Saturday, December 8, 2007

Program Discovers At-Risk Wireless Keyboards

Rapid7 announced today NeXpose will include a check for a zero-day vulnerability found in many wireless keyboards. The impact of this vulnerability is that an attacker with a directional antenna and a laptop can eavesdrop on keyboard communications, capturing every keystroke from a distance of over 30 feet away. (more)

SpyCam Story #413 - Emergency Management

TN - The assistant director for Rutherford County Emergency Management has been fired after a camera was found in an EMA restroom.

Reed is accused of hiding a camera in a restroom (within a stack of boxes) at the EMA office. The Tennessee Bureau of Investigation is investigating the allegation.

A female employee found the camera. ... It is unclear how long the video camera was in the bathroom and if tapes were made. (more)

"Did too." "Did not!" "Did too!!" "Did NOT!!!" "Did."

China on Wednesday rejected as "baseless" allegations that it was carrying out state-sponsored espionage against British businesses. ...China has rejected similar allegations from other Western nations this year. It has been accused of cyber attacks on U.S. and German government computers and a British security source said there had been frequent Chinese attempts to penetrate British government systems. (more)

Next time, Nancy, ask someone who knows...

DEAR ABBY: Is it all right for a family member to eavesdrop on a conversation on the extension line?

The other day, my husband and I picked up the phone at the same time. It was my mother calling to chat and to ask a question. Although the call was clearly for me, my husband remained on the line because, he said, he had a question for her when I was done with the conversation.


I contend that this was rude, as I didn't know he hadn't hung up the other phone. He contends that he had a right to listen because it is his house, and he can listen in if he wants.

Although nothing of a personal nature was discussed, I still think he should have given me my privacy and asked me to let him know when Mom and I were done talking so he could ask his question. This has caused a major rift in our family. Please respond.
-Nancy
Belmont, Calif.


DEAR NANCY: When a spouse starts using the old "I can do it if I want because it's my house" line, it's usually because he/she knows he/she is wrong. I don't know whether your husband is a bully or simply has no life of his own, but eavesdropping is a very unpleasant trait. And in the interest of family harmony, he should cut it out. (more)

He should cut it out?!?! Abby, what were you thinking? Non-consensual eavesdropping is a federal and state crime! Criminal and civil penalties apply, and the days of spousal immunity for eavesdropping are pretty much history. The "my house, my phone" party line does not mean "my conversation." It was not his conversation. There was no consent. What if he punched her? Would you buy his "my wife, my chattel" baloney?

Get up-to-speed on computer espionage. Read...

Secrets of Computer Espionage: Tactics and Countermeasures

"Is someone
spying on you?

It could be your boss, your competition, or a private investigator, but it could just as easily be a foreign intelligence agent - or the whiz kid down the street. More and more people today want to know what's on your computer, your PDA, your cell phone, or your wireless network.

Joel McNamara takes you inside the mind of the computer espionage artist... This is the book that teaches you to think like a spy, because that's the only way to outwit one."

Contents at a Glance
Acknowledgments.
Introduction.
Chapter 1 Spies.
Chapter 2 Spying and the Law.
Chapter 3 Black Bag Jobs.
Chapter 4 Breaching the System.
Chapter 5 Searching for Evidence.
Chapter 6 Unprotecting Data.
Chapter 7 Copying Data.
Chapter 8 Snooping with Keyloggers.
Chapter 9 Spying with Trojan Horses.
Chapter 10 Network Eavesdropping.
Chapter 11 802.11b Wireless Network Eavesdropping.
Chapter 12 Spying on Electronic Devices.
Chapter 13 Advanced Computer Espionage.
Appendix A: What's on the Web Site.
Index.

SpyCam Story #412 - Wireless Parasite

The latest prototype product from NEC Japan has to be one of the most novel uses of alternative energy we've ever seen - it's a wireless security camera that draws its power directly from fluorescent light tubes.

Key to the development is ... the magnetic field created by the AC source in the light. A field frequency of 45-100kHz can be used by the ring to generate 120mW of electricity, which is enough to power the camera.

From that point on the otherwise-standard camera ... beaming its images to a PC using an ordinary Wi-Fi chip that also draws power from the light.

NEC suggests that its camera could be installed in office light fittings to help companies keep an eye on their staff at work... (more)

The futuristic ideas of Nikola Tesla are now taking hold. This product is a good example. Other examples include the super-cool Tesla Roadster and the Norelco Toothbrush.

Private eyes indicted in ID-theft case

State and federal agents have broken up a nationwide "pretext" identity-theft scheme involving private detectives who obtained personal information about their targets — from financial and medical records to tax returns — through deceit and lies, according to a federal grand-jury indictment unsealed Thursday. (more)

Wednesday, December 5, 2007

SpyCam Story #411 - Teen Pleads Guilty

IL - A Cary teen accused of helping a friend videotape his sexual encounter with an unknowing high school classmate pleaded guilty to a reduced charge Tuesday in a plea bargain that allows him to escape a possible felony conviction.

Stefen W. Mueller, 18, admitted guilt to a misdemeanor attempted eavesdropping as part of a deal with McHenry County prosecutors made formal in court Tuesday morning. (more)

Tuesday, December 4, 2007

Wireless Keyboard Interception - Encryption Cracked

Security researchers have cracked the rudimentary encryption used in a range of popular wireless keyboards.

Bluetooth is increasingly becoming the de-facto standard for wireless communication in peripheral devices and is reckoned to be secure. But some manufacturers such as Logitech and Microsoft rely on 27 MHz radio technology which, it transpires, is anything but secure.

Using nothing more than a simple radio receiver, a soundcard and suitable software, Swiss
security firm Dreamlab Technologies managed to capture and decode the radio communications between a keyboard and a PC.

The attack opens the way up to all sorts of mischief
including keystroke logging to capture login credentials to online banking sites or email accounts. (more)

...and skipped Asia due to redundancy issues.

An amusement park with a spy theme is planned as part of a major entertainment complex in Spain...

The park, named Spyland, will be part of a massive leisure complex called Gran Scala that is being planned for the Zaragoza province of Spain. The entertainment district is expected to include 32 casinos, four theme parks, mega-hotels, shopping and other attractions.
Construction on Spyland is scheduled to start in late 2008, with a projected opening date of 2010...

Spyland will be a family attraction with rides and interactive activities based on the history of secret agents around the world. Visitors will be able to play the role of spy, undertake missions, collect clues and infiltrate fictitious borders as they move through six zones in the park, including a small water park called Aquantica. Guests will also be able to test technologies used in spying. Stunt shows will be based on the escapades of real spies.

Developers originally tried but failed to get permission to build Spyland in Dubai or France... (more)

Monday, December 3, 2007

"Listen through walls, up to 1/2 mile away!"

• Pull conversations out of walls or floors.
• Amplify them
50,000 times.
• Broadcast them
up to 1/2 mile away.

This odd-ball little eavesdropping bug is creative mix of technologies. No need to enter someone's office or home. Just attach this thing to the floor above, ceiling below or the outside wall. Then, head to comfortable spot within a 1/2 mile range. No nearby comfortable spot? Put the receiver and a recorder in a car, and park it nearby. Return daily to pick-up your recordings.
(more)

Grab a map. Draw a 1/2 mile circle around your own home or office. How many good listening posts do you see? Maybe hundreds in a suburban environment. Definitely hundreds-of-thousands in a city.

When was the last time you had a professional debugging inspection?

Need a quick example... Go to Google Maps; search for Dearing, KS. The distance between 2200 Road and 2000 Road is exactly one mile. The listening post could be anywhere in this town!

Could we find this bug?
Of course.

When Warrantless Wiretaps Go Bad

Mike Lane on Wiretapping. (cartoon)

MI5 warns over China spy threat

Leading British firms and government agencies have been warned Chinese state organisations may be spying on them.

UK intelligence network MI5 has contacted 300 chief executives and security experts at banks and financial institutions to raise the concerns. (more)

Sunday, December 2, 2007

"I'm dreaming of a Spy Christmas..."

Consumer Reports magazine had 40 children check out the "fun factor” in 24 toys, priced less than $10 to $200, to determine the hot holiday sellers this year. The top four toys overall ranged from a racing timer to a magnifying handheld "bionic eye” to a remote-controlled vehicle equipped with a "spycam.” The children in the test ranged in ages from 6 through 12. (more)
FutureWatch: The next generation of spies is in the pipeline!

From the Security Scrapbook Archives (12/2003)

Every Rock & Roll hit from the
50's, 60's, 70's, 80's and 90's+
"Hey, do I take care of my friends or what?"
• Just in time for your holiday parties!
FREE!!!
• Play 'Name That Tune' (really fast).
Side OneSide Two