Thursday, March 21, 2013

From the Security Scrapbook Archives - 2003

Here is what the Security Scrapbook looked like 10 years ago... (Some links are now dead.)

"They're GR-R-REAT!®"When the CIA's secret gadget-makers invented a listening device for the Asian jungles, they disguised it so the enemy wouldn't be tempted to pick it up and examine it: The device looked like tiger droppings. The guise worked. ... The CIA's Directorate of Science and Technology is celebrating its 40th anniversary by revealing a few dozen of its secrets for a new museum inside its headquarters near Washington. Keith Melton, a leading historian of intelligence, calls it "the finest spy musuem you'll never see." It is accessible only to CIA employees and guests admitted to those closed quarters.
http://www.securityfocus.com/news/7721
See the e-poop at...
https://www.cia.gov/about-cia/cia-museum/experience-the-collection/index.html#!/artifact/17



 

SPECIAL SECTION -- The Jacko Show
...but not good for the gander-er.Last week, Jackson and his lawyer learned they were secretly videotaped by a camera hidden aboard the plane when Jackson traveled from Las Vegas to Santa Barbara to turn himself in. The discovery triggered an FBI investigation and a lawsuit by Jackson against the charter jet company. (Charter companies might record passenger cabin video to document any damage done by... oh say... rock stars who might party too hearty and cause damage.)
http://www.iol.co.za/index.php?click_id=22&art

It's Plain View Doctrine, not Plane View Doctrine, Jimmy.A man claiming to be a news and photo agency reporter was arrested after Jackson's security staff found him aboard the entertainer's private plane while Jackson was surrendering to authorities.
http://washingtontimes.com/national/20031127-102246-4233r.htm

NSS...Sheriff's officials said several wireless microphones discovered outside their headquarters could be the latest of several attempts by journalists to surreptitiously get information on the Michael Jackson molestation case. The devices were found in a brushy area where Sheriff's Department employees frequently take breaks and where reporters are not normally allowed. Officials did not say when they discovered the microphones.
http://www.local6.com/news/2671587/detail.html

I always feel like
Somebody's watching me
Can I have my privacy
(...and Moon Walk stage left)
Michael Jackson thinks authorities may be spying on him in his own home. The Gloved One is said to be so fearful that his Neverland ranch has been bugged, he's even looking at his teddy bears suspiciously. A Jackson insider tells us the singer believes that law-enforcement officers may have planted electronic surveillance devices in his mansion last month when they spent 12 hours searching the grounds for evidence that he molested a 12-year-old boy. "He ordered a sweep of the entire place," said the source. "They're even running the teddy bears through radio-frequency sensors to see if there might be transmitters inside."
http://www.nydailynews.com/front/story/142156p-125978c.html
http://tinyurl.com/xz1s (Somebody's Watching Me - lyrics)

The plot thickens...COURT TV anchor Diane Dimond, who reported on the first days of the Michael Jackson sex case a decade ago, is the latest to be caught up in a Hollywood phone-bugging scandal. Dimond said yesterday that authorities have informed her that wiretaps on her phone from 1994 are part of evidence seized by the FBI last year from the computer of Hollywood private eye Anthony Pellicano. Dimond was a reporter for "Hard Copy" in 1993 in the first days after the story broke of a youngster accusing Jackson of sexually molesting him. Pellicano worked for Jackson's attorney, Harold Weitzman. (Have a feeling we'll hear more about Mr. Pellicano?)
http://www.nypost.com/entertainment/10576.htm



SPECIAL SECTION -- "Teach your children well..."

In the 1960's...
Children were influenced by spy movies, TV shows and associated toys in a positive way. The 'spies' rarely spied. They were heros. They fought against evil-doers. They did "good." (Secret Agent / Danger Man, The Man from U.N.C.L.E., I Spy, James Bond - 007, Mission Impossible, The Prisoner, The Saint, The Avengers...)

By the 1980's...The spies' toys had become the heros. Eavesdropping, snooping and general spying had become "cute."

Some people recognized this and raised editorial warning flags..."In becoming accustomed to such toys and the pleasures they bring, the seeds of an amoral and suspicious adulthood are unwittingly being cultivated." - from the article, You'd Better Watch Out! This is the Year of Spying Kits for Kids, Gary T. Marx, The Los Angeles Times, 1988.
http://www.spybusters.com/The_spying_problem_worsens.html

By the 21st century..."Competitive Intelligence" had become an established job description. Corporate eavesdropping and espionage inspections had become a routine necessity for survival. And Murray Associates (http://www.spybusters.com) celebrated 25 years in business with one specialty - eavesdropping auditing.

Today...Kiddy eavesdropping, snooping and general spying toys are now theme-corporations, e.g. Wild Planet's Spy Gear, Undercover Girl and Girl Tech. Even the venerable "Discovery Channel" offers twelve children's spy toys for sale, including a "Night Spy Dart Launcher" for "ages 5+" !!!

Logical Conclusion...Toys teach.
We reap what we sow.



ODDBALL

Bored?
Call a pay phone on the observation deck of the Eiffel Tower, Paris, France and see who answers. +33 (0)1 47 53 75 68
http://www.payphone-project.com/

Really Really Bored?There were two old men, one a retired professor of psychology, and the other a retired professor of history. Their wives had talked them into a two week stay at a hotel in the mountains. They were sitting around on the porch of the hotel watching the sun set. The history professor said to the psychology professor, "Have you read Marx?"
To which the professor of psychology said,
"Yes, I think it's the wicker chairs!"


(more)

Wednesday, March 20, 2013

World's Smallest Video Cameras

Typical applications are medical endoscopy, dental imaging, surgical robots, guide wire visualization, intubation equipment visualization, disposable equipment ...and some spy applications to be sure. 
(more)

P.S. The one on the coin is a 3-D camera!

Criminals Spy Ops in Mexico

via a Blue Blaze irregular...
"I thought this might interest you. The Mexican drug cartels continue to exploit and develop their SIGINT capabilities. The criminals who specialize in surveillance against the police are called "Hawks" or "Falcons" and generally perform both physical surveillance of patrol units and radio monitoring. This particular group was arrested for monitoring police radio calls and giving gang members early warning of significant movement and potential raids in Veracruz." (more)

More background...
"Years ago I was hearing some RUMINT that a major European communication company (that also supplies the US Military) was selling high tech radio equipment to Mexican drug cartels." (more) (more)

Saturday, March 16, 2013

"Hey kids, hack it for your Uncle Sam!"

Bored with classes? 

Carnegie Mellon University and one of the government’s top spy agencies want to interest high school students in a game of computer hacking.

Their goal with “Toaster Wars” is to cultivate the nation’s next generation of cyber warriors in offensive and defensive strategies. The free, online “high school hacking competition” is scheduled to run from April 26 to May 6, and any U.S. student or team in grades six through 12 can apply and participate.


 

David Brumley, professor of computer science at Carnegie Mellon, said the game is designed to be fun and challenging, but he hopes participants come to see computer security as an excellent career choice. (more)

P.S. Registration is now open!

Casino CCTV Commandeered in $32 Million Sting

Australia - Thieves have infiltrated Crown casino's surveillance system to pull off a $32 million sting.

A foreign high roller who was staying at Crown has been implicated in the rip-off, in which the venue's security cameras were used to spy for him

 
 (more) (as predicted)

Thursday, March 14, 2013

Spy Camera Glasses - Austin Powers is Thrilled

Question Mark & the Mysterians may sue... 

from the manufacturer...
"Ankaka launches Innovative Spy Camera Glasses Espionage. The high tech spy gadget manufacturer Ankaka is back!


This time they bring people the Spy Camera Glasses espionage-spy-camera-sunglasses; Very stylish and comfortable to use, this latest make of high quality spy gadgets enables people to walk around with no worries as people spy on their subject..." (more) (video)

CUT! 
Enough already. This insults the word covert. It's time to stop applying the word "spy" to everything. (grab your glasses and sing-a-long)

Chinese Launch Espionage Investigation Against Coca-Cola

Chinese authorities have opened an espionage investigation against Coca-Cola Co. for allegedly making illegal maps of restricted areas in China, according to a South China Morning Post report Thursday. 

"What we can say for now is that many subsidiaries of Coca-Cola are involved and this happens in many provinces," the report quoted an unidentified Chinese official as saying, adding that the Ministry of State Security was involved in the probe. 

Among the issues was the use of hand-held GPS devices to collect sensitive geographic information in Yunnan province, the report said. 

It quoted a Coca-Cola statement Wednesday as saying the company was "cooperating fully" with the investigation, and that GPS devices involved used "digital map and customer logistic systems commercially available in China." (more)

How to keep dragons at bay... (click)

Pwn Pad - Use it IT, Before it is used against IT

The folks at security tools company Pwnie Express have built a tablet that can bash the heck out of corporate networks. - Wired Magazine

The Pwn Pad - a commercial grade penetration testing tablet which provides professionals an unprecedented ease of use in evaluating wired and wireless networks.

The sleek form factor of the Pwn Pad makes it an ideal product choice when on the road or conducting a company or agency walk-through. This highspeed, lightweight device, featuring extended battery life and 7” of screen real estate offers pentesters an alternative never known before. (more)

TOOLKIT INCLUDES:
Wireless Tools
Aircrack-ng
Kismet
Wifite-2
Reaver
MDK3
EAPeak
Asleap-2.2
FreeRADIUS-WPE
Hostapd
Bluetooth Tools:
bluez-utils
btscanner
bluelog
Ubertooth tools Web Tools
Nikto
Wa3f Network Tools
NET-SNMP
Nmap
Netcat
Cryptcat
Hping3
Macchanger
Tcpdump
Tshark
Ngrep
Dsniff
Ettercap-ng 7.5.3
SSLstrip v9
Hamster and Ferret
Metasploit 4
SET
Easy-Creds v3.7.3
John (JTR)
Hydra
Medusa 2.1.1
Pyrit
Scapy


The Return of the Invisible Anythings

"We propose a method for removing marked dynamic objects from videos captured with a free-moving camera, so long as the objects occlude parts of the scene with a static background." Max Planck Institute for Informatics (more)

Political propaganda videos will never look the same...

(Supplementary video. Takes time to load.)

Wednesday, March 13, 2013

The Ratters - men who spy on women through their webcams

The woman is visible from thousands of miles away on a hacker's computer.  

The hacker has infected her machine with a remote administration tool (RAT) that gives him access to the woman's screen, to her webcam, to her files, to her microphone. He watches her and the baby through a small control window open on his Windows PC, then he decides to have a little fun...

Women who have this done to them, especially when the spying escalates into blackmail, report feeling paranoia. One woman targeted by the California "sextortionist" Luis Mijangos wouldn't leave her dorm room for a week after Mijangos turned her laptop into a sophisticated bugging device. Mijangos began taunting her with information gleaned from offline conversations...


For many ratters, though, the spying remains little more than a game. It might be an odd hobby, but it's apparently no big deal to invade someone's machine, rifle through the personal files, and watch them silently from behind their own screens. "Most of my slaves are boring," wrote one aspiring ratter... (more) (sing-a-long)

That's "old news".
The story really begins here...
The hack follows the path of most hacks. It started as a challenge, became video voyeurism, and evolved into blackmail. Hackers eventually smell money in their hacks. 


While you read about "ratters" today, today's hacker-criminals are sniffing in deep pockets - businesses. Eavesdropping on corporate meetings and watching executive computer screens makes more sense financially. Next year the media will be printing stories about that. Meanwhile, you have them scooped.

Q. So, why don't we notice?
A. “The more cameras we see in our environment, the less we see them.” 

When electronic cameras were new, you noticed them. Now they are everywhere. You pay no attention. The same is true with microphones. The weird logic continues... If one isn't noticing cameras and microphones, one tends to either think they don't exist, or are not being manipulated as surveillance devices.

Many business executives know better. They know the reality of business espionage and electronic surveillance. Their mental Achilles Heel... If you don't see where your stolen conversations, strategies, ideas, etc. are going, well they are probably not going anywhere. Think of that the next time you go car shopping, and they all look like Tesla's... or vice versa. Then, call me.

Wiretapping - Silvio Berlusconi Sentenced to One Year in Prison... or not!

Former Italian Prime Minister Silvio Berlusconi was convicted in a wiretapping case in Milan Thursday and sentenced to a year in jail.

The wiretapping charge — related to the 2006 battle for control of a major Italian bank — is one of three corruption rulings the hard-partying Berlusconi faces this month.


A Milan court is also set to rule on charges he engaged a minor in prostitution, and an appeals tribunal will decide whether to uphold a four-year sentence for tax fraud. (more)

Or nots...
• Berlusconi is unlikely to serve jail time - Italian law doesn’t require prison sentences to be carried out until the appeals process exhausted, which can take several years.
• Berlusconi could become Prime Minister again.

The Pepsi Spycam

Enjoy it for the Spycam...

Monday, March 11, 2013

Employee Bugs Boss - True Story

"Employee hid a recording device in supervisor's office. In addition, without authorization, Employee made copies of supervisor's negative comments about Employee that Employee located by conducting an  unauthorized search of the supervisor's office and briefcase. Employee provided the notes to lawyer in support of lawsuit against supervisor. Finally, Employee lied to investigators during the course of the administrative inquiry."

Think this can't happen to you?
Think again.
This case comes from the files of the FBI. 
Why? 
It was their employee. (more)

P.S. This report was labeled "NOT FOR PUBLIC DISSEMINATION" (oops, again)
Click to enlarge.

Vatican Bugs

Last Month - An Italian news magazine, Panorama, claimed that Vatican authorities had conducted, and are still conducting, an extensive covert surveillance programme, tapping the phone calls and intercepting the emails of cardinals and bishops in the Curia, the governing body of the Catholic Church. (more)

This Month - The Vatican has gone high tech to prevent leaks like in 2005 when German media outlets were able to report that Joseph Ratzinger was going to be elected as Pope. A Faraday cage is being put in place to jam any signals. A Faraday cage is a mesh structure used to block outside electrical fields. For the Vatican, the usage of the Faraday cage will cause the Sistine Chapel to become a “dead zone,” preventing any cell phones from getting service. (more)

Prior to the vote, Vatican officials will sweep the chapel and the guesthouse that houses the cardinals with anti-bugging scanners to detect any hidden microphones. (more)


...and what are you doing to protect your business secrets? (more)

Perkele - Android Malware Swipes SMS Messages

via Kreb's on Security...
An explosion in malware targeting Android users is being fueled in part by a budding market for mobile malcode creation kits, as well as a brisk market for hijacked or fraudulent developer accounts at Google Play that can be used to disguise malware as legitimate apps for sale... 

Unsurprisingly, this particular entrepreneur also sells an Android SMS malware package that targets customers of Citibank, HSBC and ING, as well as 66 other financial institutions in Australia, France, India, Italy, Germany, New Zealand, Singapore, Spain, Switzerland and Turkey (the complete list is here). The targeted banks offer text messages as a form of multi-factor authentication, and this bot is designed to intercept all incoming SMS messages on infected Android phones.

This bot kit — dubbed Perkeleby a malcoder who goes by the same nickname (‘perkele’ is a Finnish curse word for “devil” or “damn”) — does not appear to be terribly diabolical or sophisticated as modern mobile malware goes. Still, judging from the number and reputation of forum buyers who endorsed Perkele’s malware, it appears quite popular and to perform as advertised. (more)


Tip: Before downloading an app, check out the name of the app developer. If it's a name you aren't familiar with, do a quick Web search for either the developer's name or the name of the app. Anything questionable about the developer or the application should come up. (more)

Super Secure Cell Phone

CryptoPhone 500 is a new configurable secure cell phone. Protection is based on...

Click to enlarge.
• End-to-end voice and message encryption: Secure end-to-end encrypted messaging and voice over IP. Works on any network, including 2G GSM, 3G/UMTS, and Wireless LAN.

• Hardened operating system: It is the first mobile phone featuring GSMK's secure Android operating system, built from source code with granular security management. Permission enforcement module controls access to networks, data and sensors (camera, microphone, etc.).

• Baseband firewall: Protection against over-the-air attacks. Constant monitoring of baseband processor activity, baseband attack detection, and automated initiation of countermeasures.

• Encrypted storage system: Protects data at rest against unauthorized access.


The CryptoPhone 500 becomes commercially available by end of April. (more)

Barney Google 2013

Google Glass is the company's upcoming product that puts a computer on your face. Google is about to release the dorky-looking device and most likely it will be snapped up by the techie crowd. It is an innovative product that pushes live-blogging to the next level, and that will unleash a storm of concern never before seen caused by a mobile gadget. ...

Rightly or wrongly there's already a concern about folks taking photos and videos in certain public locations and situations. Pull out a camera in places like public schools, playgrounds, and airports and you might incur the wrath of authorities and parents, especially where public safety of kids are concerned.

When public awareness of Google Glass reaches a critical mass and it's understood that these devices can record photos, video, and audio of the wearer's surroundings, an outbreak of bans is sure to result. Don't be surprised if within weeks of the Google Glasses general release we start seeing bans of it cropping up all over the place.


These bans are not going to be the result of Google Glass wearers actually using them, they are going to be a result over the concern that they can be used discretely. (more)

Friday, February 22, 2013

Security Scrapbook Reader's Question - Spy School

Q. "I really enjoy your articles. Let me ask you: Would a spy school go over here in the U.S.?"

A. It probably would. There are plenty of people - from kiddies to Mitty's - who think spying is cool, albeit illegal. Training is probably not illegal, just implementing the skills. 

I educate my clients on spying techniques, just so they know what to look out for. Being aware helps them protect themselves against spying. 

Come to think of it, we are one of the very few countries whose government spy agencies do not support the private sector with the business intel they collect. Perhaps there is a spy school niche market, to help us level the international economic playing field. Hummm... Just don't have your Bonds reporting to HR or Facilities, like the security departments I see in some corporations.

Examples of spy schools, games and books...
http://www.jamesbondlifestyle.com/news/bond-experience-launches-november-7th
http://thebondexperience.com
http://www.spymuseum.org/education-programs/
http://www.stilettospyschool.com/newyork.php
http://www.mi6academy.com/newyork.php
http://www.spyschool.com/
http://www.beyondweird.com/survival/sschools.html
http://www.fxnetworks.com/archer/spyschool (game for kids)

Spy School (book for kids) 
Another Spy School (book for kids)
So You Want to Be A Spy (book for kids)
So you want to be an industrial spy? (rare, out of print)
The Complete Idiot's Guide to the CIA (book)
Spy's Secret Handbook (Project X Top Secret) (book for kids) 

It's True! This Book is Bugged (book for kids) 
How to be a Spy: The World War II SOE Training Manual
The Spycraft Manual: The Insider's Guide to Espionage Techniques

The Official CIA Manual of Trickery and Deception
The Spy's Handbook: Learn How To Spy On Anyone At Anytime Without Getting Caught By Using Spy Gadgets And Other... 

 

Thursday, February 21, 2013

Business Espionage - Quote of the Month

“This is an absolute tidal wave of criminal activity, and we’re not even scratching the surface. We are literally having our nation systematically stolen out from under us.”

 Brett Kingstone, a one-time victim of trade secret theft and writer of The Real War Against America, a book that details how his start-up company was crippled by the theft of trade secrets related to LED lighting. (more)

Spykpe

A technology called Legal Intercept that Microsoft hopes to patent would allow the company to secretly intercept, monitor and record Skype calls. And it's stoking privacy concerns. (more)

We're shocked. q.v. - Yesterday's story.

Express Scripts vs. E&Y - Trade Secret Theft Allegations

Express Scripts Inc. sued the accounting firm Ernst & Young LLP and one of its partners for the alleged theft of trade secrets and misappropriation of the pharmacy benefit manager’s confidential and proprietary data.

The Express Scripts Holding Co. unit said in a complaint filed yesterday in state court in Clayton, Missouri, that it learned last year that accounting firm partner Don Gravlin had been “sneaking” into its St. Louis headquarters and e-mailing documents to a private Google account via the account of an Ernst & Young consultant...

The accountants allegedly took the equivalent of more than 20,000 pages of data, including pricing information, business strategy, projections and “performance metrics” documents, to aid development of Ernst & Young’s own health-care business segment, which includes Express Scripts and Medco Health Solutions Inc., which it acquired last year, as well as some of their competitors. (more)

Wednesday, February 20, 2013

U.S. Unveils New Strategy to Combat Trade-Secret Theft

The White House unveiled a new strategy to exert pressure on China and other countries that engage in corporate espionage against the U.S. as part of a new Obama administration push to counter cyberattacks and commercial spying.

The strategy, released Wednesday in a report that was the subject of a White House meeting, raised the prospect of stepped-up U.S. trade restrictions on products and services derived from stolen trade secrets. Officials also outlined a series of diplomatic actions to reinforce the administration's commitment to curbing such thefts.
 

The new push comes on the heels of fresh revelations of Chinese cyberspying and represents an effort by Washington to respond to growing complaints about theft of military and corporate secrets, with a number of the allegations focusing on China. (more)  

Trade restrictions and diplomatic actions are historically ineffective, not to mention unrealistic and counterproductive when trying to develop a global economy. These hand slaps are likely viewed as a cost of stealing doing business. Reward outweighs punishment. 

The missing element in intellectual property protection... 
Holding caretakers responsible. If your information would hurt the country if stolen, there should be a legal duty to protect that information. Add that element to trade restrictions and diplomatic actions, and you may just have a workable counterespionage strategy. Hey, it works for the other guys. (more)

P.S. "Promote Voluntary Best Practices by Private Industry to Protect Trade Secrets" (Section 2 of the report) is both vague and voluntary. It will never be adopted. Why? Two words... Risk Analysis. Think HIPAA or Sarbanes-Oxley would work if they were just voluntary best practices?

Don't get me started.
~Kevin

Skype Plebes Petition Redmond Patricians

A coalition of activists, privacy organizations, journalists, and others have called upon Microsoft to be more forthright about when, why, and to whom it discloses information about Skype users and their communications.

In an open letter published on Thursday, the group argues that Redmond's statements about the confidentiality of Skype conversations have been "persistently unclear and confusing," casting the security and privacy of the Skype platform in doubt...

The group claims that both Microsoft and Skype have refused to answer questions about what kinds of user data the service retains, whether it discloses such data to governments, and whether Skype conversations can be intercepted. (more)


"more forthright" 
"in doubt" 
Please.

The original Skype-in-the-wild was viewed as high security privacy tool. Guess who didn't like that. Guess why Skype was "bought" in from the wild and given adult supervision. (Think Spypke.)

Post de facto petitioning is painful to watch. If you want privacy, you need to start much earlier in the game. It begins with self-reliance.  

Example: You don't see smart corporations sitting around waiting for 'the government' or some free software to protect their information. No, they take proactive measures like TSCM and IT security. They don't wait and whine later.

Yet Another Teleconference Eavesdrop (with recommendations)

Alaska’s largest statewide commercial fishing trade association announced (it will) request Alaska authorities to investigate what they say was unauthorized eavesdropping of their United Fishermen of Alaska private teleconference by the Kenai River Sportfishing Association's office.

According to UFA Interim President Bruce Wallace, on January 17, 2013 the United Fishermen of Alaska, representing 34 member organizations, held a private teleconference. 

In addition to 25 UFA Board members, UFA alleges an individual or individuals at the offices of the Kenai River Sportfishing Association (KRSA) was also on the line during the private teleconference.

This allegation was later confirmed by the teleconference vendor, who provided a phone log, which included a phone number registered to the Kenai River Sportfishing Association (KRSA) office. KRSA is not affiliated with UFA in any way. (more) (REAL Spy Fishing)


A reminder to our clients, and a free sample for potential clients...

Murray's Teleconferencing Checklist

Passcodes...
     • Change all current passcodes, now.
     • Prohibit employees from mass e-mailing or posting passcodes.
 

Switch to a conference call system with accountability features...
     • each participant is given a unique passcode,
     • the passcode is changed for each new conference call,

     • only the pre-authorized number of callers may be admitted,
     • and a record of all call participants is available to the call leader.
 

Send Employees for Counterespionage Training? Brilliant!

Russia - Reviving the Soviet cult of vigilance in the digital age, the administration of Russia’s second biggest city launched a tender to teach its officials the basics of combating technological espionage.

A hand-picked cadre of 25 civilian bureaucrats in St. Petersburg will train in ways of “countering foreign technical intelligence services and technical data protection,” according to the tender’s description... The course would last for 108 hours and end in a test. The tender has a price tag of 727,000 rubles ($24,000)...
 
In December, the administration of St. Petersburg – headed by Governor Gennady Poltavchenko, also a former KGB officer – also contracted anti-espionage companies to look for covert listening devices in its offices, Fontanka.ru city news website reported. (more)

The ROI on this should be tremendous. 
Every organization should be so smart. 
~Kevin

Tuesday, February 19, 2013

United States Intelligence Community - Virtual Career Fair

The United States Intelligence Community (IC) invites you to attend the fourth annual IC Virtual Career Fair - a free online event - on Tuesday, February 26, 2013, from 2 p.m. to 8 p.m. (Eastern). 

Space is limited. To guarantee entrance, pre-registration is highly encouraged. Reserve your spot today!

Don't miss this opportunity to learn about IC careers and get tips on how to apply for positions.

The following agencies and components will be participating in the 2013 IC Virtual Career Fair:
Central Intelligence Agency (CIA)
Defense Intelligence Agency (DIA)
Federal Bureau of Investigation (FBI)
FBI Language Services Section (FBI LSS)
National Geospatial-Intelligence Agency (NGA)
National Security Agency (NSA)
National Virtual Translation Center (NVTC)

Weird Security News of the Week

Japanese police believe they have finally caught the man behind an extraordinary malware campaign that included taunting police in January by sending them clues on an SD card strapped to a cat.

According to TV station NHK, 30 year-old Yusuke Katayama was picked up after Tokyo police accessed CCTV pictures that showed the accused near the animal not long before the memory card was retrieved from its collar.
 

It later emerged that police had attempted to coerce confessions from four of the innocent suspects which led to a hugely embarrassing climbdown when they were shown to be uninvolved.

Disturbing messages were also received by a lawyer in Tokyo and a TV station threatening suicide, backed up by a picture of an anime doll inside a noose made from Ethernet cable. (more)


More strange security news...
Ex employee wiped financial data from bikini bar
Fugitive John McAfee taunts police as he evades capture
Burglar unintentionally films robber while using iPhone as flashlight

Mechanic Hits Emails at Rival Limo Firm

A Las Vegas limousine company executive was convicted Friday of hacking into the emails of his former employer. 

John Sinagra, vice president and general manager of VIP Limousines of Nevada, was indicted last year on charges of obtaining information from a protected computer and aggravated identity theft.
 

Federal prosecutors alleged that Sinagra, who once was charged as a mob hitman in a sensational New York murder case, hacked into the emails of rival Las Vegas Limousines, owned by Frias Transportation, and stole key information. (more) (The Mechanic)

Hobby Drones Under Fire

On Dec. 26, a grand jury handed down several indictments against the owners of the Columbia Packing Company for dumping pig blood into a creek. They now face hefty fines and even prison time stemming from the water pollution, and the plant has since been shuttered. 

Neighbors had complained about noxious fumes and other issues for a while, according to the local news. But investigators didn’t get involved until this drone pilot took his pictures.

Under a new law proposed in the Texas legislature, sponsored by a lawmaker from the Dallas suburbs, this type of activity could soon be criminal. Not the pollution--the drone. (more)


And from down under...
One Tasmanian man is using a drone to help take video in tricky places and some of the video has gone viral. (video)

A UAV Alternate POV

Cute animated video from The New York Times... (more)

Sunday, February 10, 2013

Two Princesses in a Bug House

GLOBE reveals that the royal couple’s new home, Kensington Palace, is bugged, and it seems that Camilla Parker-Bowles is the prime suspect for bugger. 

According to the cover of GLOBE’s current edition, February 18, two listening devices were discovered right inside the couple’s apartments. In this royal bombshell GLOBE will explain exactly how and where the royal bugs were discovered and why suspicion naturally fell on evil Camilla.

Now that the bugs have been discovered and removed what will Camilla do? Do you think that there are other listening devices spying on the royal couple? (more)

Déjà vu...
Princess Diana hired a private security firm to secretly sweep Kensington Palace for bugs.

She was so concerned about eavesdropping that she called in a four-man team to carry out a search for listening devices.

The check was ordered in May 1993 after the princess expressed fears that her conversations were being monitored...

 
But it went disastrously wrong when police detained the security firm's workers, who had arrived at the palace posing as carpet-fitters...


She had her butler Paul Burrell and his colleague Harold Brown - later both cleared of stealing from her after her death - arrange for the de-buggers to access the palace without the police knowing.

They gained access to the palace by claiming to be from a carpet firm. The secret mission was only discovered-when one of the team went to the palace gate house and asked for access to mainframe telephone equipment located in the engineers' room next to the police gate house.

Officers became suspicious and realised that the team from Moran Security Support Services Ltd had been contracted to "de-bug" the royal apartment. (more)

If the competition isn't bugging you, they are probably doing this...

Interesting read...
A competitive intelligence consultant discusses things that can help a business--at the expense of another. (more)

Report Recommends a TSCM Sweep of City Hall

According to the report*, many staff members worry there are bugs in city hall that an exterminator cannot remove.

So much so, that one of the official recommendations is to sweep city hall.  


"The Council should retain an outside firm to conduct a sweep of City Hall for bugs or other surveillance or electronic devices," the report reads. "While it is doubtful that any such devices exist in City Hall, there is a clear and present perception among staff that the facility is not secure and possibly bugged. Many employees in the City have resorted to the use of their personal cell phones and often leave the premises to discuss sensitive matters. A sweep of City facilities would help restore confidence in the security and privacy of the City buildings."

The findings of fact revealed that "based on credible and objective evidence, Police Chief Debra Duncan secretly tape recorded former City Manager Wayne Herron." (more)


* The rest of the story...
"the report" aka "The Fox Report" - "Attorney Anthony Fox led the team of two attorneys, Sarah Hutchins and Mary Crosby. They interviewed about 24 people, including current and former employees." "The report cost $50,000." 

A sweep of the sensitive City Hall areas would have cost less than 1/4 of that. ~Kevin

Wednesday, February 6, 2013

Law Proposed to Let Parents Wiretap Kids

An Ohio lawmaker plans to introduce a bill that would allow parents to wiretap their child’s cell phone conversations to be used in court.


Under the bill, only parents or guardians would be allowed to track online or cell phone communications of a minor under the age of 18. (more)

Groundbreaking Encryption App is a Fed Freaker

For the past few months, some of the world’s leading cryptographers have been keeping a closely guarded secret about a pioneering new invention. Today, they’ve decided it’s time to tell all. 

Back in October, the startup tech firm Silent Circle ruffled governments’ feathers with a “surveillance-proof” smartphone app to allow people to make secure phone calls and send texts easily. Now, the company is pushing things even further—with a groundbreaking encrypted data transfer app that will enable people to send files securely from a smartphone or tablet at the touch of a button. (For now, it’s just being released for iPhones and iPads, though Android versions should come soon.) That means photographs, videos, spreadsheets, you name it—sent scrambled from one person to another in a matter of seconds. 

Click to enlarge.
This has never been done before,” boasts Mike Janke, Silent Circle’s CEO. “It’s going to revolutionize the ease of privacy and security.” 

The sender of the file can set it on a timer so that it will automatically “burn”—deleting it from both devices after a set period of, say, seven minutes. Until now, sending encrypted documents has been frustratingly difficult for anyone who isn’t a sophisticated technology user, requiring knowledge of how to use and install various kinds of specialist software. 

What Silent Circle has done is to remove these hurdles, essentially democratizing encryption. It’s a game-changer that will almost certainly make life easier and safer for journalists, dissidents, diplomats, and companies trying to evade state surveillance or corporate espionage. Governments pushing for more snooping powers, however, will not be pleased. (more)

Authorities... "No probing all the way. Promise."

The U.K. plans to install an unspecified number of spy devices along the country’s telecommunications network to monitor Britons’ use of overseas services such as Facebook and Twitter, according to a report published Tuesday by Parliament’s Intelligence and Security Committee.

The devices — referred to as “probes” in the report — are meant to underpin a nationwide surveillance regime aimed at logging nearly everything Britons do online, from Skype calls with family members to visits to pornographic websites. The government argues that swift access to communications data is critical to the fight against terrorism and other high-level crime.

Authorities have been at pains to stress that they’re not seeking unfettered access to the content of emails or recordings of phone calls, but rather what many have described as “outside of the envelope” information: Who sends a message, where and how it is sent, and who receives it. (more) ...for now.

Tuesday, February 5, 2013

Business Espionage - Sentences Short - Fines Small

MO - A Chinese business owner and one of his employees have pleaded guilty in Missouri to conspiring to steal trade secrets from a U.S. company, in what one expert called a rare example of foreign business people being successfully prosecuted for corporate spying.

Ji Li Huang, 45, and Xiao Guang Qi, 32, admitted Friday, Jan 25 in federal court that they tried to buy Pittsburgh Corning Corp.’s proprietary formula for cellular glass insulation by bribing an employee of the company’s Sedalia plant.

U.S. District Judge Brian Wimes sentenced Huang to 18 months in federal prison and fined him $250,000. Qi — Huang’s employee at a plastic novelties manufacturer called Ningbo Oriental Crafts Ltd. — was sentenced to time served and fined $20,000, with the understanding that he would leave the United States immediately. Both men paid their fines Friday, The Kansas City Star reported. (more)

British Army Unveils New Mini Spy Drone

The British army has demonstrated a new tiny spy drone as the latest weapon against Taliban militants in Afghanistan.

Soldiers from the Brigade Reconnaissance Force at Camp Bastion demonstrated the eight-inch long plastic moulded drone, which has three cameras hidden inside its nose and weighs just 15 grams.

Codenamed the Black Hornet, the tiny aircraft is being used by British troops against the Taliban in Afghanistan.

The small flying machine, which has a smooth grey body and twin black rotors, can either be controlled directly or programmed to fly to a given set of co-ordinates and then return to base after carrying out its spy missions. (more)

Two sneaky Android apps have been detected...

The apps cloaks as cache cleaners but instead snoop around once connected to PC. Superclean and DroidCleaner are the two applications uncovered by Kaspersky Labs. Both feature clean-up of Android phone or tablet cache files.

The so-called "cleaners" promise to make devices faster and to increase processing but turns out to download three separate files - autorun.inf, folder.ico, and svchosts.exe. These components are automatically placed in the root of the device's SD card, and once the user connects it to the computer using USB mode, the malware begins to execute itself.

The malware activates the desktop microphone, encrypts all recording, and send all gathered information back to the developer of the malicious application according to Kaspersky. Aside from infecting the PC, the malware also uploads Android device's information, opens arbitrary browser links, uploads and deletes SMS, and distributes contacts, photos, and coordinates online. (more)

Sunday, February 3, 2013

New Wave Of Hidden Cameras Make Spying Easy

It’s becoming easier than ever to keep an eye on spouses, children, business partners, and nannies with a new wave of spy gear.

Note: The spy gadgets are real, and work very well — the 'antidote' gadgets used to protect against them, not so well. Save your money. 

Need protection? Find a professional electronic countermeasures specialist. Invest your money with them. Need help finding one? Check here. ~Kevin

Saturday, February 2, 2013

Spy vs. Spy vs. Judge Leonie

A former CIA officer who pleaded guilty to identifying a covert intelligence officer was sentenced on Friday to 30 months in prison.

John Kiriakou and prosecutors agreed on the term as part of the plea agreement he struck in October.

Kiriakou, 48, declined to make a statement at the Alexandria, Virginia, federal court prior to sentencing by U.S. District Judge Leonie Brinkema. "Alright, perhaps you've already said too much," Brinkema said. (more)