Tuesday, April 22, 2008

Putting the squeeze on Blackberry to get the juice

Talks between Indian officials and Canada's Research In Motion (RIM, the BlackBerry Bunch) would seem not to have gone very smoothly...

The backstory here is that the top brass at India's burgeoning and powerful state security services are concerned that Blackberry's advanced communications technology cannot be breached by their operatives and thus the "authorities" are currently unable to eavesdrop Blackberry users.

They have asked RIM to provide them with the capability to conduct covert surveillance on Blackberry users by requiring the company to install local servers and provide secret back door access to services, but the Canadian vendor has so far refused to comply. (more)

Get the PR team some O2, stat!

UK - O2’s PR team mistakenly connected a journalist of tech website The Register to a call earlier this month, allowing him to eavesdrop on their conversation about his news enquiry.

Turns out, O2 (a UK cellular service provider) reckons The Register’s readers are “techie nerds” and “Muppets” for wanting to move to 3. O2 duly apologised on the website, and said to Mobile News: “Hey, we’re techie nerds ourselves.” (more)

Friday, April 18, 2008

"...This DVD will self-destruct in..."

Germany - The branded 'Einmal' (Deutsch for 'once') discs employ a chemical coating that starts breaking the disc down once the vacuum seal is breached. On average, users get 48 hours of use from a €3.99 ($6.44) disc. Once the disc has run its course, it'll show up as non-readable when popped into a player (no explosion). (more)
Proposition Impossible, unless a good security application comes along.

FutureWatch - Cell Phone Crackdowns

Austria - Taking a cue from France's national railway, which offers phone-free «zen zones» on high-speed trains, Austria's second-largest city this week began ordering public transit commuters to keep their phones on silent mode.

The crackdown in the southern city of Graz has triggered a loud debate between advocates of free speech and people who say they're simply fed up with having to listen to annoying ring tones and intrusive cell phone chatter while riding a public bus or tram. (more) (etiquette) (how other are dispensing justice) (Divine justice)

Extra Credit...
''No matter the excitement in the industry he had created, Bell forever refused to have a telephone in his study. He resented its persistent jangle.'' - from ''Once Upon a Telephone: An Illustrated Social History'' (Harcourt Brace & Company, 1994) by Ellen Stern and Emily Gwathmey

FutureWatch - Eavesdropping on GSM Cell Phones

A web service that will make it easy and inexpensive to crack the GSM A5/1 encryption protocol, quickly enough for a call that is still in progress, is slated to launch at the end of April. Living right at the intersection of open hardware, open source software, software as a service, and cryptography, the service will reduce the cost and effort of cracking GSM call encryption by at least an order of magnitude.

The service is being developed by members of the GSM Software Project and demonstrates just how much things have changed in the world since the GSM system was designed. Various approaches to cracking both A5/1 (the European standard) and A5/2 (the weaker US standard) have been available for some time but this one is unique in that it should be available to researchers and hackers at the end of April in hosted api form instead of pdf.

Back in 1997, this overview of the GSM system declared that "Enciphering is an option for the fairly paranoid, since the signal is already coded, interleaved, and transmitted in a TDMA manner, thus providing protection from all but the most persistent and dedicated eavesdroppers." After all, such a radio encoding scheme made the signals invisible to typical radio band scanners.

Today, however, the availability of the Universal Software Radio Peripheral (USRP), an open hardware software defined radio that sells for about $700, combined with work being done at GNU Radio project to codify the GSM waveform (also targeted for the end of this month), makes this once reasonable point of view seem quaint. Good encryption is now a must and it appears that A5 no longer qualifies. (more)

Wannabea Spy?

The Shin Bet website now features recruitment blogs by four high-tech spies.

Israel’s domestic intelligence agency shed some of its shadowy mystique three years ago when it went online to draw new applicants. Recently, the site launched a new page, on which four Shin Bet computing experts discuss what they like about their jobs.

The Hebrew-language texts are sparing on details, with only silhouette portraits of the authors, whose names are withheld. Security sources said the Shin Bet hopes the blogs will help win over recruits from the private high-tech industry. (
more) (What does a Spy look like?)

Thursday, April 17, 2008

CNN Report - Chinese spies in the US

Night Flight

Two men attempting to board a plane to China with nearly a dozen sensitive infrared cameras in their luggage were arrested... Yong Guo Zhi, a Chinese national, and Tah Wei Chao, a naturalized U.S. citizen, were arrested for investigation of trying to take thermal imaging cameras with potential military use to China without the proper export licenses... Ten of the cameras, which measure about 2 inches square and cost about $5,000 each, were found in the men's checked luggage... (more) (related video) (the other Night Flight)

Corporate Espionage - Contractor Pleads Guilty

A U.S. Department of Defense (DOD) contractor from Baltimore pleaded guilty today to conspiring to steal competitive information concerning contracts to supply fuel to DOD aircraft at locations worldwide, the Department of Justice announced.

Matthew W. Bittenbender has entered into a plea agreement, filed in U.S. District Court in Baltimore, where he was originally charged on January 7, 2008. According to the terms of the plea agreement, which is subject to court approval, Bittenbender has agreed to cooperate in the government's investigation...

...Bittenbender conspired to steal trade secrets from his employer Avcard, a division of Kropp Holdings LLC, and sell that information to his competitors, FERAS, and Aerocontrol. In return, Bittenbender received cash and a percentage of the profit earned on the resulting fuel supply contracts. According to the plea agreement, Cartwright, Wilkinson, FERAS and Aerocontrol, in turn, used that information to underbid Avcard at every location where the companies were bidding against each other. Avcard ultimately lost each of the contested bids. (more)

Wednesday, April 16, 2008

"...and she went to the hospital to have it removed! Blahaaaaaa..."

Australia - Attorney-General Robert McClelland says the proposal to let some employers access workers' emails without consent is only being considered as a way to stop cyber terrorist attacks.

He says it would not be targeted at personal communications.

"What you would be looking and permitting access to is information that would reveal an attempted infiltration," he said.

But deputy Opposition leader Julie Bishop says...
"Employers should not be burdened with the responsibility of intercepting emails involving staff suspected of behaviour that threatens Australia's national security."

"This places an unfair surveillance responsibility upon employers and effectively requires them to undertake what is a potential criminal investigation." (more)

Seriously bad idea...
- Pay IT guy to do a government intelligence agents' work?
- Pay twice!?!? Salary for IT guy and (via taxes)
government intelligence agents'.
- Conflict of interest? Employees spying on friends and colleagues?
- Entrust national security to an army of untrained private employees...
- ...whose work product might equal less than educated guesswork?
- ...who may be tempted to use the snoop power for personal gain?
- Not to mention: loss of regular business productivity, opening new avenues of corporate espionage, data vulnerabilities, etc.
Outsourcing your job responsibilities should not be an option; especially when you have been entrusted with national security.

Tuesday, April 15, 2008

Data Land Mines

1. A slip of the finger reveals the company secret.
- Turn off that auto-fill feature.
2. People give away passwords and other secrets without thinking.
- Engage brain. Shut mouth.
3. A trusted partner ends up not being so trustworthy with your data.
- Share sparingly.
4. Web-based apps can be portals to leaks and thieves.
- VPN it instead.
5. Hoping the worse doesn’t happen only makes it worse.
- Plan for disasters.
6. Avoiding or diluting response leadership makes breaches worse.
- Designate a buck-stopper.
7. Handling breach details sloppily tips off the perp.
- Practice 'need-to-know'.
8. Trusting "silver bullet" technology hides real threats.
- There ain't no Lone Ranger.
9. Spending unthinkingly wastes resources you might need for important threats.
- Gauge threats.
10. Don't save the wrong data.
- Only store what you need.
(more)

"Afghanistan banana-stand!"

Police in Italy have issued footage of a man who is suspected of hypnotising supermarket checkout staff to hand over money from their cash registers.

In every case, the last thing staff reportedly remember is the thief leaning over and saying: "Look into my eyes", before finding the till empty. (more) (video)
('SNAP' of fingers)
Wake up!

Sunday, April 13, 2008

...and, 85% declined to answer.

"Me, My Spouse and the Internet"
Oxford Internet Institute, University of Oxford,
Survey Results...

• 20% of married Internet users admitted to reading their partner’s emails and text messages; and
• 13% to having checked their partner’s browser history.
More than 6,000 married people were invited to take part in the study. The final sample involved 929 couples, with both partners completing a questionnaire. (more) (Project website.)

Surveillance Desensitization Continues

Hal Niedzviecki writes...
I ask (Ursula) Lebana how things have changed since she opened Canada’s first spy store back in 1991.

“People who came into the store at that time were quite shocked,” she tells me. “They never realized cameras were that small. They said, ‘Oh my God, that’s scary. And isn’t it terrible to monitor the nanny? Where’s the trust?’”

Sixteen years later, business is booming. “Now people say, ‘Oh, I want a hidden camera,’” says Lebana, who has since opened SpyTech locations in Ottawa and London, Ontario. “They are more willing to use them now. They’re more familiar with it. I’m even getting repeat customers... (
more)

"Youz gotta problem with dat?!?!"

from The Bay City Times Opinion page...
MI - When The Times looked into the money that road commissioners lavished on themselves, we found a board besotted with inflated retirement benefits and fancy junkets.

We also found that one commissioner, now retired, had used a Road Commission credit card to give himself quick loans at casinos. In another instance, the commission's former finance director was caught using a tape recorder to eavesdrop on employees.

In the lives of private citizens, both incidents might have resulted in felony charges. But in the buddy-buddy world of government, no charges stuck. (more)