Friday, February 20, 2009

Skype in the Crosshairs

Suspicious phone conversations on Skype could be targeted for tapping as part of a pan-European crackdown on what law authorities believe is a massive technical loophole in current wiretapping laws, allowing criminals to communicate without fear of being overheard by the police.

The European investigation could also help U.S. law enforcement authorities gain access to Internet calls. The National Security Agency (NSA) is understood to believe that suspected terrorists use Skype to circumvent detection.

While the police can get a court order to tap a suspect's land line and mobile phone, it is currently impossible to get a similar order for Internet calls on both sides of the Atlantic. (more)

MP3 Player Doubles As SpyCam

from the seller's web site...
"The common Mini MP3 Player, which comes with other useful and powerful features. This Player is included a camera and a mic, which can be used as a video camera recorder, voice recorder and still image camera." $46. (
more)

Thursday, February 19, 2009

Business Espionage - Secret Windows OS Stolen

Australia - An unnamed Telstra executive has sparked a major security scare at Microsoft after a phone loaded with a secret upcoming version of the Windows Mobile operating system was stolen out of his pocket in Spain.

The phone belonged to Telstra chief executive Sol Trujillo, who was testing the device before its release at the end of the year, News Ltd reported. But a spokesman for the telco would not confirm this.

The spokesman said the phone - developed by HTC and loaded with Microsoft's top-secret Windows Mobile 6.5 operating system - was in the possession of another unnamed Telstra executive at the time of the theft.


The incident could have serious implications for Microsoft as Windows Mobile 6.5 has hardly been touched by anyone outside the company and high-level telco executives.


Leaks regarding the features and early bugs in the software could mar its launch, which would be damaging as Microsoft is pinning its hopes on Windows Mobile 6.5 to give it an edge over new competitors such as the iPhone and Google's Android operating system. (
more)

Job opportunity...
Telstra is the Australian telephone company. They are probably looking for a new assistant to the president.

Security opportunity...
This loss might have been preventable. Hire a good counterespionage consultant to help protect your company's intellectual property and detect electronic surveillance (eavesdropping, wiretapping and data theft).
Contact me for recommendations, worldwide. ~Kevin

This unfortunate high-value loss was forwarded to us by Jayde Consulting in Australia.
"Jayde Consulting provides professional and discrete services to protect sensitive, confidential and commercially valuable information from electronic eavesdropping, surveillance and espionage."

Credit card numbers stolen... blah, blah, blah.

We hear it every day.
Here we go again...


Hackers broke into a computer at Wyndham Hotels and Resorts last July and stole tens of thousands of customer credit card numbers, the hotel chain warns.


The break-in occurred at a property belonging to a Wyndham franchisee, but that computer was linked to other company systems. "That intrusion enabled a hacker to use the company server to search for customer information located at other franchised and managed property sites," the company said in a statement disclosing the breach.

The data was then uploaded to a Web site during July and August of 2008, Wyndham said. The company estimates that 41 Wyndham hotels and resorts were affected by the breach before it was discovered by the company's information security team in mid-September. (more)

Is data theft preventable?
Lots of people think so.
Explore the solutions being offered...
Voltage Security
PGP Corporation
Protegrity
TriGeo

Make your phone lie.

People are making Caller ID lie for them... "Spoofcard allows me to make my calls truly private. I can display any number on the Caller ID, record my calls and change my voice." Try it yourself. Free. (more)

Make your phone confess.

Hate blocked Caller ID calls?
Force a confession out of them.

Here's how...

"Trapcall will unblock and reveal the actual caller ID (and name) when a call has been blocked. No software or download needed! ...Record all of your incoming calls! ...Read your voicemail messages via SMS while in a meeting, class, movie or other busy area! ...Block unwanted callers! ...Billing name and address!"

Try it out. Free. (more)

FutureWatch - The 10 Trillion Bit, 2-Bit Drive

Keeping track of your data will become soon more difficult...
Ting Xu, a professor at the University of California, Berkeley and Thomas Russell, a professor at the University of Massachusetts at Amherst, have created a technique that could, theoretically, pack a disk the size of a quarter with 10.5 terabits (more than 10 trillion bits) of data, the equivalent of 250 DVDs. (more)

Until then, we can still cram a lot of data into a Murray Associates Spy Coin. They are going fast. Find out how you can get one. (more)

Wednesday, February 18, 2009

"Holy Firewall, Splatman!"

New data shows businesses may be clueless about proxy abuse in their organizations...

Schools long have struggled with savvy students who run anonymous Web proxy tools to bypass Web filters and secretly access banned Websites and content. But the use of these potentially dangerous tools within the enterprise appears to be more widespread than was once thought.

A new study released today indicates that businesses may be clueless about the breadth of the problem: While 15 percent of IT managers report that Web filter bypass tools are in use in their organizations, it turns out that these tools are actually in use in three out of four organizations, according to FaceTime Communications, which polled both IT managers and its own customers on the topic.

"In some cases, the perception is not reality," says Frank Cabri, vice president of marketing and product management for FaceTime, whose customers provided the actual usage data in the study. "This doesn't surprise us -- but the difference [in perception and reality] is dramatic." (more)

"...employee use of Web 2.0 applications such as Instant Messaging, IPTV, VoIP and Social Networking on corporate networks exceeds IT estimates by up to 10 times." (more)

Why is all this important to you?
• Your IT folks are not seeing this end run. ($)
• You are probably paying your employees to surf, not work. ($$)
• It is an open back door to your intellectual property. ($$$)

You know it's a bad law when...

Swedish intelligence official quits over wiretapping law...

Sweden - Anders Björck, a high-ranking Moderate Party politician and former defence minister has resigned from his post as head of Sweden’s intelligence oversight agency in protest against the country’s controversial wiretapping law... because he lacks confidence in the new surveillance measure which came into force January 1st... "I've thought it over carefully. The laws and the oversight activities now under consideration don’t foster privacy or efficacy." (
more)

Greek Olympic Committee President Bugged

via WhiteSparks...
Greek police are investigating the discovery of an object they believe could be a covert listening device in the Athens office of Greek Olympic Committee president Minos Kyriakou.

In a statement released on Friday, Attica regional police confirmed they had been called to Kyriakou's office late on Thursday evening.

"In the evening hours of February 5, 2009 our service was informed about the existence at the office of the president of the Hellenic Olympic Committee of a suspicious object that appeared like a microphone for monitoring conversations," the statement said.

"The police were requested to investigate the incident. The object was collected and was forwarded for further examination, the result of which is still pending."

The investigation comes less than a week before the election for the new president of the committee which Kyriakou is contesting with Spyros Kapralos, the chairman of the Athens Stock Exchange. (more)

WhiteSparks is a free email newsletter sponsored by WhiteRockGlobal, a premier TSCM consultancy located near London. Contact them for a subscription: whitenews@whiterockglobal.com

Sneaky USB Flash Drives

Sneaking spyware in to plant on your computers?
Sneaking company secrets out from their computers?
Recording your private meetings?
Whatever the goal, drive-by spy devices are becoming harder to catch; especially USB drives.

Here is a quick update so you will know it when you see it.


from the seller's website...
Surveillance style pen containing a micro sized video camcorder with 4 GB of memory. Get the mission completed with this awesome secret agent DV pen, often called a "spy pen" in the trade.

Sitting in your shirt pocket, standing in the pen cup or lying on the desk, no-one will ever notice as you secretly capture their every move. The built in flash stores the video until it is ready to be downloaded to a computer via USB, and with 4GB's of memory you can record hours of surveillance or interviews in between trips back to the office. (more with video)

All metal cross shaped necklace containing an 8 GB USB flash drive.

These days a USB flash drive is as necessary as your house keys. Whether you are taking large work files back and forth from the office or are sharing pictures and music with friends, nothing beats the convenience of a USB thumb drive. Well, why not make sure yours fits the person you are? This is a elegant all-metal cross that has a built in 8GB's of memory so you should have space to keep in its heart. (more)

All metal heart shaped necklace containing an 8 GB USB flash drive.

These days a USB flash drive is as necessary as your house keys. Whether you are taking large work files back and forth from the office or are sharing pictures and music with friends, nothing beats the convenience of a USB storage drive. Well, why not make sure the one you get fits the person who is going to carry it? This is an elegant all-metal and jeweled heart necklace that has a built in 8GB's of memory so you or your loved one will have enough space to keep those treasured memories close at heart. (more)

Realistic looking watermelon containing 8GB of USB flash memory. If you want more than to just plug your old fashioned USB stock in, this novelty USB memory stick that is right up your alley. Just remove the tip to reveal the USB connection, and watch people gape at your one of a kind computer accessory. (more)

Does someone near you always seem to know who's calling you?

Perhaps they have one of these... linked to your cell phone.

Bluetooth bracelet with vibration function and caller ID display.

Spybusters Tip # 429 - Keep Bluetooth turned off when not in use. (more)

Monday, February 16, 2009

Business Espionage - Spanish Spies, Fruit Flies

Throughout the world, Israel is considered a superpower when it comes to the development of new citrus fruit species, but now, Israeli farmers are accusing their Spanish counterparts of stealing a new species, and have recently filed a lawsuit against them. Commercial spying attempts have lead the developers of the new species to grow their fruits in hidden fields , "but afterwards the species grew in an open orchard," said Chai Benyamini, secretary-general of Israel's Citrus Growers’ Association.

"The Spanish send people who enter the orchard for a minute, cut off a citrus branch from the new species, and send it to Spain, and this is how we lose some NIS 200,000 ($48,900) a year," he explained.

The main species in question is a new breed of tangerine, called Or, that was developed in Israel and has been patented. (
more)

Moral: Every business is an espionage target. It's the money. Doesn't matter if your selling Testarossa's or tangerines — you are a target.

Make counterespionage part of your business security program.
We can help.

Sunday, February 15, 2009

Italy police warn of Skype threat

Criminals in Italy are increasingly making phone calls over the internet in order to avoid getting caught through mobile phone intercepts, police say... The police say Skype's encryption system is a secret which the company refuses to share with the authorities. (more)

Psssst! Wanna make a few billion dollars?

London - An industry source disclosed that America's supersecret National Security Agency (NSA) is offering "billions" to any firm which can offer reliable eavesdropping on Skype IM and voice traffic.

The spybiz exec, who preferred to remain anonymous, confirmed that Skype continues to be a major problem for government listening agencies, spooks and police. This was already thought to be the case, following requests from German authorities for special intercept/bugging powers to help them deal with Skype-loving malefactors. Britain's GCHQ has also stated that it has severe problems intercepting VoIP and internet communication in general. (more)