Thursday, September 9, 2010

Busman's Holiday

(sing-a-long) During the past decade, a New York man stole more than 150 buses from an unsecured Trailway bus depot in Hoboken New Jersey; the doors were open, the key were left in the ignition, and he just drove off the lot, using the coaches for everything from fast-food runs to jaunts to North Carolina; he was finally collared last week after he stole a bus, drove to Manhattan, and took a group of flight attendants to Kennedy Airport.
Police Commissioner Raymond Kelly wants NYPD to look into lax security at a New Jersey depot from which bus-thief Darius McCollum stole more than a hundred buses. (more)

Attention security vendors who sell password access key pads. Opportunity honking.

Wednesday, September 8, 2010

iPhone Spy Stick - DIY forensics, or worse?

The headline declares...
Recover DELETED iPhone Text Messages, Map Searches, Hidden Contacts, & More

Quickly and Easily Download Even Deleted Information from an iPhone

The iPhone Spy Data Recovery Stick is the ultimate iPhone recovery tool for anyone who wants to capture deleted information from any iPhone (running iOS to 3.x). The iPhone Spy Data Recovery Stick makes it easy to recover deleted text messages, contacts, call and web history, as well as photos, voice memos and calendar appointments -- giving you a unique look into exactly what the user has been searching for, who they’ve been talking to, and even the types of pictures they’ve taken. With features like saved map search history, web searches, and text messages, the iPhone Data Recovery Stick is the only tool you need to catch a cheating spouse, monitor your kids, iPhone recovery or backup your own iPhone data.

Features:
Get access to deleted information
Download text messages and view calls made
Recover deleted contacts and calendar items
View pictures and other multimedia
Get access to map history to see locations searched on the iPhone’s map with exact GPS coordinates
Get access to notes, voice memos, multimedia files, and dynamic text data
Downloading data is as simple as attaching the iPhone and iPhone Data Recovery Stick to a computer and pressing start
iPhone information is saved on any computer and can be moved to other drives as a regular file
Looks like an ordinary USB flash drive
iPhone recovery Stick allows you to recover data from your iPhone you thought was lost forever

Popular Uses:

Catch a cheating spouse
Monitor your kids iPhone text messaging and Internet use
Check on employees using company issues iPhones
Restore deleted files

Includes:
iPhone Spy Data Recovery Stick
USB cable for iPhone
(more)

Why do I mention it?
So you will know what you are up against.

P.S. It only works on the older versions of the software (for now).

Tuesday, September 7, 2010

Business Espionage - A Spy Comes Clean

South Africa - A corporate spy (Briel) has admitted in sensational court papers that he illegally tapped telephones at the behest, he says, of Investec bank.

"I always wore my Telkom overalls, as then no one queried what I was doing." ~ Briel

In his affidavit, Briel makes some devastating claims.

Briel worked for Associated Intelligence Networks (AIN) run by Warren Goldblatt, which has since morphed into Specialised Services Group, and says he received his instructions in the Investec case from former Recce Johann Rademeyer.

Briel says "Goldblatt told me that he had a big job to do in Cape Town. He mentioned that it was for Investec, and that there were bad people in their company that they wished to monitor."

He says he posed as a Telkom technician to install phone taps at Investec, as well as at private residences in Hout Bay, and a company premises near the Protea Hotel at the Waterfront.

In court papers, the Chaits say one of the places Briel tapped phones was the offices of their company, Fairweather Trust, which was developing the Victoria Junction Hotel in Cape Town at the time.

"Detailed information regarding the telephone tapping of (our) offices ... have enabled us to physically locate and recover equipment used in the tapping, which in due course will be provided in evidence," the Chaits say in papers.

The Chaits are furious - particularly because their property business was competing with Investec's own property business.

But Investec's Nobrega...described Briel's claim as an "overzealous expansion of the true facts in order to extort a settlement from Investec Bank." (more)

Substitute the word SPY for FRAUD

Special note to corporate security directors: This Certified Fraud Examiners survey is excellent. The findings parallel my internal corporate counterespionage experiences, another form of fraud... with much larger monetary losses. Swap a few words. Expand your thinking. Learn where to look. Become a wiser counsellor for your company.

A fraud spy suspect might not be easy to pick out of a crowd -- or from a rap sheet.

The average fraud spy perpetrator has no prior fraud spy charges or convictions, according to new research by the Association of Certified Fraud Examiners (ACFE), the world's largest provider of anti-fraud spy training and education. The offender is commonly between the age of 31-45, and somewhat more likely to be male than female.

More insights gleaned from the study help fill out the profile, however. Behavioral red flags, tenure at an organization, position and educational background are all criteria examined in the ACFE's 2010 Report to the Nations on Occupational Fraud & Abuse. The Report is drawn from a survey of Certified Fraud Examiners (CFEs) who investigated fraud cases between January 2008 and December 2009.

Here are some of the key findings
about fraud perpetrators
in the 84-page Report:

High-level perpetrators cause the greatest damage to their organizations. Frauds Spying committed by owners/executives were more than three times as costly as frauds spying committed by managers, and more than nine times as costly as employee frauds spying. Executive-level frauds spying also took much longer to detect.

Fraud offenders Spies were likely to be found in one of six departments. More than 80% of the frauds spying in the study were committed by individuals in accounting, operations, sales, executive/upper management, customer service or purchasing.

More than half of all cases in the study were committed by individuals between the ages of 31 and 45. Generally speaking, median losses tended to rise with the age of the perpetrator.

Most of the fraudsters spies in the study had never been previously charged or convicted for a fraud-related spying-related offense. Only seven percent of the perpetrators had been previously convicted of a fraud spying offense. This finding is consistent with prior ACFE studies.

Fraud perpetrators Spies often display warning signs that they are engaging in illicit activity. The most common behavioral red flags displayed by the perpetrators in our study were living beyond their means (43% of cases) and experiencing financial difficulties (36% of cases). (more)

Security Alert - HP Printer / Scanners

Security Alert: Low (But you should be aware of it.)
Certain models of HP combination printer and scanner devices contain a feature that could allow for corporate espionage, according to researchers at web security firm Zscaler. 

The feature, called WebScan, allows a user to remotely trigger the scanning functionality and retrieve scanned images via a web browser. This capability could allow anyone on the local area network (LAN) to remotely connect to the scanner and retrieve documents that have been left behind on the scanner, Michael Sutton, vice president of security research at Zscaler, told SCMagazineUS.com on Thursday. 

The feature generally is turned on by default and, in many cases, is not password protected.(more)

Friday, September 3, 2010

TSCM Sweep Finds Cop Bugged

IN - Eavesdropping devices have been found in the office of an Indianapolis deputy police chief believed to be under investigation by the FBI.

Members of the department's Criminal Intelligence Unit were asked Thursday night to conduct an electronics sweep of the office of Deputy Chief of Investigations William Benjamin and found a pinhole camera and a listening device inside a desk drawer...

After the bugging devices were found, Chief Paul Ciesielski issued a statement saying he was going to launch an internal investigation."I did not put it there, did not have anyone put it there, nor did the director," the statement read. "I have opened an internal investigation to find out who did." (more)

UPDATE - The bug found in an IMPD leader's office was not used to eavesdrop on him, police said today.

The device did not work, and it had been left by a previous occupant of the office, according to an e-mail from Indianapolis Metropolitan Police Department Chief Paul Ciesielski...

The listening device was found in Deputy Chief William Benjamin's office during a sweep he requested this week... It was unclear what prompted Benjamin to request the sweep of his third-floor office; he did not return a phone call from The Indianapolis Star on Friday. (more)

Soooo... Who was the previous occupant? Why did they have the room bugged? Will that be investigated? And, why did Benjamin request a bug sweep in the first place?

Spybuster Tip #582 - Keystroke Logger Killer

KeyScrambler Personal is a free plug-in for your Web browser that protects everything you type from keyloggers. It defeats keyloggers by encrypting your keystrokes at the keyboard driver level, deep within the operating system. When the encrypted keystrokes reach your browser, KeyScrambler then decrypts them so you see exactly the keys you've typed. Keyloggers can only record the encrypted keys, which are completely indecipherable. (more)

RIM Shot... and you're next Skype

International Telecommunications Union (ITU) secretary-general Hamadoun Toure said BlackBerry maker Research in Motion (RIM) should supply customer data to law enforcement agencies around the world, characterizing the governments’ needs as “genuine” concerns that cannot be ignored.

The ITU is primarily concerned with regulating global radio spectrum usage, supervising telecommunications standards processes, and helping regulate communication satellite orbits and transmission... the agency has no formal regulatory.. however, Toure’s comments certainly reflect the general sentiments of the ITU’s 192 members.

Canada’s RIM has recently faced regulatory issues in a number of countries over encrypted communications handled by its BlackBerry services, with governments like Saudi Arabia, the United Arab Emirates, India, Indonesia, and Lebanon all insisting that their governments be permitted access to BlackBerry users’ communications. (more)

Thursday, September 2, 2010

Tabloid's Royal Eavesdrop Keeps Making News

UK - In November 2005, three senior aides to Britain’s royal family noticed odd things happening on their mobile phones. Messages they had never listened to were somehow appearing in their mailboxes as if heard and saved. Equally peculiar were stories that began appearing about Prince William in one of the country’s biggest tabloids, News of the World.

The stories were banal enough (Prince William pulled a tendon in his knee, one revealed). But the royal aides were puzzled as to how News of the World had gotten the information, which was known among only a small, discreet circle. They began to suspect that someone was eavesdropping on their private conversations. 

Scotland Yard collected evidence in 2006 indicating that hundreds of celebrities, government officials, soccer stars – anyone whose personal secrets could be tabloid fodder – might have had their phone messages hacked by reporters at News of the World. Only now, more than four years later, are most of them beginning to find out. (more)

SpyCam Story #583 - Veal

A hidden-camera video that shows severe confinement and other abuses of calves has caused Bob Barker to ask consumers to stop buying veal and dairy products.

The Emmy Award-winning former host of The Price is Right and a longtime animal advocate, Barker narrated the Mercy for Animals (MFA) video and joins the group in asking Americans nationwide to boycott the products that he says sentence animals to “a life of extreme deprivation and suffering.” (more)

How to Kill Flash Zombies

Flash cookies can be used to track you across the Web without telling you. Advertisers are using it to track your movements across the Web.

Or so claims a lawsuit filed by privacy attorney Joseph Malley, one of three he's filed in the last two months against some of the biggest media heavyweights in the world -- Disney, ABC, NBC, MTV, and a host of others.

All use them employ Web ad companies like Quantcast, Specificmedia, and Clearspring to deliver Flash ads, and all of those ads store Flash cookies on your hard drive.

So what's wrong with that? For one thing, most people aren't aware Flash even stores cookies. These cookie files are ridiculously hard to find and manage: You can't get at them from your browser, and they're buried several layers deep inside your Application Data folder on Windows PCs. They can store up to 100K of data per cookie, or about 25 times what a browser cookie can store. And they can be used to recreate tracking cookies you've deleted.

In other words, if you've told an advertiser you don't want to be followed around the Web by deleting its tracking cookie, that advertiser can use Flash to 'respawn' that deleted cookie without telling you -- and continue to track you in secret. Thus Malley's lawsuits, which accuse all of those companies of breaking federal laws against computer intrusion and surveillance.

That respawning bit is why Flash cookies are also called "zombie" cookies. However, like real zombies, they can be stopped -- and you don't even have to cut off their heads (or use cricket bats and vinyl LPs, like in Shaun of the Dead ). You just need to use Adobe's Flash Player Settings Manager. (more)
Click the Adobe link above and set your preferences on the Global Settings Panel. It is easy to do and very worthwhile.

Wednesday, September 1, 2010

"Yes, you can record. Yes, you can decide not to."

Australia - Alliance Craton Explorer (a company involved in developing a uranium mine) told the Supreme Court it wanted to use recording devices in committee meetings with Quasar Resources. The companies have a joint venture agreement for the Four Mile uranium project.

Alliance claimed it wanted to protect its interests but Quasar countered that the confidentiality of the meetings could be put at risk. Quasar used its numbers at the meetings to vote against the recordings. It argued in court the use of such devices was in breach of listening and surveillance laws. 

So far, so good.

But Justice John Sulan disagreed, finding it was legitimate for Alliance to use recording devices.

However he also ruled it was acceptable for the committee to decide by a vote whether recording devices could be used. (more)

Security Scrapbook Exclusive
Possible secret recording from the meeting leaked:
"Uranium. Three Mile. Duh!" 

"No, no. Four Mile is a brilliant name. Like, mate... we go the extra mile." 

"Or, a disaster would be that much bigger, you dingo."

"I say we use kilometers instead."

The Byte of the Web Bugs

The Wall Street Journal has been running a series of very interesting - and disturbing - articles the past few days investigating Internet spying and its impact on your privacy.

For instance, did you know that the top fifty US web sites (which account for about 40% of Web pages visited by Americans) install, on average, 64 pieces of tracking technology onto the computers of their visitors? Or, that two-thirds of those tracking files were created by 131 companies, many, if not most, of which are in the business of selling the information they capture from you and me?

Of course, the companies installing the web site tracking software say it is all harmless. In fact, they argue, the information captured about us allows them to create a better on-line experience since the Web ads that we see are tailored to fit our individual interests...

As a result, tracking software on web sites has increased in sophistication to where - using so-called "Web bugs" - your cursor movements on a web page along with what you are typing are being analyzed to create profile of you (or better, your computer) that can be also tracked across web sites. (more)

SpyCam Story #582 - Don't ask, don't tell.

Australia - An army employee alleged to have put a covert filming device in change rooms at his barracks will stand trial. Nathan William Freeman, 27, is charged with indecent filming.

It will be alleged a secret camera resembling a car's key remote was put in change rooms at the Woodside barracks in the Adelaide hills. Police say the item was handed in as lost property and then discovered to be a secret camera on closer inspection. (more)

Reykjavik's Gargoyle SpyCam

Seen during my travels in Iceland this week...










Gargoyle watches the watchers.



Who says Vikings don't have a sense of humor?