Saturday, January 31, 2009

Q. Would you hire a long-distance baby sitter?

A. Depends on how old the baby is.

From those wonderful folks in Sweden who brought us SpyOn Voice... Now, a morphed and more palatable (ta-daaa) SpyOn Baby.

How could you resist a cute little program that calls itself, "A modern baby alarm that allows you to watch over your baby at home and over the internet." (for less than $10.00)

Besides, "If you are looking for specialists in VOIP (Voice over IP) then you have come to the right place. We are developing a series of applications based upon VOIP technology. If you can not find exactly what you are looking for maybe we can develop it for you."

And, oh, by the way, the company name is Spying Machines.

Why do we mention it?

So you know what your up against.

2009 State and Federal Privacy Laws Supplement

The 2009 Supplement to Privacy Journal's Compilation of State and Federal Privacy Laws (0-930072-17-0, 2002) has just been published. The price is $25, plus $4 for shipping. Need the original 2002 book as well? The price for the 2002 book and the current Supplement together is $35 plus $4 for shipping.

Contact:
Lee Shoreham, Assistant to the Publisher
PRIVACY JOURNAL
PO Box 28577
Providence RI 02908
Phone: 401/274-7861
Fax: 401/274-4747
orders@privacyjournal.net

Employer Spying Increases

On Wednesday, the German rail spying scandal went from run-of-the-mill to flabbergasting: 173,000 -- and not 1,000 -- employees were spied on.

Politicians and the public are outraged, and commentators predict that the Deutsche Bahn CEO will take the fall. (more)

Employee Spying Increases

High anxiety about job-cuts in the workplace is fueling inter-office rumors, gossiping and eavesdropping, according to a recent survey by the Society for Human Resource Management.

Of 494 human-resource professionals surveyed, nearly 1/4 reported that they had encountered significantly more cases of eavesdropping in the workplace over the past year...


More than 1/5 of survey respondents reported that workers at their companies had recently been confronted or disciplined by an authority figure for spreading rumors or eavesdropping
. (
more)

Litigant Becomes Miki Mole

The Opposition Pays ...in more ways than one.
Microsoft is suing a former employee for applying for his job under false pretenses and using his role at the company to gain access to confidential data related to patent litigation he is now waging
, reports the Seattle Post-Intelligencer.

Miki Mullor was hired by Microsoft in November 2005 after stating in his job application that he was a former employee at Ancora Technologies, a local software development company that he said had gone out of business.

However, Microsoft claims Ancora was still a viable company and that Mullor was still its chief executive — and that while he was at Microsoft, he downloaded confidential documents to his company-issued laptop. (more)

Miki talks... "When I joined Microsoft, I notified them in writing of Ancora and my patent in both my resume and in my employment agreement. In its complaint against me, Microsoft withheld the portions of these key documents that show this." (more)

"The patent case is scheduled for trial in a Los Angeles federal court on Jan. 26, 2010."
This is getting interesting, and EXPENSIVE. Let's meet back here in a year and see what happens.

Spybusters Tip # 493
Look for espionage problems pro-actively. Catch them early.
Result... Low cost. Higher success rate.
Need help? Call us.

Japan's New Wiretap Law Take Root, Bears Fruit

Japan - The Communication Interception Law, which authorizes wiretapping as part of investigations, took effect in 2000. The Metropolitan Police Department carried out Japan's first wiretap authorized under the law in 2002.

Police across Japan conducted authorized wiretaps in a record 11 cases in 2008, up four from the previous year, that lead to the arrest of 34 people, Justice Minister Eisuke Mori told a Cabinet meeting Friday.

The number of arrests was the same as 2007... "Know-how on authorized wiretapping seems to be steadily taking hold," the Justice Ministry said. (more)

Friday, January 30, 2009

Shades... of Joe Engressia

A legally blind Massachusetts phone hacker admitted this week to federal computer intrusion and witness intimidation charges that could put him away for as long as 13 years.

Matthew Weigman, 18, pleaded guilty to two felonies before U.S. Magistrate Judge Paul D. Stickney in Dallas on Tuesday. Known in the telephone party-line scene as "Li'l Hacker," Weigman is widely considered one of the best phone hackers alive.

In his plea deal with prosecutors, Weigman, who was born blind, admitted to a long criminal resume (.pdf). Among other things, he confessed to conspiring with other telephone hooligans who made hundreds of false calls to police that sent armed SWAT teams bursting into the homes of their party-line enemies.

In a new revelation, Weigman also admitted eavesdropping on customer service calls to Sprint, by dialing into a phone line used by Sprint supervisors to monitor their employees. Weigman parked on the spy line to overhear customers giving out their credit card numbers, which he memorized and passed to accomplices. Weigman and his friends used the numbers to purchase computers and other electronics. (more) (Joe Engressia)

Heavy Duty Recording SpyCam, Goes Lighter

Lighter Camera
from the seller's web site...
Date time stamping with 8Gb large memory
Lighter Camera with built in Micro DVR for your home or office surveillance when you are not there. it records everything what you missed while you are away.

Built in Digital Audio Video recorder will give you all the evidence you need to prove in the court in case some one came to your home or office for bad purpose.

You don't have to worry about the battery as it can work up to 6 long hours in a single charge. Micro SD card can record up to 8 hours of Very Fine audio video on 8GB Micro SD Card. (more)
Why do we mention it?
So you know what you are up against.

Thumb Stick in USB = VD for Unies

VD (Viral Data)
Japan - Virus infection of university campus computers via USB thumb drives has become common, according to the results of Yomiuri Shimbun survey that found more than 500 such incidents were reported in 13 universities.
(more)

Wednesday, January 28, 2009

Happy Data Privacy Day... and good luck

January 28, 2009 - the United States, Canada, and 27 European countries celebrate Data Privacy Day for the second time.

Designed to raise awareness and generate discussion about data privacy practices and rights, Data Privacy Day activities in the United States have included privacy professionals, corporations, government officials, and representatives, academics, and students.

One of the primary goals of Data Privacy Day is to promote privacy awareness and education among teens across the United States. Data Privacy Day also serves the important purpose of furthering international collaboration and cooperation around privacy issues. (more)

This week's prelude to Data Privacy Day...
Heartland May Be the Biggest Data Breach Ever
Britain's biggest cyber theft case - Monster.co.uk

Top Five Teen Privacy Tips for the Internet

Privacy is the right to decide who has access to your personal information and how that information should be used.

Think carefully about the information you share online and understand how social networking sites work to use them responsibly and safely.

1. Know your potential audience.
Be aware that anyone, including site operators, advertisers, colleges, potential employers, friends and parents, as well as dangerous people or sexual predators may access, use, and forward the information you share online.

2. Use privacy settings to control who has access to information you put online, including your profile page, your photos, your “wall,” and your online journals. Do not share your phone numbers, home address, date of birth, school or team name, travel plans, social security number or other national ID numbers, family financial information, bank or credit card numbers. Don’t share your passwords with anyone.

3. Don’t accept “friends” you do not know in the real world.
Never agree to meet anyone in person you have only “met” online.

4. Think before you post.
If you would not want a college or a prospective employer to see it, or if you wouldn’t share it with your parents, don’t post it. Once you put something online, it is difficult if not impossible to take it back. Respect the privacy of others. Don’t identify others on your page in a way they
would not identify themselves or post photos they would not post. Protect yourself. Ask friends to take down content about you that you would not post yourself, and un-tag photos that you may find embarrassing in the future.

5. You are your own best protector online.
Online conduct has consequences. Make smart choices.
(print version courtesy of Intel)

SpyCam Story #514 - The Electrician Guy

David Mitchell Clark, an electrician from Rancho Cucamonga has pleaded guilty to burglary for installing spy cameras in the bathrooms of homes.

Prosecutor Jason Anderson says investigators found 18 DVDs in Clark's house with hours of surveillance of women and families in various states of undress. Sheriff's investigators eventually tied him to nine installed cameras.

Investigators say the 35-year-old Clark told them last year he had installed one hidden camera in a Rancho Cucamonga home "because the wife was hot." (more) (more)

Skype vs. Eavesdropping

Mike Chapple handles a Skype question...
Q: Can an attacker gain important and private information from my phone through a peer-to-peer network?


A: Peer-to-peer telephone services such as Skype offer a way to save significant money on telephone services. By leveraging peer-to-peer networks to route calls around the world, every call becomes a local one. Peer-to-peer services allow telephone calls to be routed through the privately owned equipment of one or more unknown individuals. This raises a number of confidentiality, integrity and availability concerns, and little information is available about what, if any, security controls these services have put in place to protect your telephone calls.

While this is an interesting technology, I would not recommend that it be used for any private communications. (more)

Additional considerations...
Skype says their communications is encrypted.
Some say Skype encryption can be bypassed.

64% of women under 35 spy on partners

More than quarter of women use the internet to secretly spy on their partners, a survey has revealed... The research, by Virgin Media, showed that an astonishing 88 per cent of the population use the internet every day and that women are more that twice as likely to spy on their partners than men are... The under 35s are most paranoid, with 64 per cent of all interviewed admitting they have snooped at a partner's online communication or internet history. (more)

X-Ray Vision - Coming to a Wall Near You

prism 200 is a handheld through-wall radar, which has been designed to be used by police, special forces or the emergency services. It provides quick and covert intelligence on the movement and location of people in a room or building - without the need for invasive sensors.

prism 200 has been designed for situations where a high degree of insight is essential for success.
This compact, portable and durable product uses advanced signal processing to highlight moving people and objects in cluttered environments, through doors or brick, block and concrete walls. (more & videos) (brochure)