John Chen reiterated the company's long-held stance "that tech companies as good corporate citizens should comply with reasonable lawful access requests." more
while insisting its smartphone security remains impenetrable.
In a blog post, BlackBerry chief executive John Chen reiterated the company's long-held stance "that tech companies as good corporate citizens should comply with reasonable lawful access requests." more
Chinese Spy Sentenced to Death... by China
A Chinese man has been sentenced to death for leaking more than 150,000 classified documents to an unidentified foreign power, state television said on Tuesday, offering unusual details of a kind of case rarely mentioned in public.
The man, a computer technician from Sichuan named as Huang Yu, worked for a government department which handled state secrets, but he was a bad employee and was sacked, the report said. more
The man, a computer technician from Sichuan named as Huang Yu, worked for a government department which handled state secrets, but he was a bad employee and was sacked, the report said. more
Monday, April 18, 2016
Spycam Lawsuit: Employee Known Video Voyeur - Store Manager Did Nothing
A Colorado Springs woman is suing Reebok International, a Reebok Outlet Store, and a teenage store employee over a Peeping Tom incident... Christina Selvig said she caught a glimpse of Austin Kyle Baker looking over the top of the wall into her changing room...
She immediately informed the store manager who did nothing more than take her name and number and promised to get back with her the next day, which didn’t happen.
Selvig wasn’t sitting around waiting for action on the store’s part, she had already informed the police, who also didn’t take her complaint that seriously initially, chalking the incident up to an accident.
...three days later, Baker confessed to spying on Christina, in addition to several more women. An investigation revealed that at least one other employee was aware that Baker was a video voyeur, and continued to allow the behavior.
Law enforcement told her that he had turned over his phone... Forensics came back with footage of her, as well as deleted videos of other women. more
Here comes another big pockets settlement. If your company offers employees, visitors and/or customers "expectation of privacy" areas, you better begin doing your due diligence. Start here.
She immediately informed the store manager who did nothing more than take her name and number and promised to get back with her the next day, which didn’t happen.
Selvig wasn’t sitting around waiting for action on the store’s part, she had already informed the police, who also didn’t take her complaint that seriously initially, chalking the incident up to an accident.
...three days later, Baker confessed to spying on Christina, in addition to several more women. An investigation revealed that at least one other employee was aware that Baker was a video voyeur, and continued to allow the behavior.
Law enforcement told her that he had turned over his phone... Forensics came back with footage of her, as well as deleted videos of other women. more
Here comes another big pockets settlement. If your company offers employees, visitors and/or customers "expectation of privacy" areas, you better begin doing your due diligence. Start here.
Thursday, April 14, 2016
FutureWatch – If Walls Have Ears, Why Not Eyes?
Researchers have developed a sheet camera with a flexible lens array which could be wrapped around everyday objects, turning them into cameras. The project, which uses elastic optics, could also see the development of credit card-thin cameras which a photographer simply bends to change the field of view.
While we've previously seen researchers miniaturizing cameras and lenses so they can be used in new situations, the team from Columbia University has taken a different approach. Led by Shree K. Nayar, T.C. Chang Professor of Computer Science at Columbia Engineering, it looked at producing a sheet camera which would enable any surface to capture visual information.
Using traditional fixed focal length lenses in such a lens array would mean that as the array sheet is bent, gaps are formed between the lenses' fields of view, meaning information is missing. As such, the researchers set about designing a flexible lens array which also adapts its optical properties when the sheet camera is bent. more
While we've previously seen researchers miniaturizing cameras and lenses so they can be used in new situations, the team from Columbia University has taken a different approach. Led by Shree K. Nayar, T.C. Chang Professor of Computer Science at Columbia Engineering, it looked at producing a sheet camera which would enable any surface to capture visual information.
Using traditional fixed focal length lenses in such a lens array would mean that as the array sheet is bent, gaps are formed between the lenses' fields of view, meaning information is missing. As such, the researchers set about designing a flexible lens array which also adapts its optical properties when the sheet camera is bent. more
The C-Suite CRO – Chief Risk Officer
A growing number of organizations are adding a new member to the C-suite—the chief risk officer (CRO)—and the rise of these executives is having a direct impact on the security programs at enterprises.
“Corporate espionage, terrorism and cyber attacks are ratcheting up the need for senior executives who understand all aspects of risk management and security,” says Jeremy King, president of Benchmark Executive Search, a provider of technology executive search services.
“Many companies are finally awakening to how destructive security breaches of all types can be—from physical damage and real costs to reputation loss and customer recovery,” King says. “Previously siloed risk-management functions must be reinvented, strengthened, and funded more aggressively. Industry must re-evaluate its approach to risk management, and success will require unprecedented cooperation from board directors and those in the C-suite.” more
“Corporate espionage, terrorism and cyber attacks are ratcheting up the need for senior executives who understand all aspects of risk management and security,” says Jeremy King, president of Benchmark Executive Search, a provider of technology executive search services.
“Many companies are finally awakening to how destructive security breaches of all types can be—from physical damage and real costs to reputation loss and customer recovery,” King says. “Previously siloed risk-management functions must be reinvented, strengthened, and funded more aggressively. Industry must re-evaluate its approach to risk management, and success will require unprecedented cooperation from board directors and those in the C-suite.” more
The Defend Trade Secrets Act
The Defend Trade Secrets Act, co-sponsored by Sen. Orrin Hatch, R-Utah, and Chris Coons, D-Delaware, passed the Senate with an 87-0 vote, and is expected to go to the House of Representatives within the next couple of months...
The Defend Trade Secrets Act, if passed, would allow companies who are victims of trade theft to go straight to federal court with the case. more
The Defend Trade Secrets Act, if passed, would allow companies who are victims of trade theft to go straight to federal court with the case. more
Demonstrations Continue In Macedonia After Presidential ‘Pardon' In Wiretapping Scandal
Protesters in Macedonia, angry about President Gjorge Ivanov's decision to halt prosecutions of officials linked to a wiretapping scandal, have broken into one of the president's offices.
The demonstrators on April 13 broke windows of the street-level office in central Skopje that is occasionally used by Ivanov, storming into the building and ransacking rooms inside.
Demonstrators also broke windows and clashed with police at the nearby Ministry of Justice, while another group of protesters clashed with police at blockades that were erected around the parliament building.
Thousands of demonstrators were on the streets for a second night on April 13. Some threw eggs and stones at government buildings while others set off flares before police used batons to disperse the crowd.
Ivanov has faced harsh criticism at home and abroad for his decision to halt all criminal proceedings against politicians and government officials suspected of involvement in a wiretapping scandal involving thousands of people. more video
The demonstrators on April 13 broke windows of the street-level office in central Skopje that is occasionally used by Ivanov, storming into the building and ransacking rooms inside.
Demonstrators also broke windows and clashed with police at the nearby Ministry of Justice, while another group of protesters clashed with police at blockades that were erected around the parliament building.
Thousands of demonstrators were on the streets for a second night on April 13. Some threw eggs and stones at government buildings while others set off flares before police used batons to disperse the crowd.
Ivanov has faced harsh criticism at home and abroad for his decision to halt all criminal proceedings against politicians and government officials suspected of involvement in a wiretapping scandal involving thousands of people. more video
Monday, April 11, 2016
Video and Audio Surveillance: Trains... Planes and Automobiles Next?!?
Casual commuter conversations on light rail trains have an unexpected eavesdropper — NJ Transit.
Video and audio surveillance systems designed to make riders more secure are also recording the conversations of light rail passengers at all times.
NJ Transit officials say the on-board cameras and audio surveillance systems are needed to fight crime and maintain security.
But does on-board surveillance go too far when the agency records everything passengers are saying, without telling customers how long they keep or who has access to the recordings? more
Video and audio surveillance systems designed to make riders more secure are also recording the conversations of light rail passengers at all times.
NJ Transit officials say the on-board cameras and audio surveillance systems are needed to fight crime and maintain security.
But does on-board surveillance go too far when the agency records everything passengers are saying, without telling customers how long they keep or who has access to the recordings? more
Thursday, April 7, 2016
Quantum Cryptography Breakthrough - FutureWatch: Ultra-Secure Communications
Researchers at the University of Cambridge and Toshiba's European research branch have found a way to speed up the rate at which data can be securely transmitted using quantum cryptography. It's a development that could pave the way to faster, ultra-secure communications that are impossible to spy on.
Many of the encryption methods that keep our online data safe rely on a digital key which is very hard for computers to crack – for instance, requiring the identification of two very large prime numbers, which standard computers are very poor at. But if a powerful quantum computer were to be built, it could crack these types of code with ease and jeopardize the safety of our digital communications.
The only encryption method that has been proven to be completely secure if applied correctly – quantum computers or not – is the so-called "one-time pad." Here's how it works: first, a secret digital key is created consisting of a completely random sequence of bits. The key is then securely sent to the receiver, and kept private. Now, the sender can encrypt his message by adding the message's bits to the random bits of the key. Under these conditions, the code is deemed truly uncrackable. more
Many of the encryption methods that keep our online data safe rely on a digital key which is very hard for computers to crack – for instance, requiring the identification of two very large prime numbers, which standard computers are very poor at. But if a powerful quantum computer were to be built, it could crack these types of code with ease and jeopardize the safety of our digital communications.
The only encryption method that has been proven to be completely secure if applied correctly – quantum computers or not – is the so-called "one-time pad." Here's how it works: first, a secret digital key is created consisting of a completely random sequence of bits. The key is then securely sent to the receiver, and kept private. Now, the sender can encrypt his message by adding the message's bits to the random bits of the key. Under these conditions, the code is deemed truly uncrackable. more
Proof Almost 50% of People are Computer Security Morons
In what’s perhaps the most enthralling episode of the hacker drama Mr. Robot, one of F-Society’s hackers drops a bunch of USB sticks in the parking lot of a prison in the hopes somebody will pick one up and plug it into their work computer, giving the hackers a foothold in the network. Of course, eventually, one of the prison employees takes the bait.
Using booby-trapped USB flash drives is a classic hacker technique. But how effective is it really? A group of researchers at the University of Illinois decided to find out, dropping 297 USB sticks on the school’s Urbana-Champaign campus last year.
As it turns out, it really works. In a new study, the researchers estimate that at least 48 percent of people will pick up a random USB stick, plug it into their computers, and open files contained in them. Moreover, practically all of the drives (98 percent) were picked up or moved from their original drop location. Very few people said they were concerned about their security. Sixty-eight percent of people said they took no precautions... more
Using booby-trapped USB flash drives is a classic hacker technique. But how effective is it really? A group of researchers at the University of Illinois decided to find out, dropping 297 USB sticks on the school’s Urbana-Champaign campus last year.
As it turns out, it really works. In a new study, the researchers estimate that at least 48 percent of people will pick up a random USB stick, plug it into their computers, and open files contained in them. Moreover, practically all of the drives (98 percent) were picked up or moved from their original drop location. Very few people said they were concerned about their security. Sixty-eight percent of people said they took no precautions... more
The Voyeur Who Bought A Hotel To Spy On His Guests
A historically interesting essay in The New Yorker, and a cautionary tale.
Erin Andrews was not the first victim of hotel voyeurism, and she won't be the last. more
Erin Andrews was not the first victim of hotel voyeurism, and she won't be the last. more
Wednesday, April 6, 2016
A Wi-Fi that Knows Where You Are
There's a lot of buzz around "smart home" products and the convenience of advanced automation and mobile connectivity. However, new research may soon be able to add extra emphasis on "smart" by enhancing wireless technology with greater awareness. A team at MIT's Computer Science and Artificial Intelligence Laboratory (CSAIL) has developed a system that enables a single wireless access point to accurately locate users down to a tenth of a meter, without any added sensors.
Wireless networks are good at quickly identifying devices that come within range. Once you link several access points together, it becomes possible to zero in on someone's position by triangulation. But this new wireless technology – dubbed "Chronos" – is capable of 20 times the accuracy of existing localization methods. Through experiments led by Professor Dina Katabi, Chronos has been shown to correctly distinguish individuals inside a store from those outside up to 97 percent of the time, which would make it easier for free Wi-Fi in coffee shops to be a customer-only affair, for example.
A paper on the research was recently presented at the USENIX Symposium on Networked Systems Design and Implementation (NSDI '16). more
Wireless networks are good at quickly identifying devices that come within range. Once you link several access points together, it becomes possible to zero in on someone's position by triangulation. But this new wireless technology – dubbed "Chronos" – is capable of 20 times the accuracy of existing localization methods. Through experiments led by Professor Dina Katabi, Chronos has been shown to correctly distinguish individuals inside a store from those outside up to 97 percent of the time, which would make it easier for free Wi-Fi in coffee shops to be a customer-only affair, for example.
A paper on the research was recently presented at the USENIX Symposium on Networked Systems Design and Implementation (NSDI '16). more
Monday, April 4, 2016
A $40 Attack that Steals Police Drones from 2km Away
Black Hat Asia IBM security guy Nils Rodday says thieves can hijack expensive professional drones used widely across the law enforcement, emergency, and private sectors thanks to absent encryption in on-board chips.
Rodday says the €25,000 (US$28,463, £19,816, AU$37,048) quadcopters can be hijacked with less than $40 of hardware, and some basic knowledge of radio communications.
With that in hand attackers can commandeer radio links to the drones from up to two kilometres away, and block operators from reconnecting to the craft.
The drone is often used by emergency services across Europe, but the exposure could be much worse; the targeted Xbee chip is common in drones everywhere and Rodday says it is likely many more aircraft are open to compromise. more
Rodday says the €25,000 (US$28,463, £19,816, AU$37,048) quadcopters can be hijacked with less than $40 of hardware, and some basic knowledge of radio communications.
With that in hand attackers can commandeer radio links to the drones from up to two kilometres away, and block operators from reconnecting to the craft.
The drone is often used by emergency services across Europe, but the exposure could be much worse; the targeted Xbee chip is common in drones everywhere and Rodday says it is likely many more aircraft are open to compromise. more
Sunday, April 3, 2016
19 Years Ago: Economic Espionage in America - Booknotes Interview on C-Span
A fascinating video interview with the author of Economic Espionage in America.
As relevant today as it was in 1997.
YouTube.com description: "Industrial espionage, economic espionage or corporate espionage is a form of espionage conducted for commercial purposes instead of purely national security. Economic espionage is conducted or orchestrated by governments and is international in scope, while industrial or corporate espionage is more often national and occurs between companies or corporations." more
As relevant today as it was in 1997.
YouTube.com description: "Industrial espionage, economic espionage or corporate espionage is a form of espionage conducted for commercial purposes instead of purely national security. Economic espionage is conducted or orchestrated by governments and is international in scope, while industrial or corporate espionage is more often national and occurs between companies or corporations." more
UK Launches National Cyber Security Centre
UK - Setting out in stark terms that the UK faces a growing threat of cyber-attacks from “states, serious crime gangs, hacking groups as well as terrorists”,
Cabinet Office Minister Matthew Hancock announced the launch of the National Cyber Security Centre (NCSC)...
Led by current Director General for Cyber at GCHQ, Ciaran Martin, the NCSC has been set up to ensure that people, public and private sector organisations and the critical national infrastructure of the UK are safer online. It will bring the UK’s cyber expertise together to transform how the UK tackles cyber security issues and seeks to establish itself as the authoritative voice on information security in the UK. more
Cabinet Office Minister Matthew Hancock announced the launch of the National Cyber Security Centre (NCSC)...
Led by current Director General for Cyber at GCHQ, Ciaran Martin, the NCSC has been set up to ensure that people, public and private sector organisations and the critical national infrastructure of the UK are safer online. It will bring the UK’s cyber expertise together to transform how the UK tackles cyber security issues and seeks to establish itself as the authoritative voice on information security in the UK. more
Dating Deck Stacked with Secret Eavesdrop Feature
Boompi works like most other dating apps...
Here’s the catch: If you’re a girl, you can invite your female friends to secretly join your private conversations, without your potential suitors ever knowing.
If you’re a girl on Boompi and you start a chat with someone, you can invite your girl friend to eavesdrop on that conversation at any time.
Your friend will be able to see every message sent since the beginning of the chat, and leave their own comments in the conversation, which only you will be able to see. And if you aren’t interested in finding a date and only want to read your friends’ chats, you can do that too—Boompi allows female users to use “Ghost Mode,” which makes sure guys never see their profile. more
Here’s the catch: If you’re a girl, you can invite your female friends to secretly join your private conversations, without your potential suitors ever knowing.
If you’re a girl on Boompi and you start a chat with someone, you can invite your girl friend to eavesdrop on that conversation at any time.
Your friend will be able to see every message sent since the beginning of the chat, and leave their own comments in the conversation, which only you will be able to see. And if you aren’t interested in finding a date and only want to read your friends’ chats, you can do that too—Boompi allows female users to use “Ghost Mode,” which makes sure guys never see their profile. more
Corporate Espionage: Move to Zap Zillo for $2 Billion
One of the most contentious fights in the history of real estate listings is going nuclear, thanks to a “staggering” claim of damages from Move in its trade secret theft lawsuit against Zillow.
According to legal documents obtained by HousingWire, Move, which operates Realtor.com for the National Association of Realtors, is claiming that Zillow owes the company $2 billion in damages over allegations of trade secret theft involving Errol Samuelson, who was once Move's chief strategy officer...
Move filed suit against Zillow after Samuelson left, alleging that Samuelson and Zillow stole trade secrets and proprietary information, and that they then made efforts to cover up the alleged theft...
The original lawsuit alleged breach of contract, breach of fiduciary duty and misappropriation of trade secrets and accused Samuelson of misappropriating trade secret information by acquiring it using improper means, and by copying it without authorization.
“Plaintiffs (Move) have asserted a huge case,” Zillow notes in the legal filing. “They claim $2 billion in damages, assert 46 separate trade secrets (not including the 1000-plus documents claimed as trade secrets in their entirety) and have assigned at least 29 different lawyers to prosecute their claims.” more
According to legal documents obtained by HousingWire, Move, which operates Realtor.com for the National Association of Realtors, is claiming that Zillow owes the company $2 billion in damages over allegations of trade secret theft involving Errol Samuelson, who was once Move's chief strategy officer...
Move filed suit against Zillow after Samuelson left, alleging that Samuelson and Zillow stole trade secrets and proprietary information, and that they then made efforts to cover up the alleged theft...
The original lawsuit alleged breach of contract, breach of fiduciary duty and misappropriation of trade secrets and accused Samuelson of misappropriating trade secret information by acquiring it using improper means, and by copying it without authorization.
“Plaintiffs (Move) have asserted a huge case,” Zillow notes in the legal filing. “They claim $2 billion in damages, assert 46 separate trade secrets (not including the 1000-plus documents claimed as trade secrets in their entirety) and have assigned at least 29 different lawyers to prosecute their claims.” more
Spy Agency Few Know Gets Free Land for HQ
A US spy agency's new $1.7 billion western headquarters will be constructed in St Louis, Missouri...
The National Geospatial-Intelligence Agency (NGA) hopes to build its new western HQ in north St Louis, where it was offered free land...
So what exactly is the NGA?
The NGA is part of the Department of Defense and works with the CIA and the Air Force to provide intelligence that is largely geographical in nature...
According to the NGA, "anyone who sails a U.S. ship, flies a U.S. aircraft, makes national policy decisions, fights wars, locates targets, responds to natural disasters, or even navigates with a cellphone relies on NGA." more
So what exactly is the NGA?
The NGA is part of the Department of Defense and works with the CIA and the Air Force to provide intelligence that is largely geographical in nature...
According to the NGA, "anyone who sails a U.S. ship, flies a U.S. aircraft, makes national policy decisions, fights wars, locates targets, responds to natural disasters, or even navigates with a cellphone relies on NGA." more
Saturday, April 2, 2016
The Erin Andrews $55,000,000 verdict: Can it happen to your property?
by David C. Tryon - Porter Wright Morris & Arthur LLC
If you own or manage a hotel or inn, the Erin Andrews $55,000,000 verdict probably caught your attention. You wonder, “could that happen to my hotel?” Yes it can...
One fact which has not been widely reported is that Andrews’ room was allegedly on a “secure floor” – a designation which likely has varying meanings to property owners and guests. Barrett was able to use his immediate proximity to tamper with the peep hole on Andrews door at an ideal time – allowing him to see from the outside in. A disturbing reality is that anyone can do this with a readily available $60 (or $12.99) device. Barrett then videoed Andrews nude in her room without being detected by the hotel staff. He later posted the video on the Internet, which subsequently went viral...
So, what steps can you take to prevent something like this from happening to your property? Start by having a very direct conversation with your staff about your security measures. Assess what efforts you have in place and if those efforts should be enhanced. Ask yourself these questions... more
PS - Hotels are not the only vulnerable targets. The term "property" easily expands to include: country clubs, gyms, schools, hospitals, and more. In fact, all corporate locations offering rest room / maternity room / changing room / shower and locker room facilities to their employees and visitors is at risk.
The best first steps to protecting yourself and your company:
1. Have a written Recording in the Workplace Policy in place.
2. Train security and facilities employees how to conduct inspections for spycams.
3. Conduct in-house spy camera inspections periodically, and document your efforts.
If you own or manage a hotel or inn, the Erin Andrews $55,000,000 verdict probably caught your attention. You wonder, “could that happen to my hotel?” Yes it can...
One fact which has not been widely reported is that Andrews’ room was allegedly on a “secure floor” – a designation which likely has varying meanings to property owners and guests. Barrett was able to use his immediate proximity to tamper with the peep hole on Andrews door at an ideal time – allowing him to see from the outside in. A disturbing reality is that anyone can do this with a readily available $60 (or $12.99) device. Barrett then videoed Andrews nude in her room without being detected by the hotel staff. He later posted the video on the Internet, which subsequently went viral...
So, what steps can you take to prevent something like this from happening to your property? Start by having a very direct conversation with your staff about your security measures. Assess what efforts you have in place and if those efforts should be enhanced. Ask yourself these questions... more
PS - Hotels are not the only vulnerable targets. The term "property" easily expands to include: country clubs, gyms, schools, hospitals, and more. In fact, all corporate locations offering rest room / maternity room / changing room / shower and locker room facilities to their employees and visitors is at risk.
The best first steps to protecting yourself and your company:
1. Have a written Recording in the Workplace Policy in place.
2. Train security and facilities employees how to conduct inspections for spycams.
3. Conduct in-house spy camera inspections periodically, and document your efforts.
Friday, April 1, 2016
Spycam Lawsuit: Female Oil Rig Worker Sues for $1 Million
It looked like a normal clothing hook -- small and unsuspecting, mounted on the back door of her sleeping quarters on the Transocean Deepwater oil rig.
But to her, for some reason it just didn't feel right.
"The rooms are pretty bare and minimum, so when you notice something that's different, it kind of sticks out to you."
Though 26, she'd been on plenty of rigs before. In fact, she'd spent much of her life dedicated to working offshore in the Gulf of Mexico. But she says she'd never seen something like this.
"It was out of place."
She dismissed the weird feeling and thought to herself, "Well, it must just be extra storage."
That was a Friday in August 2015. Four days later, the hook was gone. more
But to her, for some reason it just didn't feel right.
"The rooms are pretty bare and minimum, so when you notice something that's different, it kind of sticks out to you."
Though 26, she'd been on plenty of rigs before. In fact, she'd spent much of her life dedicated to working offshore in the Gulf of Mexico. But she says she'd never seen something like this.
"It was out of place."
She dismissed the weird feeling and thought to herself, "Well, it must just be extra storage."
That was a Friday in August 2015. Four days later, the hook was gone. more
Thursday, March 31, 2016
Security Director Alert: 20,000 Printers Under the Siege
The notorious hacker and troll Andrew Auernheimer, also known as “Weev,” just proved that the Internet of Things can be abused to spread hateful propaganda.
On Thursday, Auernheimer used two lines of code to scan the entire internet for insecure printers and made them automatically spill out a racist and anti-semitic flyer.
Hours later, several people started reporting the incident on social media, and eventually a few local news outlets picked up on the story when colleges and universities all over the United States found that their network printers were spilling out Auernheimer’s flyer.
Auernheimer detailed this “brief experiment,” as he called it, in a blog post on Friday. Later, in a chat, he said that he made over 20,000 printers put out the flyer, and defended his actions. more
Imagine the chaos if he sent a more realistic version of the coupon shown above, or false documents to internal company printers. Make sure all printers associated with your company operate in a secure manner – internal and home office units. Don't forget to check for insecure Wi-Fi settings as well. Need help? Call me.
On Thursday, Auernheimer used two lines of code to scan the entire internet for insecure printers and made them automatically spill out a racist and anti-semitic flyer.
Hours later, several people started reporting the incident on social media, and eventually a few local news outlets picked up on the story when colleges and universities all over the United States found that their network printers were spilling out Auernheimer’s flyer.
Auernheimer detailed this “brief experiment,” as he called it, in a blog post on Friday. Later, in a chat, he said that he made over 20,000 printers put out the flyer, and defended his actions. more
Imagine the chaos if he sent a more realistic version of the coupon shown above, or false documents to internal company printers. Make sure all printers associated with your company operate in a secure manner – internal and home office units. Don't forget to check for insecure Wi-Fi settings as well. Need help? Call me.
Scary Password Stats
Market Pulse Survey
Reveals Growing Security Negligence in the Workplace
Despite Employees’ Concern Over Risk to Personal Data
more
Yes, 1 in 5 would sell their passwords... and it only take one to spring a leak. ~Kevin
Click to enlarge. |
Despite Employees’ Concern Over Risk to Personal Data
more
Yes, 1 in 5 would sell their passwords... and it only take one to spring a leak. ~Kevin
Business Espionage: Guaranteed Rate Hit with $25M Judgment
A jury awarded Mount Olympus Mortgage Co. more than $25 million in a lawsuit alleging "corporate espionage" by former employee Benjamin Anderson and his new employer, Guaranteed Rate.
Anderson and another former Mount Olympus originator who now works for Guaranteed Rate, Brian Decker, were accused of stealing loan files, borrower information and other proprietary data from the Irvine, Calif.-based lender.
"The purpose of the scheme was to divert hundreds of MOMCo loan customers to Guaranteed. The Individual Defendants misappropriated MOMCo's confidential and proprietary information and directed MOMCo customers to Guaranteed," the lawsuit, filed in an Orange County, Calif., superior court, reads.
The complaint alleges the pair acted with the encouragement of Chicago-based Guaranteed Rate. more
Anderson and another former Mount Olympus originator who now works for Guaranteed Rate, Brian Decker, were accused of stealing loan files, borrower information and other proprietary data from the Irvine, Calif.-based lender.
"The purpose of the scheme was to divert hundreds of MOMCo loan customers to Guaranteed. The Individual Defendants misappropriated MOMCo's confidential and proprietary information and directed MOMCo customers to Guaranteed," the lawsuit, filed in an Orange County, Calif., superior court, reads.
The complaint alleges the pair acted with the encouragement of Chicago-based Guaranteed Rate. more
Surveillance Self-Defense 101: A teach-in for activists
On Sunday, April 3,
EFF will co-host a free workshop on surveillance self-defense with local grassroots groups in New York and Brooklyn. The workshop will be open to the public, though particularly structured for activists supporting social movements.
Participants need not wield technical expertise to attend this session, which is geared towards regular smartphone and laptop users. EFF's Shahid Buttar will facilitate a teach-in and skill-share on surveillance, some immediate and practical steps you can take to protect your communications, and how to work with neighbors to inform surveillance policy at the state and local level. An EFF staff technologist will remotely join for a question & answer session. more
EFF will co-host a free workshop on surveillance self-defense with local grassroots groups in New York and Brooklyn. The workshop will be open to the public, though particularly structured for activists supporting social movements.
Participants need not wield technical expertise to attend this session, which is geared towards regular smartphone and laptop users. EFF's Shahid Buttar will facilitate a teach-in and skill-share on surveillance, some immediate and practical steps you can take to protect your communications, and how to work with neighbors to inform surveillance policy at the state and local level. An EFF staff technologist will remotely join for a question & answer session. more
Laker Rookie Secretly Filmed Teammate Admitting Cheating
A shocking video surfaced of Los Angeles Lakers forward Nick Young,
filmed by his rookie teammate D’Angelo Russell, admitting that he cheated on his fiancée Iggy Azalea.
The video shows Russell talking to Young saying, “You was 30 and she was 19?” referencing a woman the 30-year-old Young met in a nightclub...
According to Hollywoodlife.com the 25-year-old Azalea plans to now call off their wedding plans. more
filmed by his rookie teammate D’Angelo Russell, admitting that he cheated on his fiancée Iggy Azalea.
The video shows Russell talking to Young saying, “You was 30 and she was 19?” referencing a woman the 30-year-old Young met in a nightclub...
According to Hollywoodlife.com the 25-year-old Azalea plans to now call off their wedding plans. more
Security Director Alert: Update Your HID Card Reader Software - NOW
Let Me Get That Door for You: Remote Root Vulnerability in HID Door Controllers
If you’ve ever been inside an airport, university campus, hospital, government complex, or office building, you’ve probably seen one of HID’s brand of card readers standing guard over a restricted area. HID is one of the world’s largest manufacturers of access control systems and has become a ubiquitous part of many large companies’ physical security posture.
Each one of those card readers is attached to a door controller behind the scenes, which is a device that controls all the functions of the door including locking and unlocking, schedules, alarms, etc...
Technical details...
...if we send a Linux command wrapped in backticks, like `id`, it will get executed by the Linux shell on the device. To make matters worse, the discovery service runs as root, so whatever command we send it will also be run as root, effectively giving us complete control over the device.
Since the device in this case is a door controller, having complete control includes all of the alarm and locking functionality. This means that with a few simple UDP packets and no authentication whatsoever, you can permanently unlock any door connected to the controller. And you can do this in a way that makes it impossible for a remote management system to relock it. On top of that, because the discoveryd service responds to broadcast UDP packets, you can do this to every single door on the network at the same time! Needless to say, this is a potentially devastating bug. The Zero Day Initiative team worked with HID to see that it got fixed, and a patch is reportedly available now through HID’s partner portal. more
If you’ve ever been inside an airport, university campus, hospital, government complex, or office building, you’ve probably seen one of HID’s brand of card readers standing guard over a restricted area. HID is one of the world’s largest manufacturers of access control systems and has become a ubiquitous part of many large companies’ physical security posture.
Each one of those card readers is attached to a door controller behind the scenes, which is a device that controls all the functions of the door including locking and unlocking, schedules, alarms, etc...
Technical details...
...if we send a Linux command wrapped in backticks, like `id`, it will get executed by the Linux shell on the device. To make matters worse, the discovery service runs as root, so whatever command we send it will also be run as root, effectively giving us complete control over the device.
Since the device in this case is a door controller, having complete control includes all of the alarm and locking functionality. This means that with a few simple UDP packets and no authentication whatsoever, you can permanently unlock any door connected to the controller. And you can do this in a way that makes it impossible for a remote management system to relock it. On top of that, because the discoveryd service responds to broadcast UDP packets, you can do this to every single door on the network at the same time! Needless to say, this is a potentially devastating bug. The Zero Day Initiative team worked with HID to see that it got fixed, and a patch is reportedly available now through HID’s partner portal. more
Covert Recording: Governor of Alabama, Robert Bentley, Says He Won’t Quit
“I have no intentions of resigning,” said Mr. Bentley, a Republican in his second term...
Within hours, Rebekah C. Mason, the governor’s senior political adviser and the woman with whom he engaged in suggestive conversations, captured on tape, said she had quit. And by day’s end, it was uncertain whether it would be politically feasible for Mr. Bentley, 73, to remain in office in this state, which has a gaudy history of scandal but has been in something of a morals-driven meltdown since the governor’s admission last Wednesday.
Background...
Spencer Collier, head of the Alabama Law Enforcement Agency until he was fired today, said this afternoon he has seen and investigated text messages and audio recordings "of a sexual nature" between Gov. Robert Bentley and his chief advisor, Rebekah Caldwell Mason...
...former Bentley security officer Ray Lewis... brought a laptop to Collier and played an audiotape of conversations between the governor and Mason, Collier said. The tape, purportedly created by a Bentley family member hoping for an "intervention," left no doubt about the relationship, he said. more
Within hours, Rebekah C. Mason, the governor’s senior political adviser and the woman with whom he engaged in suggestive conversations, captured on tape, said she had quit. And by day’s end, it was uncertain whether it would be politically feasible for Mr. Bentley, 73, to remain in office in this state, which has a gaudy history of scandal but has been in something of a morals-driven meltdown since the governor’s admission last Wednesday.
Background...
Spencer Collier, head of the Alabama Law Enforcement Agency until he was fired today, said this afternoon he has seen and investigated text messages and audio recordings "of a sexual nature" between Gov. Robert Bentley and his chief advisor, Rebekah Caldwell Mason...
...former Bentley security officer Ray Lewis... brought a laptop to Collier and played an audiotape of conversations between the governor and Mason, Collier said. The tape, purportedly created by a Bentley family member hoping for an "intervention," left no doubt about the relationship, he said. more
Friday, March 25, 2016
And you thought bugging the coffin stories were outrageous...
CA - For the second time in less than six months, defense attorneys are crying foul over the placement of hidden recording devices outside Bay Area courthouses.
Lawyers for a group of real estate professionals facing antitrust charges on Wednesday asked the judge overseeing the case to toss evidence gained from recording devices located outside the Alameda and Contra Costa County courthouses.
"The government's unauthorized use of recording devices to capture private conversations at the Alameda and Contra Costa County courthouses violated the defendants' Fourth Amendment rights to be secure against unreasonable searches and seizures," defense lawyers wrote in U.S. v Marr, 14-580. more
Bugged coffin story #1.
Bugged coffin story #2.
Bugged coffin story #3.
Bugged coffin story #4.
Lawyers for a group of real estate professionals facing antitrust charges on Wednesday asked the judge overseeing the case to toss evidence gained from recording devices located outside the Alameda and Contra Costa County courthouses.
"The government's unauthorized use of recording devices to capture private conversations at the Alameda and Contra Costa County courthouses violated the defendants' Fourth Amendment rights to be secure against unreasonable searches and seizures," defense lawyers wrote in U.S. v Marr, 14-580. more
Bugged coffin story #1.
Bugged coffin story #2.
Bugged coffin story #3.
Bugged coffin story #4.
Just Don't Hold this "Cell Phone" to Your Head
Created by a Minnesota company called Ideal Conceal, the first product created by the startup is a handgun that can be disguised as a smartphone inside a case.
Built into a single frame, the grip of the double barreled, .380 caliber pistol folds down and locks into place when opened. When closed, the trigger and trigger guard are completed covered by the grip, thus offering up the appearance of a standard smartphone case. There’s also a clip to attach the handgun to a belt, but in the disguised smartphone form.
Similar to the size and shape of a smartphone, the folded Ideal Conceal can be easily slipped into a pants pocket or purse when not in use....
At this time, the pistol is still being developed by Ideal Conceal and isn’t in production as of yet. more
Built into a single frame, the grip of the double barreled, .380 caliber pistol folds down and locks into place when opened. When closed, the trigger and trigger guard are completed covered by the grip, thus offering up the appearance of a standard smartphone case. There’s also a clip to attach the handgun to a belt, but in the disguised smartphone form.
Similar to the size and shape of a smartphone, the folded Ideal Conceal can be easily slipped into a pants pocket or purse when not in use....
At this time, the pistol is still being developed by Ideal Conceal and isn’t in production as of yet. more
Thursday, March 24, 2016
The Puzzling Case of Corporate Espionage
Chris Wirth started Liberty Puzzles just over a decade ago as a sort of homage to his childhood and to the original wooden puzzles of the 1930s...
...Liberty’s sales back up the idea that puzzles are popular again. Liberty has grown considerably every year since it opened up shop. Lately, though, its puzzles have been so popular it’s “overwhelming,” says Wirth. But when we asked him how many puzzles the company sells each year, he declined to reveal anything. “We’ve been the victim of corporate espionage,” he says. Like people scouting out its Boulder, Colorado factory operations and stealing precious information. Who knew puzzle intelligence operatives were a thing? more
...Liberty’s sales back up the idea that puzzles are popular again. Liberty has grown considerably every year since it opened up shop. Lately, though, its puzzles have been so popular it’s “overwhelming,” says Wirth. But when we asked him how many puzzles the company sells each year, he declined to reveal anything. “We’ve been the victim of corporate espionage,” he says. Like people scouting out its Boulder, Colorado factory operations and stealing precious information. Who knew puzzle intelligence operatives were a thing? more
Brussels Suicide Bombers Planted Hidden Camera...
...At Home Of Top Belgium Nuclear Official
...Belgium’s federal prosecutor confirmed that on November 30, police seized footage that appeared to show a high-ranking Belgian nuclear official in an anti-terror raid. The surveillance video was discovered in a bust that resulted in the arrest of Mohamed Bakkali, who was charged with terrorist activity and murder in connection with the Paris attacks. His home in Auvelais may have been used as a hideout...
On Thursday, we get still more chilling evidence to suggest that this is all the work of the very same Belgium-based terror cell. According to Dernier Heure, it was the Bakraoui brothers that planted a hidden camera in the bushes and captured the 10-minute surveillance video of the senior Belgian nuclear official coming and going from his home. more
A European security official told the AP the terror squads are being trained in battleground strategies, explosives, surveillance techniques and countersurveillance — “next-level” methods Stewart said will help them avoid capture and kill scores of innocents.
“They’re doing pre-operational surveillance, attack planning and clandestine communications,” Stewart said. “That kind of advanced tradecraft gives them capabilities that are beyond what we’ve seen.” more
...Belgium’s federal prosecutor confirmed that on November 30, police seized footage that appeared to show a high-ranking Belgian nuclear official in an anti-terror raid. The surveillance video was discovered in a bust that resulted in the arrest of Mohamed Bakkali, who was charged with terrorist activity and murder in connection with the Paris attacks. His home in Auvelais may have been used as a hideout...
On Thursday, we get still more chilling evidence to suggest that this is all the work of the very same Belgium-based terror cell. According to Dernier Heure, it was the Bakraoui brothers that planted a hidden camera in the bushes and captured the 10-minute surveillance video of the senior Belgian nuclear official coming and going from his home. more
A European security official told the AP the terror squads are being trained in battleground strategies, explosives, surveillance techniques and countersurveillance — “next-level” methods Stewart said will help them avoid capture and kill scores of innocents.
“They’re doing pre-operational surveillance, attack planning and clandestine communications,” Stewart said. “That kind of advanced tradecraft gives them capabilities that are beyond what we’ve seen.” more
Apple Concerned About Spy Tech Being Added to Servers
Apple's huge success with services like iTunes, the App Store, and iCloud has a dark side.
Apple hasn't been able to build the all the data centers it needs to run these enormous photo storage and internet services on its own. And it worries that some of the equipment and cloud services it buys has been compromised by vendors who have agreed to put "back door" technology for government spying... more
Apple hasn't been able to build the all the data centers it needs to run these enormous photo storage and internet services on its own. And it worries that some of the equipment and cloud services it buys has been compromised by vendors who have agreed to put "back door" technology for government spying... more
Tuesday, March 22, 2016
The Future of Eavesdropping – Mind Reading
Imagine a world where all of your thoughts are visible – including to government agencies. This scenario might sound like it’s been plucked straight from the pages of a sci-fi novel, but it’s not as far-fetched as you might think.
Devices that measure and interpret electrical signals from our brains can already detect things like whether we are drowsy while driving.
In this video for the World Economic Forum, Nita A. Farahany, Professor of Law and Philosophy at Duke University, discusses the potential but also the legal and ethical risks of these emerging technologies.
“We are not yet at the point where a little thought bubble above your head is something we can see, but we’re getting there,” she says. more
Devices that measure and interpret electrical signals from our brains can already detect things like whether we are drowsy while driving.
In this video for the World Economic Forum, Nita A. Farahany, Professor of Law and Philosophy at Duke University, discusses the potential but also the legal and ethical risks of these emerging technologies.
“We are not yet at the point where a little thought bubble above your head is something we can see, but we’re getting there,” she says. more
Weird Craig's List Employment Ad - "Receptionist / File Clerk / Spy"
Can you be loyal to the boss?
Can you spy on the other employees?
Well, not literally spy, but you need to active keep a record of all employee work activity and report to the boss and be loyal to the boss only.
If you are capable of keeping track of the other workers and reporting the details of their tardiness, or punctuality etc. then do apply.
Anyone applying needs to have a very professional, well groomed appearance, since they will be the face of the office. Pics are not required to apply but they do help show if the candidate has the organizational skills to be well put together.
You would be the upfront receptionist, however, you would also be able to perform the following... more
Can you spy on the other employees?
Well, not literally spy, but you need to active keep a record of all employee work activity and report to the boss and be loyal to the boss only.
If you are capable of keeping track of the other workers and reporting the details of their tardiness, or punctuality etc. then do apply.
Anyone applying needs to have a very professional, well groomed appearance, since they will be the face of the office. Pics are not required to apply but they do help show if the candidate has the organizational skills to be well put together.
You would be the upfront receptionist, however, you would also be able to perform the following... more
Leaks at Water Department Prompt TSCM Sweep - They came up dry.
Charleston police have conducted a search for wiretaps at the West Virginia Water Development Authority building amid allegations of ethics violations.
The Charleston Gazette-Mail reports that police did not find any hidden listening devices during last week's wiretap sweep.
Water Development Authority Executive Director Chris Jarrett says he asked detectives to search the offices for wiretaps to check for unauthorized electronics.
The sweep comes after a dispute between the agency's geographic information system manager Michael Duminiak and two agency employees including Jarrett and Water Development Authority Executive Assistant Carol Cummings...
According to emails obtained by the newspaper, Duminiak says Cummings accused him of hacking employees' computers and tampering with the security system. Duminiak also accuses Cummings of secretly recording conversations on her smartphone. more
The Charleston Gazette-Mail reports that police did not find any hidden listening devices during last week's wiretap sweep.
Water Development Authority Executive Director Chris Jarrett says he asked detectives to search the offices for wiretaps to check for unauthorized electronics.
The sweep comes after a dispute between the agency's geographic information system manager Michael Duminiak and two agency employees including Jarrett and Water Development Authority Executive Assistant Carol Cummings...
According to emails obtained by the newspaper, Duminiak says Cummings accused him of hacking employees' computers and tampering with the security system. Duminiak also accuses Cummings of secretly recording conversations on her smartphone. more
Thursday, March 17, 2016
How a Tapped Phone Sparked a Mass Protest
In the latest of a series of explosive revelations that could bring down the Brazilian government, a secretly recorded phone call between former president Luiz Inácio ‘Lula’ da Silva and his successor, Dilma Rousseff, suggests his appointment to a ministerial position on Wednesday was motivated by a desire to avoid prosecution in Brazil’s worst-ever corruption scandal.
Judge Sergio Moro, the lead prosecutor in Operation Lava-jato, a two-year investigation into corruption at the state-run oil company, Petrobras, released nearly 50 audio recordings to the media on Wednesday evening, prompting chaotic scenes in congress as opposition deputies demanded Rousseff’s resignation.
On Wednesday night tens of thousands of Brazilians began gathering in São Paulo, BrasÃlia, Belo Horizonte and other major cities to demand the president’s resignation. In the capital Brasilia, riot police fired tear gas and stun grenades at more than 5,000 demonstrators outside the presidential palace and Congress building. Many waved banners calling for Lula’s arrest. Thousands more demonstrators packed the main Avenue Paulista in São Paulo. more
When was the last time you had your phones checked for taps? Call me. ~Kevin
Judge Sergio Moro, the lead prosecutor in Operation Lava-jato, a two-year investigation into corruption at the state-run oil company, Petrobras, released nearly 50 audio recordings to the media on Wednesday evening, prompting chaotic scenes in congress as opposition deputies demanded Rousseff’s resignation.
On Wednesday night tens of thousands of Brazilians began gathering in São Paulo, BrasÃlia, Belo Horizonte and other major cities to demand the president’s resignation. In the capital Brasilia, riot police fired tear gas and stun grenades at more than 5,000 demonstrators outside the presidential palace and Congress building. Many waved banners calling for Lula’s arrest. Thousands more demonstrators packed the main Avenue Paulista in São Paulo. more
When was the last time you had your phones checked for taps? Call me. ~Kevin
Wednesday, March 16, 2016
Art Imitates Life at AB Surveillance Solutions, LLC... well, maybe not your life.
"This House Has People In It" showcases the CCTV products of AB Surveillance Solutions, LLC in a very bizarre way...
Some things can't wait until the month ends. ~Kevin
Some things can't wait until the month ends. ~Kevin
Tuesday, March 15, 2016
Can Pro-Level Spy Gadgets Get Any Cheaper?!?!
I was just alerted to this by one of our Blue Blaze Irregulars. ~Kevin
from the website ad...
Conduct your own espionage or just take some spontaneous home videos with this Spy Watch. Disguised as a chronograph style watch, the 8GB Spy Camcorder can take AVI video and photos. The watch features push button control video and camera settings, and a USB connector disguised with a screw-down crown. When you’ve gathered your evidence, upload to your computer with the included USB cable. No one will ever guess that your watch was really a Spy Camcorder!
Records Audio and Images - Built-in microphone - Camera lens at 6 o’clock position - Records AVI video and takes still JPEG pictures - 720x480 or 640x480 video resolution
Functioning Timepiece - Analog display - Decorative sub-dials - Secure buckle clasp - Band dimensions: 20mm x 7.5” - Case dimensions: 40mm x 15mm
Good to Know - USB port for easy uploading to a PC or Mac - 8GB of storage - Rechargeable lithium ion battery - Full product dimensions: 40mm x 7.5”
Memory: 8GB Internal
Diameter: 40mm
Limit of 5 per person more
from the website ad...
Conduct your own espionage or just take some spontaneous home videos with this Spy Watch. Disguised as a chronograph style watch, the 8GB Spy Camcorder can take AVI video and photos. The watch features push button control video and camera settings, and a USB connector disguised with a screw-down crown. When you’ve gathered your evidence, upload to your computer with the included USB cable. No one will ever guess that your watch was really a Spy Camcorder!
Records Audio and Images - Built-in microphone - Camera lens at 6 o’clock position - Records AVI video and takes still JPEG pictures - 720x480 or 640x480 video resolution
Functioning Timepiece - Analog display - Decorative sub-dials - Secure buckle clasp - Band dimensions: 20mm x 7.5” - Case dimensions: 40mm x 15mm
Good to Know - USB port for easy uploading to a PC or Mac - 8GB of storage - Rechargeable lithium ion battery - Full product dimensions: 40mm x 7.5”
Memory: 8GB Internal
Diameter: 40mm
Limit of 5 per person more
Is Your Wireless Keyboard & Mouse Vulnerable to Eavesdropping? Better check...
Some of the computer dongles that come with wireless keyboards and mouses may offer hackers a fairly simple way to remotely access and take over your computer, according to a new report from Internet-of-things security startup Bastille.
Atlanta-based Bastille says it has determined that a number of non-Bluetooth wireless keyboards and mouses from seven companies—including Logitech, Dell, and Lenovo—have a design flaw that makes it easy for hackers from as far as about 90 meters away to pair with the dongle that these devices use to let you interact with your computer. A hacker could do things like control your computer or add malware to the machine.
In tests, the company found around a dozen devices that were susceptible to the flaw, which it’s listing online. more
PS - In addition to stealing keystrokes, this technique can also be used to inject keystrokes into the victims keyboard. ~Kevin
Click to enlarge. |
In tests, the company found around a dozen devices that were susceptible to the flaw, which it’s listing online. more
PS - In addition to stealing keystrokes, this technique can also be used to inject keystrokes into the victims keyboard. ~Kevin
Goverment Level TEMPEST Hack Keeps Dropping in Price
Researchers from Tel Aviv University and Technion have...found a way to steal data from air-gapped machines while their equipment is in another room.
“By measuring the target's electromagnetic emanations, the attack extracts the secret decryption key within seconds, from a target located in an adjacent room across a wall,” Daniel Genkin, Lev Pachmanov, Itamar Pipman, and Eran Tromer write in a recently published paper...
“The attack in its current form uses lab equipment that costs about $3000...
“The attacks are completely non-intrusive, we did not modify the targets or open their chassis"
The equipment used included an antenna, amplifiers, a software-defined radio, and a laptop. This process was being carried out through a 15cm thick wall, reinforced with metal studs, according to the paper. more
“By measuring the target's electromagnetic emanations, the attack extracts the secret decryption key within seconds, from a target located in an adjacent room across a wall,” Daniel Genkin, Lev Pachmanov, Itamar Pipman, and Eran Tromer write in a recently published paper...
“The attack in its current form uses lab equipment that costs about $3000...
“The attacks are completely non-intrusive, we did not modify the targets or open their chassis"
The equipment used included an antenna, amplifiers, a software-defined radio, and a laptop. This process was being carried out through a 15cm thick wall, reinforced with metal studs, according to the paper. more
Police Training Eagles to Intercept Drones
UK - The Metropolitan Police has confirmed it is considering using eagles to capture unauthorised remote controlled drones following a successful trial by Dutch police...
A 2014 inquiry led by Sir David Omand, the former head of intelligence agency GCHQ, highlighted the serious risks posed by the devices. "Crowds at sporting events or rallies could be vulnerable if a future terrorist group were to look for means of dispersing chemical or biological agents," the report said.
Dutch police teamed up with Guard From Above, a raptor-training security firm, to teach the birds how to hunt and intercept drones. "It's a low-tech solution to a high-tech problem," Dennis Janus, a spokesman for the Netherlands' national police, said. more
A 2014 inquiry led by Sir David Omand, the former head of intelligence agency GCHQ, highlighted the serious risks posed by the devices. "Crowds at sporting events or rallies could be vulnerable if a future terrorist group were to look for means of dispersing chemical or biological agents," the report said.
Dutch police teamed up with Guard From Above, a raptor-training security firm, to teach the birds how to hunt and intercept drones. "It's a low-tech solution to a high-tech problem," Dennis Janus, a spokesman for the Netherlands' national police, said. more
Monday, March 7, 2016
Erin Andrews Awarded $55 Million in Spycam Lawsuit
The jury has awarded Erin Andrews $55 million in her civil lawsuit over the secret recording and release of a video showing her naked during a hotel stay.
The sportscaster's original suit asked for $75 million from the owner and operator of the Nashville, Tennessee, hotel where she was staying, and Michael David Barrett, the stalker who used a hacksaw to tamper with her room's peephole and record the video in 2008.
The jurors took photos with Andrews after the amount was announced, and she signed autographs, according to reports from inside the courtroom. more
This puts ALL organizations with "expectation of privacy areas" on notice.
Due diligence inspections for spy cameras, and having a Recording in the Workplace Policy, are your defense.
Train your security and facilities people how to conduct and document spycam detection inspections today. http://spycamdetection.training
or contact me directly. Kevin
The sportscaster's original suit asked for $75 million from the owner and operator of the Nashville, Tennessee, hotel where she was staying, and Michael David Barrett, the stalker who used a hacksaw to tamper with her room's peephole and record the video in 2008.
The jurors took photos with Andrews after the amount was announced, and she signed autographs, according to reports from inside the courtroom. more
This puts ALL organizations with "expectation of privacy areas" on notice.
Due diligence inspections for spy cameras, and having a Recording in the Workplace Policy, are your defense.
Train your security and facilities people how to conduct and document spycam detection inspections today. http://spycamdetection.training
or contact me directly. Kevin
Friday, March 4, 2016
Security Director Alert: Upgrade Your Alarm System Cellular Backup Units
via Talkaphone...
That’s it, the end of 2G. It has been a fun ride but as of December 31, 2016 Verizon and GSM 2G cellular data will be switched off, making all product usage of the cellular signal obsolete.
For those who have yet to upgrade their emergency and security equipment, it’s time to make the switch.
The upgraded data options consist of 3G and 4G cellular data usage, as well as a Wi-Fi option is available for the impending cross over. Keep in mind that the higher the speed of your network can directly affect the reliability of your previously installed security products.
That’s it, the end of 2G. It has been a fun ride but as of December 31, 2016 Verizon and GSM 2G cellular data will be switched off, making all product usage of the cellular signal obsolete.
For those who have yet to upgrade their emergency and security equipment, it’s time to make the switch.
The upgraded data options consist of 3G and 4G cellular data usage, as well as a Wi-Fi option is available for the impending cross over. Keep in mind that the higher the speed of your network can directly affect the reliability of your previously installed security products.
Spy Rumor Mill: Next iPhone iOS may let you know your boss is watching you.
...the next Apple update you get - iOS 9.3 – could see you getting a message on your device, which will tell you if your iPhone is being supervised.
According to the whispers in tech-world, you’ll get a prominent message on your phone, and on your lock screen, if someone is snooping around your business.
A message on the lock screen will say ‘this iPhone is managed by your organization’ and it’ll have something on the About screen which will give you more detail, including text that says your iPhone’s supervisor can monitor your internet traffic and locate your device...
This is most likely to affect people who work for companies that give a number of phones and devices out to their staff, as a company phone... It’ll be utilized on supervised devices set up through Apple’s Device Enrollment Program, and will offer a feature called MDM (or Mobile Device Management). more
According to the whispers in tech-world, you’ll get a prominent message on your phone, and on your lock screen, if someone is snooping around your business.
A message on the lock screen will say ‘this iPhone is managed by your organization’ and it’ll have something on the About screen which will give you more detail, including text that says your iPhone’s supervisor can monitor your internet traffic and locate your device...
This is most likely to affect people who work for companies that give a number of phones and devices out to their staff, as a company phone... It’ll be utilized on supervised devices set up through Apple’s Device Enrollment Program, and will offer a feature called MDM (or Mobile Device Management). more
Subscribe to:
Posts (Atom)