Remember the USB Killer stick that indiscriminately and immediately fries about 95 percent of devices? (See the Security Scrapbook warning about it from last September.)
Well, now the company has released a new version that is even more lethal! And you can also buy an adapter pack, which lets you kill test devices with USB-C, Micro USB, and Lightning ports.
Further Reading: USB Killer, yours for £50, lets you easily fry almost every device
If you haven't heard of the USB Killer before, it's essentially a USB stick with a bunch of capacitors hidden within. When you plug it into a host device (a smartphone, a PC, an in-car or in-plane entertainment system), those capacitors charge up—and then a split second later, the stick dumps a huge surge of electricity into the host device, at least frying the port, but usually disabling the whole thing...
The new USB Killer V3, which costs about £50/$50, is apparently 1.5 times more powerful than its predecessor, is more lethal (it pumps out eight to 12 surges per second), and is itself more resistant to setups that might cause the USB Killer to fry itself. more
Spybusters Tip #783 - Block your USB ports with a USB lock and security tape. Aside from Killer Stick sabotage, USB ports are virus injection portals.
Friday, February 17, 2017
German Parents told to Destroy Cayla
An official watchdog in Germany has told parents to destroy a talking doll called Cayla because its smart technology can reveal personal data.
The warning was issued by the Federal Network Agency (Bundesnetzagentur), which oversees telecommunications.
Researchers say hackers can use an insecure bluetooth device embedded in the toy to listen and talk to the child playing with it.
Manufacturer Genesis Toys has not yet commented on the German warning. more
The warning was issued by the Federal Network Agency (Bundesnetzagentur), which oversees telecommunications.
Researchers say hackers can use an insecure bluetooth device embedded in the toy to listen and talk to the child playing with it.
Manufacturer Genesis Toys has not yet commented on the German warning. more
Who Was the First Person to Record Sound?
In 1857, Édouard-Léon Scott de Martinville patented a device for recording sound: A person spoke or sang into a barrel, causing a membrane of parchment to vibrate and a pig bristle to record a mark on a moving surface of glass or paper.
This was useful in studying the characteristics of sound, but a century and a half would pass before we had the technology to play back the recordings. In 2008, audio historians recovered Scott’s “phonautograms” from the French patent office and converted his waveforms into digital audio files.
The recording below was made on April 9, 1860. It’s the French folk song “Au clair de la lune,” recorded 28 years before Edison’s first wax cylinder. more
This was useful in studying the characteristics of sound, but a century and a half would pass before we had the technology to play back the recordings. In 2008, audio historians recovered Scott’s “phonautograms” from the French patent office and converted his waveforms into digital audio files.
The recording below was made on April 9, 1860. It’s the French folk song “Au clair de la lune,” recorded 28 years before Edison’s first wax cylinder. more
Coals to Newcastle Espionage (not just any coal)
A federal jury on Thursday convicted a Chinese scientist in Kansas of conspiring to steal samples of a variety of genetically engineered rice seeds from a U.S. research facility, the U.S. Justice Department said, the latest attempt at agricultural theft linked to China.
Weiqiang Zhang, 50, a Chinese national living in Manhattan, Kansas, was convicted on three counts, including conspiracy to steal trade secrets and interstate transportation of stolen property, the department said in a statement.
Zhang, who has a doctorate from Louisiana State University, worked as a rice breeder for Kansas-based Ventria Bioscience Inc, which develops genetically programmed rice used in the therapeutic and medical fields.
He stole hundreds of rice seeds produced by Ventria and stored them at his Manhattan residence, the statement said. more
Weiqiang Zhang, 50, a Chinese national living in Manhattan, Kansas, was convicted on three counts, including conspiracy to steal trade secrets and interstate transportation of stolen property, the department said in a statement.
Zhang, who has a doctorate from Louisiana State University, worked as a rice breeder for Kansas-based Ventria Bioscience Inc, which develops genetically programmed rice used in the therapeutic and medical fields.
He stole hundreds of rice seeds produced by Ventria and stored them at his Manhattan residence, the statement said. more
How to tell if Someone is a Spy (infographic)
Thursday, February 16, 2017
One Expensive GPS Tracker
UK - An “obsessive” dad stalked a woman by placing a tracking device on her car and posted ‘revenge porn’ on Facebook...repeatedly called his victim and turned up at her home and workplace uninvited.
John Wyn Williams, prosecuting, said: “She was advised by the police to check her car and found strapped to the bottom an iPhone used as a tracking device.” more
GPS trackers sell for less than $100. these days. A professional TSCM inspection, priceless. ~Kevin
John Wyn Williams, prosecuting, said: “She was advised by the police to check her car and found strapped to the bottom an iPhone used as a tracking device.” more
GPS trackers sell for less than $100. these days. A professional TSCM inspection, priceless. ~Kevin
Fox Sexual Harassment Lawsuit wants to Include Electronic Surveillance
In what were described by National Public Radio’s David Folkenflik as “explosive allegations,” former host Andrea Tantaros claimed Fox News conducted “electronic surveillance” and potentially “violated securities laws by not reporting [lawsuit] settlements to the Securities and Exchange Commission.”
The allegations of surveillance and securities fraud originate from a sexual harassment lawsuit filed in 2016 by Tantaros naming Fox News, Ailes, and on-air personalities Scott Brown and Bill O’Reilly, “alleging retaliation by Ailes after she tried to complain about harassment.” Tantaros has spoken out about the “pervasive … culture of misogyny and sexism” at Fox News, and claimed that she was sexually harassed by Ailes “numerous times.”
Moreover, the allegations of “electronic surveillance” come on the heels of Fox News’ parent company News Corp’s 2011 phone hacking scandal, and reports that Fox News even “hired a private investigator in late 2010 to obtain the personal home- and cell-phone records of” Media Matters’ own Joe Strupp. Now, according to The Washington Post, Tantaros’ lawyer is accusing Fox of electronic surveillance...
In the hearing, Burstein expressed his wish to amend the Tantaros suit by adding racketeering and electronic surveillance charges — a reference to the intelligence unit once operated by Ailes to spy on Fox News talent and critics. The judge told Burstein that he could not so amend the complaint. more
The allegations of surveillance and securities fraud originate from a sexual harassment lawsuit filed in 2016 by Tantaros naming Fox News, Ailes, and on-air personalities Scott Brown and Bill O’Reilly, “alleging retaliation by Ailes after she tried to complain about harassment.” Tantaros has spoken out about the “pervasive … culture of misogyny and sexism” at Fox News, and claimed that she was sexually harassed by Ailes “numerous times.”
Moreover, the allegations of “electronic surveillance” come on the heels of Fox News’ parent company News Corp’s 2011 phone hacking scandal, and reports that Fox News even “hired a private investigator in late 2010 to obtain the personal home- and cell-phone records of” Media Matters’ own Joe Strupp. Now, according to The Washington Post, Tantaros’ lawyer is accusing Fox of electronic surveillance...
In the hearing, Burstein expressed his wish to amend the Tantaros suit by adding racketeering and electronic surveillance charges — a reference to the intelligence unit once operated by Ailes to spy on Fox News talent and critics. The judge told Burstein that he could not so amend the complaint. more
Spy Radio History - The Rhode & Schwarz ESM500A
This receiver was used by the top government surveillance agencies worldwide during the 1990's (CIA, NSA, GCHQ, BND, etc.) Some countries may still be using it today.
Depending upon the installed options, it would have set the purchaser back from $25,000 to $40,000 USD.
ESM series receivers are highly prized by premium receiver collectors, radio museums, and amateur radio / TSCM enthusiasts. It is is considered to be one of the best communications receivers ever made.
More photos and a chance to own it, here.
Depending upon the installed options, it would have set the purchaser back from $25,000 to $40,000 USD.
ESM series receivers are highly prized by premium receiver collectors, radio museums, and amateur radio / TSCM enthusiasts. It is is considered to be one of the best communications receivers ever made.
More photos and a chance to own it, here.
Labels:
#CIA,
#eavesdropping,
#NSA,
GCHQ,
government,
historical,
wireless
Ticketmaster Allegedly Hacked Start-up to Steal Trade Secrets
A startup ticketing company alleged in a legal filing that Live Nation Entertainment Inc., the country’s biggest concert promoter, hacked into its computer systems and stole trade secrets.
The allegations, included in an amended antitrust lawsuit that was originally filed by Brooklyn-based Songkick in 2015, are based on information that the company said came to light in the discovery process.
Filed in U.S. District Court in Los Angeles Wednesday, the complaint alleges that Live Nation’s Ticketmaster unit obtained unauthorized access to Songkick’s computers with the help of an executive who has worked at both companies. more
Spybuster Tip #512 — Change all passwords whenever an employee is terminated or quits. ~Kevin
The allegations, included in an amended antitrust lawsuit that was originally filed by Brooklyn-based Songkick in 2015, are based on information that the company said came to light in the discovery process.
Filed in U.S. District Court in Los Angeles Wednesday, the complaint alleges that Live Nation’s Ticketmaster unit obtained unauthorized access to Songkick’s computers with the help of an executive who has worked at both companies. more
Spybuster Tip #512 — Change all passwords whenever an employee is terminated or quits. ~Kevin
Samsung Warns its "Smart TV" Listens to Every Word
Samsung has confirmed that its "smart TV" sets are listening to customers' every word, and the company is warning customers not to speak about personal information while near the TV sets.
The company revealed that the voice activation feature on its smart TVs will capture all nearby conversations. The TV sets can share the information, including sensitive data, with Samsung as well as third-party services...
Samsung has now issued a new statement clarifying how the voice activation feature works. "If a consumer consents and uses the voice recognition feature, voice data is provided to a third party during a requested voice command search," Samsung said in a statement. "At that time, the voice data is sent to a server, which searches for the requested content then returns the desired content to the TV." more
How to make your smart-ass TV dumb, by making it deaf and blind. ~Kevin
The company revealed that the voice activation feature on its smart TVs will capture all nearby conversations. The TV sets can share the information, including sensitive data, with Samsung as well as third-party services...
Samsung has now issued a new statement clarifying how the voice activation feature works. "If a consumer consents and uses the voice recognition feature, voice data is provided to a third party during a requested voice command search," Samsung said in a statement. "At that time, the voice data is sent to a server, which searches for the requested content then returns the desired content to the TV." more
How to make your smart-ass TV dumb, by making it deaf and blind. ~Kevin
Wednesday, February 15, 2017
Security Director Alert: Must See Video About Printer Security
My team and I have been giving the IT folks nightmares about this for years.
Now, you can too!
Watch this...
~Kevin
At a time when hacking dominates much of the news, HP is turning to Mr. Robot himself to highlight its new security platform designed to protect business printers. The Palo Alto-based company has tapped Christian Slater for a year-long digital series called "The Wolf" in order to draw attention to cybersecurity in the workplace.
"Sheep never realize a wolf's around until it's too late. Then they do exactly what the wolf expects them to do. They run into each other, they fall down—they become dinner. Time to eat," says a spectacled Mr. Slater in the series' 30-second trailer.
The first six-minute episode shows the actor lurking outside offices, sending sheep cartoons to oblivious workers, crashing birthday parties and sending suspicious spa gift certificates via email. At one point, he even howls. more
Now, you can too!
Watch this...
~Kevin
At a time when hacking dominates much of the news, HP is turning to Mr. Robot himself to highlight its new security platform designed to protect business printers. The Palo Alto-based company has tapped Christian Slater for a year-long digital series called "The Wolf" in order to draw attention to cybersecurity in the workplace.
"Sheep never realize a wolf's around until it's too late. Then they do exactly what the wolf expects them to do. They run into each other, they fall down—they become dinner. Time to eat," says a spectacled Mr. Slater in the series' 30-second trailer.
The first six-minute episode shows the actor lurking outside offices, sending sheep cartoons to oblivious workers, crashing birthday parties and sending suspicious spa gift certificates via email. At one point, he even howls. more
Tuesday, February 14, 2017
Today Only - "Q" Gadgets from WWII up for Auction
James Bond's gadgets may seem far-fetched, but they do have a basis in fact as an auction in Kent, UK shows.
C & T Auctioneers is running an online auction through February 14 that includes a collection of authentic "Q" gadgets from the Second World War and beyond that were used by spies behind enemy lines and to help Allied POWs escape and evade capture.
During the Second World War, Britain's Special Operations Executive (SOE) was tasked by Prime Minister Winston Churchill to "set Europe ablaze" by dropping agents behind Axis lines to carry out espionage and sabotage as well as coordinating resistance movements. But they didn't go unarmed.
Thanks to Charles Fraser-Smith (Ian Fleming's inspiration for the character Q), SOE agents were equipped with gadgets to help them in their clandestine work. At the C&T auction, five of the eight items on sale were made for the SOE. more
C & T Auctioneers is running an online auction through February 14 that includes a collection of authentic "Q" gadgets from the Second World War and beyond that were used by spies behind enemy lines and to help Allied POWs escape and evade capture.
During the Second World War, Britain's Special Operations Executive (SOE) was tasked by Prime Minister Winston Churchill to "set Europe ablaze" by dropping agents behind Axis lines to carry out espionage and sabotage as well as coordinating resistance movements. But they didn't go unarmed.
Thanks to Charles Fraser-Smith (Ian Fleming's inspiration for the character Q), SOE agents were equipped with gadgets to help them in their clandestine work. At the C&T auction, five of the eight items on sale were made for the SOE. more
Sunday, February 12, 2017
Your New U.N.C.L.E. — Private Sector Intelligence Firms
UK - Private intelligence companies are part of a booming business in London and the British government complains it is having trouble retaining talented agents who are being drawn by high salaries and more growth opportunities in a blossoming industry estimated to be worth $19 billion.
“Our mission is to fill a gap of knowledge or information in any situation,” said Patrick Grayson, founder and CEO of GPW, a respected mid-sized London intelligence firm. “There’s always something people should or could know in addition to what they do know. Our job is to answer that question. To fill that gap in knowledge.”
With legal firms as their key clients, Gray’s company has set up shop on London’s Chancery Lane in the heart of the city’s legal district, where solicitors and judges dressed in the traditional court garb that includes white wigs and black robes can be seen walking between the courts and their offices in the medieval Inner Temple area...
“Britain has been a very fertile place for information, intelligence gathering, and that has to do with our position in the globe, the British tradition of exploring foreign parts and relying on accurate information to expand its interests,” said Grayson.
Getting that accurate information requires tools that are reminiscent of the movies. Gear commonly used include jamming equipment to ensure that boardroom discussions are not being recorded and bug-searching devices...
Observers say the British government faces a brain drain as agents employed by police forces, the military and civilian intelligence agencies leave their jobs for better paying positions in private sector firms that often bill at rates of more than $1,000 an hour. more
Yesterday's Intelligence Office Entrance |
With legal firms as their key clients, Gray’s company has set up shop on London’s Chancery Lane in the heart of the city’s legal district, where solicitors and judges dressed in the traditional court garb that includes white wigs and black robes can be seen walking between the courts and their offices in the medieval Inner Temple area...
Today's Intelligence Office Entrance |
Getting that accurate information requires tools that are reminiscent of the movies. Gear commonly used include jamming equipment to ensure that boardroom discussions are not being recorded and bug-searching devices...
Observers say the British government faces a brain drain as agents employed by police forces, the military and civilian intelligence agencies leave their jobs for better paying positions in private sector firms that often bill at rates of more than $1,000 an hour. more
Security Director Alert: Site Seeing In China - Not All Sites Can Be Seen
Traveling to China?
Need to connect with specific websites?
Check to see if you will be able to connect.
The New York Times is an example of one popular site which is blocked.
Fortunately, GreatFire.org has a work-around for this, and other helpful tips.
Check here for our 20 additional traveler's tips. ~Kevin
Need to connect with specific websites?
Check to see if you will be able to connect.
The New York Times is an example of one popular site which is blocked.
Fortunately, GreatFire.org has a work-around for this, and other helpful tips.
Check here for our 20 additional traveler's tips. ~Kevin
Thursday, February 9, 2017
Eavesdrop on Elevators
Did you know that some elevators talk to their bosses?
Yes, machines do have a secret life.
Eavesdrop on one.
Fascinating!
Yes, machines do have a secret life.
Eavesdrop on one.
Fascinating!
Workplace Eavesdropping - Time to Consider a Recording in the Workplace Policy
PA - A Fayetteville man is accused of secretly recording a conversation regarding a workplace dispute and posting the recording on Facebook.
John Frederick Richards III, 54, is charged with felony intercepting communications and "disclose intercepted communications," according to court documents. more
A Spycam Detection Program & Recording in the Workplace Policy is available here.
P.S. If you are going to break eavesdropping laws, don't post the evidence on Facebook. ~Kevin
John Frederick Richards III, 54, is charged with felony intercepting communications and "disclose intercepted communications," according to court documents. more
A Spycam Detection Program & Recording in the Workplace Policy is available here.
P.S. If you are going to break eavesdropping laws, don't post the evidence on Facebook. ~Kevin
Wednesday, February 8, 2017
FutureWatch: Powerless Bugs or Teslabestiola II (update)
Back in 2013, the Security Scrapbook alerted you to Ambient Backscatter as a developing technology with extreme potential, including electronic surveillance / eavesdropping.
At that time I said, "Ambient Backscatter research is in its infancy. Imagine the possibilities. Technical espionage could see its biggest advancement since the transistor."
Today, Jeeva Wireless, is developing this technology and is about to come out of stealth mode.
The technology is so interesting, NASA has posted Federal contract opportunity NND1710133Q, "a sole source contract under the authority FAR 13.106-1(b)(1)(i)."
Here is the update...
"A group of University of Washington engineers has raised capital to develop and commercialize a power-efficient way to generate WiFi transmissions.
Jeeva Wireless just reeled in a $1.2 million round, co-founder Shyamnath Gollakota confirmed with GeekWire. He declined to provide more details about the cash and how Jeeva will use it, as the Seattle startup is still in stealth mode.
The company’s co-founders are the same UW researchers who co-authored a study last year for a Passive Wi-Fi system that can generate WiFi transmissions using 10,000 times less power than conventional methods.
Not even low-power options such as Bluetooth Low Energy and Zigbee can match the system’s energy efficiency, based on the study that earned the UW team a place on MIT Technology Review’s top-ten list of breakthrough technologies in 2016. With the fresh funding, it appears that the company is ready to commercialize its innovation" more
At that time I said, "Ambient Backscatter research is in its infancy. Imagine the possibilities. Technical espionage could see its biggest advancement since the transistor."
Today, Jeeva Wireless, is developing this technology and is about to come out of stealth mode.
The technology is so interesting, NASA has posted Federal contract opportunity NND1710133Q, "a sole source contract under the authority FAR 13.106-1(b)(1)(i)."
Here is the update...
"A group of University of Washington engineers has raised capital to develop and commercialize a power-efficient way to generate WiFi transmissions.
Jeeva Wireless just reeled in a $1.2 million round, co-founder Shyamnath Gollakota confirmed with GeekWire. He declined to provide more details about the cash and how Jeeva will use it, as the Seattle startup is still in stealth mode.
The company’s co-founders are the same UW researchers who co-authored a study last year for a Passive Wi-Fi system that can generate WiFi transmissions using 10,000 times less power than conventional methods.
Not even low-power options such as Bluetooth Low Energy and Zigbee can match the system’s energy efficiency, based on the study that earned the UW team a place on MIT Technology Review’s top-ten list of breakthrough technologies in 2016. With the fresh funding, it appears that the company is ready to commercialize its innovation" more
Labels:
#hack,
#weird,
ambient backscatter,
FutureWatch,
IoT,
product,
spybot,
wireless
This Month's SpyCam Darwin Award - Shot While Spycaming
NY - An Erie County man has been arrested after spying on his neighbors with his cell phone.
Investigators said David Schindley's phone had more than 50 videos held closely to the windows of bedrooms, bathrooms or other rooms. The videos go back to this past October.
Schindley was taken into custody on Sunday after he was shot by a homeowner on the 500 block of Bald Eagle Drive. Deputies said the homeowner heard a noise and thought Schindley was trying to break into his home.
Schindley was shot in the leg, the homeowner who shot the suspect was not charged. more
Investigators said David Schindley's phone had more than 50 videos held closely to the windows of bedrooms, bathrooms or other rooms. The videos go back to this past October.
Schindley was taken into custody on Sunday after he was shot by a homeowner on the 500 block of Bald Eagle Drive. Deputies said the homeowner heard a noise and thought Schindley was trying to break into his home.
Schindley was shot in the leg, the homeowner who shot the suspect was not charged. more
Television-Spying Case - Vizio to Pay $2.2 Million
The Federal Trade Commission said Monday that Vizio used 11 million televisions to spy on its customers.
The company agreed to pay $2.2 million to settle a case with the FTC and the New Jersey attorney general’s office after the agencies accused it of secretly collecting — and selling — data about its customers’ locations, demographics and viewing habits.
“Before a company pulls up a chair next to you and starts taking careful notes on everything you watch (and then shares it with its partners), it should ask if that’s O.K. with you,” Kevin McCarthy, an attorney with the FTC’s Division of Privacy and Identity Protection, wrote in a blog post. “Vizio wasn’t doing that, and the FTC stepped in.”
As part of the settlement, Vizio neither confirmed nor denied wrongdoing. more
The company agreed to pay $2.2 million to settle a case with the FTC and the New Jersey attorney general’s office after the agencies accused it of secretly collecting — and selling — data about its customers’ locations, demographics and viewing habits.
“Before a company pulls up a chair next to you and starts taking careful notes on everything you watch (and then shares it with its partners), it should ask if that’s O.K. with you,” Kevin McCarthy, an attorney with the FTC’s Division of Privacy and Identity Protection, wrote in a blog post. “Vizio wasn’t doing that, and the FTC stepped in.”
As part of the settlement, Vizio neither confirmed nor denied wrongdoing. more
All Black's Bugging Scandal - Update
Australia - The security guard accused of fabricating the All Blacks hotel bugging scandal that rocked last year’s Bledisloe Cup has vehemently denied any wrongdoing saying: “I don’t know anything about this stupid bloody bug.”
Gravel-voiced Adrian Gard, 51... was charged with public mischief after a listening device was unearthed in the All Blacks’ team meeting room at the InterContinental in Double Bay...
Gard, who has 31 years’ experience in the security industry, is at the centre of a bizarre cloak and dagger scandal after a device similar to that used by law enforcement and spying agencies was discovered in a routine sweep of the team’s meeting room in August ahead of the clash with Australia. It was reportedly found in the foam of a chair...
Police will allege the security chief, who has protected the All Blacks for more than 10 years, claimed he “found” the device but investigators do not believe it was stuffed in a chair.
Gard, from Brisbane, will face court next month for the offence which relates to providing police with false information carrying a maximum 12-month sentence. more
Gravel-voiced Adrian Gard, 51... was charged with public mischief after a listening device was unearthed in the All Blacks’ team meeting room at the InterContinental in Double Bay...
Gard, who has 31 years’ experience in the security industry, is at the centre of a bizarre cloak and dagger scandal after a device similar to that used by law enforcement and spying agencies was discovered in a routine sweep of the team’s meeting room in August ahead of the clash with Australia. It was reportedly found in the foam of a chair...
Police will allege the security chief, who has protected the All Blacks for more than 10 years, claimed he “found” the device but investigators do not believe it was stuffed in a chair.
Gard, from Brisbane, will face court next month for the offence which relates to providing police with false information carrying a maximum 12-month sentence. more
Tuesday, February 7, 2017
Sad Story of the Beaten Bean Counter, or Wiretap Whistleblower Wasted
The Ninth Circuit on Monday dealt a final blow to a career prosecutor whose whistleblower lawsuit claimed the nation’s largest telecommunications bilked the federal government for surveillance services for two decades.
The Ninth Circuit panel affirmed dismissal of prosecutor John Christopher Prather’s whistleblower suit...
He said the reduced labor should have lowered costs, but that the telecoms began charging law enforcement agencies, including the FBI and the Justice Department, fees 10 times higher than they should have been.
Prather, who reviewed the telecoms’ rate sheets and developed surveillance budgets as part of his duties supervising wiretapping activities, grew suspicious, and filed a qui tam action in 2009 under the False Claims Act. more previously in the Security Scrapbook
The Ninth Circuit panel affirmed dismissal of prosecutor John Christopher Prather’s whistleblower suit...
He said the reduced labor should have lowered costs, but that the telecoms began charging law enforcement agencies, including the FBI and the Justice Department, fees 10 times higher than they should have been.
Prather, who reviewed the telecoms’ rate sheets and developed surveillance budgets as part of his duties supervising wiretapping activities, grew suspicious, and filed a qui tam action in 2009 under the False Claims Act. more previously in the Security Scrapbook
All Blacks Bugging: Man Charged
A man, understood to be a security consultant for New Zealand's All Blacks rugby team, has been charged over a listening device found in the team's Sydney hotel room during last year's Bledisloe Cup.
The device — described as similar to that used by law enforcement and spy agencies — was found inside a chair during a routine security search of the team's meeting room at the Intercontinental Hotel at Double Bay ahead of a Bledisloe Cup match against Australia last year.
Adrian Gard, 51, is understood to be a consultant for BGI Security which was contracted by the All Blacks during their Bledisloe Cup campaign.
He has been charged with public mischief over the bugging incident. more
The device — described as similar to that used by law enforcement and spy agencies — was found inside a chair during a routine security search of the team's meeting room at the Intercontinental Hotel at Double Bay ahead of a Bledisloe Cup match against Australia last year.
Adrian Gard, 51, is understood to be a consultant for BGI Security which was contracted by the All Blacks during their Bledisloe Cup campaign.
He has been charged with public mischief over the bugging incident. more
Monday, February 6, 2017
Car Wars: Fifty Years of Backstabbing Infighting And Industrial Espionage (book)
Car Wars - An "astonishing...eye-opening chronicle" (Publisher's Weekly) of backstabbing, infighting, and industrial theft and espionage in the world's biggest business. It makes empires; it destroys economies; it shapes history.
Welcome to the world's biggest business--the automobile industry. A hundred years ago there were six highly experimental cars. Today there are close to 400 million cars on the planet: set bumper to bumper on a six-lane highway, they would stretch well over 200,000 miles, more than eight times around the earth.
With hundreds of billions of dollars at stake, is it any wonder that the major car companies wage a relentless war against one another, where (almost) anything goes? Here is the story of all the schemes and deceits, treacheries and shady deals in the battle for the world's car markets since the dawn of the global economy fifty years ago. more
Welcome to the world's biggest business--the automobile industry. A hundred years ago there were six highly experimental cars. Today there are close to 400 million cars on the planet: set bumper to bumper on a six-lane highway, they would stretch well over 200,000 miles, more than eight times around the earth.
With hundreds of billions of dollars at stake, is it any wonder that the major car companies wage a relentless war against one another, where (almost) anything goes? Here is the story of all the schemes and deceits, treacheries and shady deals in the battle for the world's car markets since the dawn of the global economy fifty years ago. more
The James Bond Movie Director Who Actually Was A Spy
That James Bond creator Ian Fleming drew literary inspiration from his wartime work in espionage is relatively well known. But the heroic World War Two exploits of the director of Bond films including Goldfinger and Live and Let Die are less well documented. more
Guy Hamilton's daring exploits can be relived on Inside Out South West on BBC One on Monday 6 February at 19:30 BST and on the iPlayer for 30 days thereafter
Guy Hamilton's daring exploits can be relived on Inside Out South West on BBC One on Monday 6 February at 19:30 BST and on the iPlayer for 30 days thereafter
Security Director Alert - Check the Security of Your Networked Printers
Following recent research that showed many printer models are vulnerable to attacks, a hacker decided to prove the point and forced thousands of publicly exposed printers to spew out rogue messages.
Stackoverflowin claims to be a high-school student from the U.K. who is interested in security research...
The issue of publicly exposed printers is not new and has been exploited before to print rogue and sometimes offensive messages. However, the issue was renewed last week when researchers from Ruhr-University Bochum in Germany published a paper on different attacks against network printers and an assessment of 20 printer models. The researchers also released a Printer Exploitation Toolkit and published a printer hacking wiki.
Users should make sure that their printers can't be accessed through a public Internet Protocol address at all, Stackoverflowin said. However, if they need to do this, they should enforce access rules in their routers and only whitelist certain IP addresses, or set up a virtual private network, he said. more
I occasionally find networked printers are a back door to company networks. The most common issue is unsecured WiFi access. Have your IT department review this post and then double-check the security of the printers. Or, contact me for a complete technical information security inspection (TSCM). ~Kevin
Stackoverflowin claims to be a high-school student from the U.K. who is interested in security research...
The issue of publicly exposed printers is not new and has been exploited before to print rogue and sometimes offensive messages. However, the issue was renewed last week when researchers from Ruhr-University Bochum in Germany published a paper on different attacks against network printers and an assessment of 20 printer models. The researchers also released a Printer Exploitation Toolkit and published a printer hacking wiki.
Users should make sure that their printers can't be accessed through a public Internet Protocol address at all, Stackoverflowin said. However, if they need to do this, they should enforce access rules in their routers and only whitelist certain IP addresses, or set up a virtual private network, he said. more
I occasionally find networked printers are a back door to company networks. The most common issue is unsecured WiFi access. Have your IT department review this post and then double-check the security of the printers. Or, contact me for a complete technical information security inspection (TSCM). ~Kevin
Weird TSCM Science - Tuning Windows to Block Radio Frequency Eavesdropping
A new flexible material developed by engineers at the University of California, San Diego (UCSD) is claimed to be able to tune out various portions of the electromagnetic spectrum while allowing others to pass through, such as being opaque to infra-red but transparent to visible light, for example. This material has the potential to vastly improve the efficiencies of solar cells, or create window coatings that not only let in visible light and keep out heat, but also stop electronic eavesdropping by blocking electromagnetic signals.
Though still very much at the working prototype stage, the researchers intend to further their research by analyzing the effects of different materials, physical arrangements, and semiconductor properties in an attempt to create materials that absorb light at different wavelengths for use in a variety of applications.
The results of this research were recently published in the journal Proceedings of the National Academy of Sciences. more
Though still very much at the working prototype stage, the researchers intend to further their research by analyzing the effects of different materials, physical arrangements, and semiconductor properties in an attempt to create materials that absorb light at different wavelengths for use in a variety of applications.
The results of this research were recently published in the journal Proceedings of the National Academy of Sciences. more
How to be a Spy
Are you cut out for 00 status?
In America, spies in trench coats are usually bugging your office and listening in on your phone calls. In Britain, her majesty’s secret servants are busy code breaking between rounds of cricket.
In Vienna, instead, you just spend a day at the coffee house and, if you listen carefully, you will soon be up-to-date about the latest rumors of this city that loves secrets – and even more, to gossip about them on the sly...
Luckily, the city offers everything you need to live the high life of a spy. more
Rule #1 - Don't look goofy. |
In Vienna, instead, you just spend a day at the coffee house and, if you listen carefully, you will soon be up-to-date about the latest rumors of this city that loves secrets – and even more, to gossip about them on the sly...
Luckily, the city offers everything you need to live the high life of a spy. more
Sunday, February 5, 2017
Even Your Car is Spying on You
You may not know this, but your car is collecting lots of information
about your driving habits and history.
Who has access to this data and for what purpose? We speak with Lauren Smith, policy counsel at The Future of Privacy Forum. audio download
Who has access to this data and for what purpose? We speak with Lauren Smith, policy counsel at The Future of Privacy Forum. audio download
Recent Spy Camera News
A radiologist at a private practice has been spared jail after stashing his mobile phone in an air vent to record patients using the unisex toilet. more
An Orleans Parish judge dealt several setbacks late Tuesday to a prominent New Orleans breast reconstruction surgeon who faces rape and video voyeurism charges. Dr. Alireza Sadeghi, 41, is accused of raping and surreptitiously filming his now-estranged wife and of videotaping four nude patients in the operating room without their consent. In at least one instance, prosecutors claim, Sadeghi forwarded the footage to a friend. His trial is scheduled for March 20. more
A Utah man and student at BYU-Idaho has been accused of placing a small camera in the bathroom of a Rexburg apartment where six female students live... Rexburg police say a small camera was found hidden inside a towel hook mounted in the bathroom. more
A handyman who was jailed for 24 weeks after he hid a spy camera in a woman's bathroom after being invited round to fix her banisters is appealing his conviction... The court had heard Burnett, 41, planted the covert device in a vase in the victim's bathroom and could control it using an app on his mobile phone. When the victim went to change the flowers in the bathroom two months later she discovered the device and contacted the police. more
Some Indiana lawmakers suggest drone users with nefarious intentions could be flying under the radar under existing laws. ...the proposal creates a “remote aerial voyeurism” crime and addresses penalties for sex offenders operating drones inappropriately. more
Shaun Turner accessed his victims’ personal webcams but was caught by the Eastern Regional Operations Unit (ERSOU) following a tip-off. Turner, 29, of Race Course View, Cottenham, was used a malware system known as a Remote Access Trojan or ‘RAT’, a court heard. The RATs used by Turner enabled him to download all files held on his victims’ computers – including personal pictures, videos and identity documents. In addition, he deployed software to victims’ computers that streamed live images taken by their webcam to his own computer to view. more
An Orleans Parish judge dealt several setbacks late Tuesday to a prominent New Orleans breast reconstruction surgeon who faces rape and video voyeurism charges. Dr. Alireza Sadeghi, 41, is accused of raping and surreptitiously filming his now-estranged wife and of videotaping four nude patients in the operating room without their consent. In at least one instance, prosecutors claim, Sadeghi forwarded the footage to a friend. His trial is scheduled for March 20. more
A Utah man and student at BYU-Idaho has been accused of placing a small camera in the bathroom of a Rexburg apartment where six female students live... Rexburg police say a small camera was found hidden inside a towel hook mounted in the bathroom. more
A handyman who was jailed for 24 weeks after he hid a spy camera in a woman's bathroom after being invited round to fix her banisters is appealing his conviction... The court had heard Burnett, 41, planted the covert device in a vase in the victim's bathroom and could control it using an app on his mobile phone. When the victim went to change the flowers in the bathroom two months later she discovered the device and contacted the police. more
Some Indiana lawmakers suggest drone users with nefarious intentions could be flying under the radar under existing laws. ...the proposal creates a “remote aerial voyeurism” crime and addresses penalties for sex offenders operating drones inappropriately. more
Shaun Turner accessed his victims’ personal webcams but was caught by the Eastern Regional Operations Unit (ERSOU) following a tip-off. Turner, 29, of Race Course View, Cottenham, was used a malware system known as a Remote Access Trojan or ‘RAT’, a court heard. The RATs used by Turner enabled him to download all files held on his victims’ computers – including personal pictures, videos and identity documents. In addition, he deployed software to victims’ computers that streamed live images taken by their webcam to his own computer to view. more
TV News Report: Peeping Toms Go High-Tech with Covert Cameras
When it comes to hidden cameras, cellphones are just the beginning. 12 News had two well-known licensed private investigators show us just how covert cameras have become...
So the question is, with cameras being so available and affordable – is there any way to protect yourself from being spied on without knowing it?
He showed us one of several products they have to detect hidden cameras.
The basic device uses a red strobe light to reflect light off the lens of a camera that may be hidden in an object.
They also sell radio frequency detectors which can help detect any wireless signals.
Still, according to our private investigators, neither detection method is full proof.
“There is no sense of protection in terms of a cure all,” George said, “if somebody wanted to set up a camera without your knowledge and you weren't inquisitive - you would never know it was there.”
He says simple awareness and just being inquisitive is your biggest weapon. more with video report
Learn how to discover covert spy cameras yourself.
So the question is, with cameras being so available and affordable – is there any way to protect yourself from being spied on without knowing it?
He showed us one of several products they have to detect hidden cameras.
The basic device uses a red strobe light to reflect light off the lens of a camera that may be hidden in an object.
They also sell radio frequency detectors which can help detect any wireless signals.
Still, according to our private investigators, neither detection method is full proof.
“There is no sense of protection in terms of a cure all,” George said, “if somebody wanted to set up a camera without your knowledge and you weren't inquisitive - you would never know it was there.”
He says simple awareness and just being inquisitive is your biggest weapon. more with video report
Learn how to discover covert spy cameras yourself.
Friday, February 3, 2017
Town Supervisor Resigns, Pleads Guilty to Felony Eavesdropping
NY - Geddes town supervisor Manny Falcone has just pleaded guilty to felony eavesdropping for ordering his secretary to illegally listen to conversations among others in the town hall...
Falcone admitted he ordered the audio capabilities on a town hall security camera to be activated so he could eavesdrop between February and September 2016. The camera was located in the main entryway of the building. more
Falcone admitted he ordered the audio capabilities on a town hall security camera to be activated so he could eavesdrop between February and September 2016. The camera was located in the main entryway of the building. more
Police Chief Pleads Not Guilty to Eavesdropping
CA - David Paul Edmiston, an acting Kern High School District police chief accused of surreptitiously recording his officers, pled not guilty in Kern County Superior Court Wednesday to four counts of misdemeanor eavesdropping.
Edmiston was named acting police chief in August, after Chief Joseph Lopeteguy, who alleged high-level school district administrators were illegally using a sensitive police database, went on medical stress leave. more
Edmiston was named acting police chief in August, after Chief Joseph Lopeteguy, who alleged high-level school district administrators were illegally using a sensitive police database, went on medical stress leave. more
Spy History - Secret Radio Eavesdropping 'made operators deaf'
UK - 2 February 1982: GCHQ staff are suing for their loss of hearing after spending decades listening to ‘interesting’ frequencies...
...had been employed “to listen to radio signals — which the makers would not wish other people to listen to. “The desired signals would frequently be found among a large number of other signals — the way that one is accustomed to ‘finding on the ordinary radio particularly outside VHF and particularly in the evening.”
Many signals were “deliberately drowned” to prevent others hearing them. Their volume controls were always the highest pitch in case they missed anything. As a result, operators were listening to relatively faint signals among a barrage of much louder ones. Over a period of years, their hearing had been impaired. All had suffered from ringing in the ears.”
The case was settled a week later with damages of £25,000 paid to the operators. more
...had been employed “to listen to radio signals — which the makers would not wish other people to listen to. “The desired signals would frequently be found among a large number of other signals — the way that one is accustomed to ‘finding on the ordinary radio particularly outside VHF and particularly in the evening.”
Many signals were “deliberately drowned” to prevent others hearing them. Their volume controls were always the highest pitch in case they missed anything. As a result, operators were listening to relatively faint signals among a barrage of much louder ones. Over a period of years, their hearing had been impaired. All had suffered from ringing in the ears.”
The case was settled a week later with damages of £25,000 paid to the operators. more
North Korea’s Spy Agency Head-less
The head of North Korea’s spy agency has become the most senior victim of another round of apparent purges ordered by the country’s leader, Kim Jong-un, South Korean officials have said.
Kim Won-hong, the state security minister and a close aide to the leader, was sacked in mid-January after being accused of corruption, abuse of power and human rights abuses, according to the unification ministry in Seoul, which handles cross-border issues.
It is not clear whether he has been permanently banished or ordered to undergo “re-education” with a view to being brought back into Kim Jong-un’s inner circle. His removal has not been confirmed by North Korea. more
Kim Won-hong, the state security minister and a close aide to the leader, was sacked in mid-January after being accused of corruption, abuse of power and human rights abuses, according to the unification ministry in Seoul, which handles cross-border issues.
It is not clear whether he has been permanently banished or ordered to undergo “re-education” with a view to being brought back into Kim Jong-un’s inner circle. His removal has not been confirmed by North Korea. more
Wiretap Warrant v. Data Warrant = Kinetic v. Static
A New Jersey appeals court has ruled that law enforcement agencies can view private messages and tweets from private accounts on Twitter if they get a warrant...
The case turned on what type of warrant is needed: a communications data warrant or a wiretapping warrant, which is needed for electronic communications in transit and has tougher legal requirements.
Essex County officials argued they were trying to access audio that had already been transmitted as opposed to live transmissions. The court agreed, ruling that law enforcement could use a data warrant.
According to Assistant Essex County Prosecutor Camila Garces, the court's ruling "ensures that the state can access electronic footprints when conducting a criminal investigation."
Defense attorney Lawrence Lustberg said that investigators should only have a right to see private message if they get a wiretap because they happen in real time. more
The case turned on what type of warrant is needed: a communications data warrant or a wiretapping warrant, which is needed for electronic communications in transit and has tougher legal requirements.
Essex County officials argued they were trying to access audio that had already been transmitted as opposed to live transmissions. The court agreed, ruling that law enforcement could use a data warrant.
According to Assistant Essex County Prosecutor Camila Garces, the court's ruling "ensures that the state can access electronic footprints when conducting a criminal investigation."
Defense attorney Lawrence Lustberg said that investigators should only have a right to see private message if they get a wiretap because they happen in real time. more
The Birth of WiFi — Thank you, Australia
Australian scientific invention — The invention of a new wireless data transmission system in the early 1990s led to modern wi-fi, the most popular way to connect computers without wires.
The prototype test-bed invented by researchers at the Commonwealth Scientific and Industrial Research Organisation (CSIRO) Invention leads to modern wi-fi.
CSIRO’s wireless local area network led to modern wi-fi and liberated the internet from dial-up. It marked a change in communication technology that is comparable to the invention of the telegraph in 1831.
The WLAN allowed instant contact with, and access to, information resources – anytime and anywhere in the world. It solved the main problem of indoor wireless networking – radio waves bouncing off walls and furniture, creating a distorted signal – by transmitting several signals over various frequencies simultaneously, merging into a complete signal at the reception point. more
Thank you, Mike! ~Kevin
The prototype test-bed invented by researchers at the Commonwealth Scientific and Industrial Research Organisation (CSIRO) Invention leads to modern wi-fi.
CSIRO’s wireless local area network led to modern wi-fi and liberated the internet from dial-up. It marked a change in communication technology that is comparable to the invention of the telegraph in 1831.
The WLAN allowed instant contact with, and access to, information resources – anytime and anywhere in the world. It solved the main problem of indoor wireless networking – radio waves bouncing off walls and furniture, creating a distorted signal – by transmitting several signals over various frequencies simultaneously, merging into a complete signal at the reception point. more
Thank you, Mike! ~Kevin
Thursday, February 2, 2017
Spy Sites of Washington, DC (book)
SPY SITES OF WASHINGTON, D.C.
By Robert Wallace and H. Keith Melton (with Henry R. Schlesinger)
“Spy Sites” could be considered two books in one. It is a capsule history of spying in and around D.C., with crisply written profiles of the major players.
Even intelligence buffs will encounter a few unfamiliar names. Consider, for instance, Thomas Atwood Digges, a Marylander who worked in London to free American sailors imprisoned by the British. Yet he was so sloppy with his accounts that Benjamin Franklin (for whom he was a sometime courier) denounced him as a rogue and scoundrel. But there is a monument to him on the Digges family estate across the Potomac from Mount Vernon.
“Spy Sites” is also a guide book that should be invaluable for weeks of Sunday afternoon spy walks or drives — from downtown to tranquil suburbs. With maps and photos, it enables the reader to view the obscure dead drops that such rogues as Aldrich Ames, John Walker and Robert Hanssen used to pass secrets to the Soviets — “you are there” experiences of the first order.
There are also some seldom-discussed secrets as to how FBI and other counterintelligence officers “spied on the spies.”
Readers can trust the expertise of the authors. Robert Wallace ran CIA’s Office of Technical Services, which invents spycraft equipment for communications and other covert chores. R. Keith Melton, an Annapolis graduate, owns one of the largest collections of spy artifacts in existence. more
By Robert Wallace and H. Keith Melton (with Henry R. Schlesinger)
“Spy Sites” could be considered two books in one. It is a capsule history of spying in and around D.C., with crisply written profiles of the major players.
Even intelligence buffs will encounter a few unfamiliar names. Consider, for instance, Thomas Atwood Digges, a Marylander who worked in London to free American sailors imprisoned by the British. Yet he was so sloppy with his accounts that Benjamin Franklin (for whom he was a sometime courier) denounced him as a rogue and scoundrel. But there is a monument to him on the Digges family estate across the Potomac from Mount Vernon.
“Spy Sites” is also a guide book that should be invaluable for weeks of Sunday afternoon spy walks or drives — from downtown to tranquil suburbs. With maps and photos, it enables the reader to view the obscure dead drops that such rogues as Aldrich Ames, John Walker and Robert Hanssen used to pass secrets to the Soviets — “you are there” experiences of the first order.
There are also some seldom-discussed secrets as to how FBI and other counterintelligence officers “spied on the spies.”
Readers can trust the expertise of the authors. Robert Wallace ran CIA’s Office of Technical Services, which invents spycraft equipment for communications and other covert chores. R. Keith Melton, an Annapolis graduate, owns one of the largest collections of spy artifacts in existence. more
2017 Information Security and Cryptography Seminar — Fundamentals and Applications
June 12-14, 2017 in Zurich, Switzerland | Lecturers: David Basin and Ueli Maurer
This seminar provides an in-depth coverage of Information Security and Cryptography from both a conceptual and application-oriented viewpoint. At the same time, the mathematical, algorithmic, protocol-specific, and system-oriented aspects are explained in a way understandable to a wide audience. This includes the foundations needed to understand the different approaches, a critical look at the state-of-the-art, and a perspective on future security technologies.
The material is presented at three different levels. At the highest level, the basic concepts are presented in detail, but abstractly (e.g., as black boxes), without mathematics. No background is required to follow at this level. At an intermediate level, the most important concrete schemes, models, algorithms, and protocols are presented as well as their applications. Here some minimal mathematical and systems background is assumed. At the deepest level, which is not required to understand the higher levels, different special topics, requiring some mathematical background, are discussed.
The lectures and all course material are in English. more
This seminar provides an in-depth coverage of Information Security and Cryptography from both a conceptual and application-oriented viewpoint. At the same time, the mathematical, algorithmic, protocol-specific, and system-oriented aspects are explained in a way understandable to a wide audience. This includes the foundations needed to understand the different approaches, a critical look at the state-of-the-art, and a perspective on future security technologies.
The material is presented at three different levels. At the highest level, the basic concepts are presented in detail, but abstractly (e.g., as black boxes), without mathematics. No background is required to follow at this level. At an intermediate level, the most important concrete schemes, models, algorithms, and protocols are presented as well as their applications. Here some minimal mathematical and systems background is assumed. At the deepest level, which is not required to understand the higher levels, different special topics, requiring some mathematical background, are discussed.
The lectures and all course material are in English. more
Make Your Smartphone 007 Smart (book)
via amazon.com
The smartphone in your pocket can easily be turned into a high-tech spy tool and counter-surveillance device to rival anything that Ian Fleming’s Q might have dreamt up.
You can communicate secretly, browse the web anonymously, access the Deep Web and hidden networks, view banned content, download privately and continue using Twitter and Facebook if their services are ever blocked locally.
Conversely, mobile devices are not secure unless you make them so. If somebody wants to know where you are at this precise moment, your smartphone will tell them – even if it is turned off...
Rather like spies in a James Bond movie, mobile users have an array of digital tools to call upon, both to mask their identity and to provide real confidence that their correspondence, data and contacts are secure.
There are smartphone apps that let you see in the dark or measure the height of a building. You can film and record without being rumbled; send emails, PMs and SMS that cannot be intercepted or read. You can even take over and control many public and private security cameras. more
The smartphone in your pocket can easily be turned into a high-tech spy tool and counter-surveillance device to rival anything that Ian Fleming’s Q might have dreamt up.
$2.99 at Amazon |
Conversely, mobile devices are not secure unless you make them so. If somebody wants to know where you are at this precise moment, your smartphone will tell them – even if it is turned off...
Rather like spies in a James Bond movie, mobile users have an array of digital tools to call upon, both to mask their identity and to provide real confidence that their correspondence, data and contacts are secure.
There are smartphone apps that let you see in the dark or measure the height of a building. You can film and record without being rumbled; send emails, PMs and SMS that cannot be intercepted or read. You can even take over and control many public and private security cameras. more
The Obama Cybersecurity Report Card
by Taylor Armerding
President Obama is only a couple of weeks out of office, but his legacy on cybersecurity is already getting reviews – mixed reviews.
According to a number of experts, Obama said a lot of good things, did a lot of good things and devoted considerable energy to making cybersecurity a priority, but ultimately didn't accomplish the goal of making either government or the private sector more secure...
As Kevin Murray, director of Murray Associates, a counterespionage consultancy, put it, “government can make as many policies as it wants, but if it doesn’t solve the problem, what good is it?”
Or, as Paul Rosenzweig, founder of Red Branch Consulting, former Department of Homeland Security (DHS) official under President George W. Bush and frequent contributor to the Lawfare blog, put it, “they had the tools, they just chose not to use them when the chips were down. I don’t know why.”...
Finally, Murray said government needs to focus not just on those who hack or steal data, but also on those who let it happen. He said government won’t get better results until it demands accountability. In virtually every case of a failure, including the OPM breach, those in charge are allowed to resign, which means they keep their pension and all other government benefits.
“There’s a lot of hand wringing, but not enough action,” Murray said. “You have to make the people in charge of holding this information accountable. Somebody should get paid a lot of money, but then told, ‘You are going to be held responsible if it leaks out on your watch.’
“You start doing that, and people will start taking it (information security) seriously,” he said. more
President Obama is only a couple of weeks out of office, but his legacy on cybersecurity is already getting reviews – mixed reviews.
According to a number of experts, Obama said a lot of good things, did a lot of good things and devoted considerable energy to making cybersecurity a priority, but ultimately didn't accomplish the goal of making either government or the private sector more secure...
As Kevin Murray, director of Murray Associates, a counterespionage consultancy, put it, “government can make as many policies as it wants, but if it doesn’t solve the problem, what good is it?”
Or, as Paul Rosenzweig, founder of Red Branch Consulting, former Department of Homeland Security (DHS) official under President George W. Bush and frequent contributor to the Lawfare blog, put it, “they had the tools, they just chose not to use them when the chips were down. I don’t know why.”...
Finally, Murray said government needs to focus not just on those who hack or steal data, but also on those who let it happen. He said government won’t get better results until it demands accountability. In virtually every case of a failure, including the OPM breach, those in charge are allowed to resign, which means they keep their pension and all other government benefits.
“There’s a lot of hand wringing, but not enough action,” Murray said. “You have to make the people in charge of holding this information accountable. Somebody should get paid a lot of money, but then told, ‘You are going to be held responsible if it leaks out on your watch.’
“You start doing that, and people will start taking it (information security) seriously,” he said. more
Labels:
advice,
computer,
cybersecurity,
government,
Hack,
law
Sunday, January 29, 2017
Congressional Republicans' Private Meeting Bugged & Leaked
Congressional Republicans gathered behind closed doors in a Philadelphia hotel Thursday to discuss their plans to tackle national security, health care and more. Now you, too, can listen in.
The recordings below were first provided to The Washington Post and other news outlets through an anonymous email sent Friday evening.
The author of that message asked that the recipients not publish the audio files out of concern that the author could lose his or her job.
On Saturday afternoon, the person wrote again and granted permission to publish the files, explaining that he or she had more closely reviewed the recordings and had concluded that they could not be used to identify him or her.
Washington Post reporters who reviewed the files on Thursday and Friday found revealing details within. more
The recordings below were first provided to The Washington Post and other news outlets through an anonymous email sent Friday evening.
The author of that message asked that the recipients not publish the audio files out of concern that the author could lose his or her job.
On Saturday afternoon, the person wrote again and granted permission to publish the files, explaining that he or she had more closely reviewed the recordings and had concluded that they could not be used to identify him or her.
Washington Post reporters who reviewed the files on Thursday and Friday found revealing details within. more
Saturday, January 28, 2017
More Bad Security News for Android
A team from CSIRO's Data 61, University of NSW (Australia) and UC Berkley in the US found a whole bunch of Android VPN apps contain viruses, spyware and other adware.
Researchers analyzed the apps available for Android to look for nasties like trojans, spyware and adware — giving each an "anti-virus rank (AV)" based on what they found. The lower the rank, the better.
They found of the 283 apps they analyzed, 38 per cent contained malware or malvertising (malicious advertising containing viruses). more
Charger was found embedded in an app called EnergyRescue. The infected app steals contacts and SMS messages from the user’s device and asks for admin permissions. If granted, the ransomware locks the device and displays a message demanding payment. more
A tip of the hat to our Blue Blaze Irregulars who submitted these news items. ~Kevin
Researchers analyzed the apps available for Android to look for nasties like trojans, spyware and adware — giving each an "anti-virus rank (AV)" based on what they found. The lower the rank, the better.
They found of the 283 apps they analyzed, 38 per cent contained malware or malvertising (malicious advertising containing viruses). more
-----
Check Point’s mobile security researchers have discovered a new ransomware in Google Play, dubbed Charger. Charger was found embedded in an app called EnergyRescue. The infected app steals contacts and SMS messages from the user’s device and asks for admin permissions. If granted, the ransomware locks the device and displays a message demanding payment. more
A tip of the hat to our Blue Blaze Irregulars who submitted these news items. ~Kevin
Friday, January 27, 2017
Android Phone's Pattern Lock - Easy to Guess
Android's pattern lock, which lets you unlock your phone by swiping a
specific pattern across the screen, may seem more secure than a
password, but that's not always the case...
A study in 2015 suggested that 44 percent of lock patterns start in the upper left (and 77 percent start in one of the corners), and most moved left to right and up to down, just like we'd read a book. The end result? Our pattern lock patterns are pretty predictable.
A new attack makes use of that predictability: there's now an algorithm that can guess 95% of pattern locks within five attempts. This bit of code analyzes video of people using pattern lock to unlock their phones, taken from about 8 feet away with a smartphone camera (or over 29 feet away using a high-quality SLR or DSLR camera). Even without being able to see the screen, the algorithm can watch your hand movements and predict your pattern. more
A study in 2015 suggested that 44 percent of lock patterns start in the upper left (and 77 percent start in one of the corners), and most moved left to right and up to down, just like we'd read a book. The end result? Our pattern lock patterns are pretty predictable.
A new attack makes use of that predictability: there's now an algorithm that can guess 95% of pattern locks within five attempts. This bit of code analyzes video of people using pattern lock to unlock their phones, taken from about 8 feet away with a smartphone camera (or over 29 feet away using a high-quality SLR or DSLR camera). Even without being able to see the screen, the algorithm can watch your hand movements and predict your pattern. more
Subscribe to:
Posts (Atom)