Tuesday, November 13, 2007

Smells like Eau de Eavesdropping to me...

from the seller's web site...
"This attractive and pleasant potpourri basket actually contains a powerful GSM bugging device. Leave it in your chosen room and dial the number of the GSM bug - the call will connect silently after two rings and you will hear whats going on in the room ...from anywhere in the world!" (more)

SpyCam Story #406 - Kid Rock Rooked?

Kid Rock gave props to the head of his security team, Little Bear, for "finding a hidden camera in the dressing room at the show at the Myth Nightclub" in Minneapolis on Thursday night.

"Little Bear, who runs SpyOps.net, discovered the device before the show and alerted the authorities, who are now investigating," Rock wrote.

TMZ obtained photos of the alleged spycam from Little Bear that appears to indicate it was set up to broadcast on the Internet,

but in a statement from the club released to the Star Tribune, the management explained, "The green-room camera in question is part of the venue's security aspect, available for viewing by head of security only ... Rock's allegation that there was some kind of Internet broadcast in progress is simply not true and without foundation." (more) (more)

The club's cameras appear networked; common practice these days. Having a 'green room' camera - probably common practice as well. Venue owners need to make sure their guests are safe, and have evidence if guests bust up the place.

Was the camera was viewable by unauthorized parties via the Internet? Instant answers (or accusations) are not possible. This will take a little investigation.


Did your security team check the software settings before making these pronouncements to the press, Kid? And, why isn't a confidentiality clause part of your security contract?
Press statements like these make clients look silly. Call us next time ...please.

Spotlight on Security Consultants - Gus Dimitrelos

When retired U.S. Secret Service agent Gus Dimitrelos is called on to speak, the charismatic computer crimes expert tells of catching celebrity stalkers, serial killers and child predators using computer and cell phone data. ...

Among the top threats: theft of intellectual property, such as sealed bids or financial data; theft of personal information like credit card and Social Security numbers; and installation of malicious software including computer viruses that steal, corrupt or destroy data.

Whether a business is dealing with fraud or general theft, Dimitrelos said, "the biggest threat is going to come from the inside."

Finding who is responsible can get expensive. Dimitrelos, for example, charges $250 to $325 an hour. A security evaluation for a company with 700 to 1,000 or so employees can range from roughly $20,000 to $50,000, he said.

The good news is that businesses can take relatively inexpensive steps to guard against fraud. (more)

Arthur C. Clark Predicts - E-Bomb in 2010

"Looking back on the appalling 21st century from our vantage point, 500 years later, it sometimes seems incredible that the human race could have survived such a time of troubles. The moment of greatest danger can now be pinpointed precisely--the year 2010.

Fifty years earlier, the chief threat seemed to be from thermonuclear weapons; however, these could be manufactured only by wealthy nations possessing both vast financial resources and a high level of technology.


Then, suddenly and totally unexpectedly, the situation was transformed by the invention of the Electromagnetic Pulse Bomb. The origin of this terrifying device is unknown: Like most concepts whose time has come, it was probably invented independently in a number of places. However, the first public account appeared in the September 2001 issue of Popular Mechanics under this dramatic headline:

E-BOMB: In the blink of an eye, electromagnetic bombs could throw civilization back 200 years. And terrorists can build them for $400." (more)

Hummm... Time to buy a horses and a farm next to a river. You'll need the land for crops, horses for transportation and cultivation and water for power.

Your future neighbours are spying on you

Ireland - House buyers are employing private investigators and specialist agencies to investigate their future new neighbours to check everything from whether they have criminal records to whether they are fond of throwing late-night parties. (more)

Atomic Bomb Spy - Cover Blown

He had all-American cover: born in Iowa, college in Manhattan, Army buddies with whom he played baseball.

George Koval also had a secret. During World War II, he was a top Soviet spy, code named Delmar and trained by Stalin’s ruthless bureau of military intelligence.

Atomic spies are old stuff. But historians say Dr. Koval, who died in his 90s last year in Moscow and whose name is just coming to light publicly, was probably one of the most important spies of the 20th century.

On Nov. 2, the Kremlin startled Western scholars by announcing that President Vladimir V. Putin had posthumously given the highest Russian award to a Soviet agent who penetrated the Manhattan Project to build the atom bomb.


The announcement hailed Dr. Koval as “the only Soviet intelligence officer” to infiltrate the project’s secret plants, saying his work “helped speed up considerably the time it took for the Soviet Union to develop an atomic bomb of its own.” (more)

Beware - More Mobile Phone Spyware

From the web site...
• "Read everything on their mobile phones."
• "Read their SMS, call logs, emails and track their locations."
• "Remote listening. Listen to the phone's surroundings."
• "BUG Meeting rooms and CHECK babysitters."
• "Protect Your Children"
• "Catch Cheating Spouses"

Your first reaction might be, "Wow, this is amazingly cool!"

But, think...
FlexiSPY and other spyphone software like Neo-Call are Internet-available products which can be installed by anyone. The target could easily be you... especially if your phone was given to you.

Employers can use it too. "How?!?!"

Those wonderful folks at FlexiSPY also make FLEXIAnalyzer Enterprise - "Log EVERYTHING that happens on your employees business phones. ...a unique analytical tool for mobile device deployments that offers intelligent knowledge based analysis, in real-time, of all corporate phone activity." In other words, your boss can, "Monitor SMS, MMS, Email and other phone events..."

But wait! (Here comes the cruelest Ginsu knife cut of all...) "If required FlexiANALYZER comes bundled with FlexiSYNC enabling secure archiving and retrieval of all corporate contact lists..." Keep your little black book off your corporate cell phone.

Monday, November 12, 2007

Foreign Intelligence Services Spy on German Companies

Germany is the land of ideas and innovations. Yet it is not only business competitors who may try to gain secret access to German expertise, it is also foreign intelligence services that are spying on German companies.

Whether it's research results, strategies for development, product information, client data or budget plans -- business secrets of successful companies are increasingly becoming coveted by industrious spies.

Andreas Blume, who is responsible for protecting new scientific findings at the chemicals company Evonik-Degussa, said small and mid-sized companies that are leaders in their field are especially at risk.


...some of the tricks
the intelligence services use: supposed document shredders that are actually equipped with internal shredders and UMTS transmitters, beamers that record presentations and USB sticks with so-called Trojan Horse programs that allow hackers to spy on computers. ... A company in Thailand, for instance, offers monitoring of cell phone conversations. (more)

We hear this complaint from corporations in other countries, as well.

Enterprise Theft by Cell Phone

There are a growing number of instances in which an employee or visitor in a corporate facility, factory, research and development lab or business exposition has photographed sensitive information, prototype products or processes using a company or personal cellular phone and sent the data instantly elsewhere.

Such actions may be illegal; some are legal; and some corporations have instituted policies and prohibitions on cell phones. This article shows how a chief security officer, working with his or her counsel, can conduct an investigation of a suspected phone. ~ Editor (more)

Salient points...
1. Contact your corporate general counsel or in-house counsel.
2. Use the proper software tools. Device Seizure from Paraben, Secure View from Susteen and the Cell-Dek from Logic Cube are commonly used tools that have been accepted by the legal system.
3. Misuse of camera phones is being addressed by enterprises.
4. An enterprise may choose to just dismiss an employee caught spying... More often visitors, contractors and others may face federal charges. Economic Espionage (18 U.S.C. § 1831)
5. There are more instances of corporate or employee cellular phones lost or stolen. Technology exists to trace missing handsets: CellTrace

Sunday, November 11, 2007

Spybusters Tip #105 - Cheap Bug Detector

We hear from one counter-surveillance "expert"... "This little device is pretty good for the price."

"What do it do?" you ask.

Basically, it attempts to detect radio bugs and wireless video transmitters located in your immediate area.
 

Claims from the web site...
Privacy Safe Keychain Wireless Video and Tap RF Detector
.

  • Key chain wireless detector is easy to carry with you so you can feel confident in the office, bedroom or dressing room
  • Innovative high technology device keeps you safe from wireless wiretap and video cameras
  • Detectable radio frequency width 30MHz - 2.4GHz with a responding distance of 10–15’
  • Super-bright blue LED light for emergency or illumination use
  • 0.4"Hx2.3"Wx1.2"D
As with most bug detection efforts, you will get what you pay for...

Tune Into Other Peoples' Surveillance Cameras

"SurveillanceSaver is an OS X screensaver that shows live images of over 600 network surveillance cameras worldwide - a haunting live soap opera." (more)

Be careful. This is alpha version software. Currently for Mac OS X. A Windows version is being developed.

Picking a Pickpocket's Pocket?

Renault accused of spying
Barely 24 hours after FIA experts swooped on the McLaren factory for a detailed technical check on the team's 2008 car, the rival Renault team found themselves propelled into the centre of controversy when they were summoned to appear before a hearing of the FIA World Motor Sport Council to answer charges of spying. ...

These accusations come two months after McLaren were fined $100m and lost all their 2007 constructors' world championship points after it was established that they had benefited from illicitly obtained technical data from Ferrari. (more)

(update - 11/10/07)
The Renault formula one team yesterday rejected allegations of espionage after being summoned before the FIA's world motor sport council accused of illegally using McLaren data in the design of this year's car. The French team confirmed that a former McLaren engineer, who joined them in September last year, was suspended when it became clear he had brought confidential information with him to his new job. Renault named the employee as Phil Mackereth and said they had been made aware of the problem on September 6. "None of this information was used to influence design decisions relating to the Renault car," the statement said. (more)

Former DuPont Scientist Sentenced For Trade Secret Theft

Shortly after he began working for a rival company, Gary Min uploaded some 180 DuPont documents to his new corporate laptop.

A former DuPont scientist who admitted stealing company secrets was sentenced to serve 18 months in prison, fined $30,000, and ordered to pay almost $14,500 in restitution to DuPont.
Gary Min, 44, was sentenced in Wilmington, Del., for stealing DuPont trade secrets, an act he admitted to in November 2006. The maximum sentence for his offense is 10 years in prison and a $250,000 fine.

Prior to sentencing, Min reportedly asked for leniency because incarceration would be a hardship on his family and because his actions did not result in significant financial loss to DuPont. The estimated value of the documents exceeded $400 million, according to the government. (more)

SpyToy Alert - Voice Recorders hidden in pens

Key Specifications:
• Hidden LED indicators in pen
• USB flash drive (capacity: 128MB, 256MB, 512MB, 1GB)
• MP3 / WMA player
• Digital voice recorder / player
Built-in rechargeable battery
• Play MP3 for 5+ hours
• Record voice for over 6 hours
• Standby time over 20 days
• Color: black or silver
• Size: 150 x 16mm
• Weight: 60g
• and, of course, the pen writes! (more) (more)

Be alert to the possibility of someone covertly recording you.
• Does the pen look funny?
• Watch how they handle and position their pen.
• Do they leave the pen behind when they leave the room?
• Ask to use their pen. What is its center of gravity?
• Watch their reaction.

One on-line seller actively promotes recording meetings.
1. "Bring your digital voice recorder pen to your next meeting."
2. "Start recording your conversation."
3. "Plug your pen recorder into the USB on any computer to listen and save audio recordings." (more)

Equitable Life boss finds bugging device in his flat

UK - The boss of one of the UK's largest financial institutions is at the centre of a security scare after a bugging device was found in his home.

Charles Thomson, chief executive of Equitable Life, called in police after discovering the listening equipment concealed in his luxury apartment in London.

Detectives are investigating how the device came to be in the Barbican flat, which Mr Thomson, 59, uses as a base during the working week.

A security sweep has also been carried out at his £1million family home in Ayr, in Scotland, which he returns to most weekends.

Yesterday, a source said: "The discovery has caused a lot of concern and distress."

Strathclyde Police say they have been handed a tape which is understood to contain a private conversation between Mr Thomson and his partner of five years, Verity Coutts. (more)