Monday, December 9, 2013

Yet Another Step Closer to Eavesdropping on the Brain

Science fiction has long speculated what it would be like to peek inside a person's mind and find out what they are thinking.

Now scientists are one step closer to such technology after forging a new brain monitoring technique that could lead to the development of 'mind-reading' applications.

The breakthrough comes from a Stanford University School of Medicine study that was able to 'eavesdrop' on a person's brain activity as they performed normal functions by utilizing a series of electrodes attached to certain portions of the brain.

The process, called 'intracranial recording', was tested... (more)

How Does Santa Know?


Friday, December 6, 2013

Spy bugs found in Australia and Asia

An Australian surveillance executive whose firm was contracted by several clients to sweep for hidden mobile interceptors and other spying devices in Australia and Asia has found dozens of them.

Les Goldsmith, chief executive of ESD Group, told Fairfax Media his company found about 20 physical bugs when conducting sweeps in Australian business and local government offices, and another 68 in Asia between 2005 and 2011...

"All governments are falling victim to surveillance and some governments are falling victim to it but not saying anything," he said...


Mr Goldsmith’s remarks come as officers from Australia’s domestic spy agency ASIO raided the office of a lawyer who claimed spies bugged the cabinet room of East Timor’s government during negotiations over oil and gas deposits. It also follows news that Ecuador found a bug in its London embassy, where Julian Assange is (sic) staying...

Michael Dever, of Dever Clark + Associates, which conducts bug sweeps for government agencies, said Mr Goldsmith’s numbers were not surprising.

"Australia’s culture is pretty naive about these matters," Mr Dever said. "There’s a prevailing attitude ... among businesses that this is Australia, that this sort of stuff only happens elsewhere. But that’s not the case at all." (can be applied to most businesses in the free world)

Despite this, Mr Dever revealed that his firm had not found any bugs in Australia "in years", but said that this was likely because areas he swept were "generally secure" government or private sector facilities.

"That doesn’t mean that we’re incompetent," Mr Dever said.

"It just means that the types of places [where] we do this work ... are already low-risk anyway because of their security." (more)


A good security recipe has bug detection inspections (TSCM) as a key ingredient. Not only is TSCM a proven deterrent, it is also checks the freshness and effectiveness the other security ingredients. Cook this up right, and like Mr Dever said, your risk will be low.

Wednesday, December 4, 2013

World's Smallest Night Vision HD DV Digital Camera for under $50.00

For the PI on your shopping list who has everything...

Features:
  • The Night Vision DC DV Smallest Camera
  • Night Vision LEDs
  • Take photo, Record Video and Audio under different conditions
  • Record the special moment at any time
  • Dimensions: 4.5 x 2.8 x 1.7 cm

Specifications:
  • Pinhole 12.0M Lens
  • Image Resolution: 4032 x 3024 pixel
  • Color Video Resolution: 1920 x 1080 pixel
  • FPS: 24 frames per second
  • Image file format: JPEG
  • Video file format: AVI (MJPG)
  • Audio file format: WAV
  • Color Video and Audio
  • Built-in Rechargeable 260mAh Li-ion battery
  • Recording Time: Approx. 60 minutes
  • Memory Card: Support Micro SD/SDHC Card/TF Card
  • Weight: 41 gram
  • Dimensions: 45 x 28 x 17 mm

Package Contents:
  • 1 piece The Night Vision DC DV Smallest Camera
  • 1 piece USB Charging/Data Cable
  • 1 piece Handy Strap (more)

Tuesday, December 3, 2013

A Corporate Espionage Story

A cautionary tale...
Years ago, a restaurant owner told me how he collected the names, addresses, and phone numbers of a local competitor's customers. He had a friend put a box for a free drawing (not related to his restaurant) on the competitor's checkout counter. The contest was completely legitimate (people did win the promised prizes) and the rival gave his permission to place the box. He just didn't know entry forms would be given to the owner of a competing restaurant. With the information from the contest entries, the original restaurant owner could send coupons to many of his competitor's customers.

The individual in this example used a low-tech attack, but the story illustrates the basic concept behind all corporate espionage — gaining a competitive advantage. (more)


Moral—Business espionage is not just IT-based. All the old tricks still work, and are still used. If you are only locking the IT door, expect them to come in through the windows, chimney and sewer pipes. We can help.

The Latest Spy Trick - Infecting Computers... using sound!

Abstract of the Abstract—No network, no wireless, no access, no problem. If the computer has a microphone and speaker, you can sweet talk it into letting you have your way with it.

Abstract—Covert channels can be used to circumvent system and network policies by establishing communications that have not been considered in the design of the computing system. We construct a covert channel between different computing systems that utilizes audio modulation/demodulation to exchange data between the computing systems over the air medium. The underlying network stack is based on a communication system that was originally designed for robust underwater communication. We adapt the communication system to implement covert and stealthy communications by utilizing the near ultrasonic frequency range. We further demonstrate how the scenario of covert acoustical communication over the air medium can be extended to multi-hop communications and even to wireless mesh networks. A covert acoustical mesh network can be conceived as a botnet or malnet that is accessible via nearfield audio communications. Different applications of covert acoustical mesh networks are presented, including the use for remote keylogging over multiple hops. It is shown that the concept of a covert acoustical mesh network renders many conventional security concepts useless, as acoustical communications are usually not considered. Finally, countermeasures against covert acoustical mesh networks are discussed, including the use of lowpass filtering in computing systems and a host-based intrusion detection system for analyzing audio input and output in order to detect any irregularities. (the full paper)

Spy Speak - 21st Century Jargon Glossary

via The Guardian...
The NSA files leaked by Edward Snowden are full of intelligence services jargon. 
Decode the language...

Blackfoot
Name of an operation to bug the French mission to the UN.

Blarney
See Upstream.

Boundless Informant
The National Security Agency's internal analytic tool that allows it to monitor surveillance country by country and program by program.

Bruneau (or Hemlock)
The codenames given to the Italian embassy in Washington by the NSA.

Bluf
Stands for "bottom line up front" – a request from NSA analysts to collect less data from the Muscular program (see below) because it is of no intelligence value.

Bullrun
The NSA's efforts to undermine encryption technology that protects email accounts, banking transactions and official records. The UK has a similar programme, with both codenamed after civil war battles: Bullrun for the NSA and Edgehill for GCHQ.

Cheesy Name
A GCHQ program that selects encryption keys that might be vulnerable to being cracked.

Dishfire
Database that stores text messages, for future use.

DNI (digital network information)
Data sent across computer networks, such as web page requests, emails, voice over IP. (Formally, any information sent as "packets").

DNR (dialled number records)
The metadata around phone calls, including the sending and receiving of phone numbers, call time and duration.

Dropmire
A surveillance method that involves bugging encrypted fax machines. Used to spy on the European Union embassy in New York.

Edgehill
See Bullrun.

FISA court
The foreign intelligence surveillance court, a secret US court which oversees surveillance under the FISA Act.

Fairview
See Upstream.

Five Eyes
Britain, the US, Canada, Australia and New Zealand – the club of English-speaking countries sharing intelligence.

GCHQ
Government Communications Headquarters, the UK intelligence agency focusing on signals and communications intelligence.

Genie
An NSA surveillance project to remotely implant spyware into overseas computers, including those in foreign embassies.

Humint
Short for "human intelligence", refers to information gleaned directly from sources or undercover agents. See also Sigint.

Keyhole
Code for images gathered by satellites.

Klondyke
The mission to snoop on the Greek embassy in Washington.

Mainway
The database where the NSA stores metadata of millions of phone calls for up to a year.

Marina
The database where the NSA stores metadata of millions of internet users for up to a year.

Metadata
The "envelope" of a phone call or email, which could include the time, the duration, the phone numbers or email addresses, and the location of both parties.

Muscular
Program to intercept Google and Yahoo traffic, exposed by the Washington Post.

Noforn
"Not for foreign distribution" – a classification of some of the Snowden slides.

NSA
The National Security Agency, the US agency, responsible for collecting and analysing intelligence, plus cybersecurity.

Oakstar
See Upstream.

Operation Socialist
The name of a GCHQ cyber-attack on Belgium's main telecoms provider, Belgacom.

Perdido
The codename for the bugging of EU missions in New York and Washington.

Polar Breeze
A technique for tapping into nearby computers.

Powell
The operation to snoop on the Greek UN mission.

Prism
A programme to collect data from internet companies including Google, Microsoft, Facebook and Apple.

Rampart-T
Spying efforts against leaders of China, Russia and several eastern European states.

Royal Concierge
A GCHQ surveillance project to track foreign diplomats' movements by monitoring the booking systems of high‑class hotels.

Sigint
Short for "signals intelligence", or information gathered through the interception of signals between people or computers. See also Humint.

Snacks
The NSA's Social Network Analysis Collaboration Knowledge Services, which analyses social hierarchies through text messages.

Stormbrew
See Upstream.

Tempora
A GCHQ programme to create a large-scale "internet buffer", storing internet content for three days and metadata for up to 30.

Tor
Free software allowing users to communicate anonymously.

Tracfin
Database storing information from credit card transactions

Turbulence, Turmoil and Tumult
Data analysis tools used by the NSA to sift through the enormous amount of internet traffic that it sees, looking for connections to target.

Upstream
Refers to bulk-intercept programs, codenamed Fairview, Stormbrew, Oakstar and Blarney, to intercept data in huge fibre-optic communications cables.

Verizon
One of America's largest telecoms providers, from which the NSA collects the phone records (metadata) of millions of customers.

Wabash
The codename given to the bugging of the French embassy in Washington.

XKeyscore
An NSA program that allows analysts to search vast databases of emails, online chats and browsing histories of millions of individuals, with no prior authorisation. (more)

Monday, December 2, 2013

Jalta Hotel opens its 1950s anti-nuclear bunker and listening post to the public

If you were a VIP who stayed at Prague’s Jalta Hotel between 1958 and 1989, your room was bugged and your phone was tapped. Behind its attractive 1950s façade, the hotel has been hiding a secret – there was a 24-hour underground spying operation that listened in on guests.

From an anti-nuclear bunker 20 meters below Wenceslas Square, communist officials monitored the hotel’s foreign guests with a large bank of listening equipment that only a select few ever knew existed. None of the hotel staff were allowed to go into or even talk about the basement. And while communism ended in 1989, the bunker remained in the possession of the Ministry of Defense until 1998, when they finally declassified its existence and turned it over, as is, to the hotel.

Anti-nuclear Bunker and Cold War Museum
When: Mon. and Wed. or Tue. and Thu (alternating weeks) 5–8 p.m.
Where: Jalta Hotel, Wenceslas Square 45/818
Reservations required: call 222 822 111 or e-mail concierge@hoteljalta.com
Tickets: 75 Kč or 3 euros

Eavesdropping Helped Win the American Revolution

The ongoing scandal involving the NSA and eavesdropping on phone and email conversations around the globe, of friend and foe alike, might have you thinking the organized espionage business is relatively recent here. Not true.

It’s older than the country itself. It played a major role in winning our independence from Britain and its birth came about because of something that happened in New Jersey... (more)

The Patroits — Still Being Accused of Spying

Houston defensive end Antonio Smith questioned how New England knew what the Texans were going to do on defense after a 34-31 win by the Patriots on Sunday.

Smith told reporters after the game Houston had some new wrinkles in its defense this week and it was “miraculous” how the Patriots changed their offense to key on the defense.

“Either teams are spying on us or scouting us,” he said. “I don’t know what it is.”

The NFL fined New England coach Bill Belichick $500,000 and the team $250,000 and took away a first-round pick in the 2008 draft for videotaping New York Jets signals during a game on Sept. 9, 2007. Belichick said he thought that was allowed and apologized for what he said was a mistake in his interpretation of the rule prohibiting it. (more) (Why Is Sports Crime Different?)

Saturday, November 30, 2013

New Spy Camera Takes 3D Photos in Almost Complete Darkness

Spies operating under the cover of darkness might find that their job is about to get easier as U.S. scientists have developed a camera that can take photographs of objects and people that are only very dimly lit.

 The camera works by reconstructing 3D images from photons reflected from barely visible objects.

The technology could be used in next generation spy cameras... (more)

German Report on Industrial Espionage

EU Takes Aim at Industrial Espionage

Brussels is taking aim at industrial espionage with proposals to tighten laws so businesses can better safeguard their “trade secrets” from prying rivals.

The reforms put forward by Michel Barnier, the EU single market commissioner, aim to bolster defences against unlawful acquisition of information that is commercially valuable and secret but not covered by a patent...


Trade secrets range can range from anything from technical processes for making bathplugs, to innovative marketing strategies, valuable customer lists, or recipes for market-beating cakes or pies.

Unlike a book or trademark or patented technology, the holder of a trade secret has no exclusive right to it. Rivals seeking to close a competitive gap can legally reverse engineer the information. The proposed reforms, unveiled on Thursday, only target methods for obtaining information that are illegal, such as espionage, bribery or theft.

Mr Barnier said: “Cybercrime and industrial espionage are unfortunately part of the reality that businesses in Europe face every day. We have to make sure our laws move with the times and that the strategic assets of our companies are adequately protected against theft and misuse.” (more)

Thursday, November 28, 2013

Columbia Engineers Make World’s Smallest FM Radio Transmitter

A team of Columbia Engineering researchers...

led by Mechanical Engineering Professor James Hone and Electrical Engineering Professor Kenneth Shepard, has taken advantage of graphene’s special properties—its mechanical strength and electrical conduction—and created a nano-mechanical system that can create FM signals, in effect the world’s smallest FM radio transmitter. The study is published online on November 17, in Nature Nanotechnology. (more) (what was transmitted)

Wednesday, November 27, 2013

U.N. - End Excessive Electronic Spying

A U.N. General Assembly committee on Tuesday called for an end to excessive electronic surveillance and expressed concern at the harm such scrutiny, including spying in foreign states and the mass collection of personal data, may have on human rights.

The U.N. General Assembly's Third Committee, which deals with human rights issues, adopted the German and Brazilian-drafted resolution by consensus. It is expected to be put to a vote in the 193-member General Assembly next month.
"For the first time in the framework of the United Nations this resolution unequivocally states that the same rights that people have offline must also be protected online," German U.N. Ambassador Peter Wittig told the committee.

The United States, Britain, Australia, Canada and New Zealand - known as the Five Eyes surveillance alliance - supported the draft resolution after language that had initially suggested foreign spying could be a human rights violation was weakened to appease them. (more)