Tuesday, July 11, 2017

Spycam News: Former NASCAR Driver Sued for Spying on Ex's

Former NASCAR driver Greg Biffle and Roush Fenway Racing have been sued by Biffle's ex-wife and her mother for allegedly spying on them inside his home in Mooresville, North Carolina, with hidden cameras.

According to WSOC-TV's Allison Latos, Biffle is alleged to have hidden cameras "inside the house, including in the master bedroom, bathroom and in the guest bedroom where Biffle's former mother-in-law stayed."

The suit reportedly alleges Biffle, 47, spied on his ex-wife and ex-mother-in-law with the hidden cameras and showed the tape around. more

Android Malware Steals Data From 40 Apps

A newly uncovered form of Android malware aims to steal data from over 40 popular apps including Facebook, WhatsApp, Skype and Firefox - and the trojan has been actively engaging in in this illicit activity for almost two years.

Dubbed SpyDealer by the Palo Alto Networks researchers who discovered it, the malware harvests vast accounts of personal information about compromised users, including phone numbers, messages, contacts, call history, connected wi-fi information and even the location of the device.

The espionage capabilities of the trojan also enable it to record phone calls and videos, along with surrounding audio and video, take photos with both front and rear cameras, take screenshots of sensitive information and monitor the devices location at all times. more

Goodluck Jonathan's Wife - Claims Repeated Phone Bugging

Nigeria - Mrs. Patience Jonathan, wife of former President Goodluck Jonathan, has accused the Economic and Financial Crimes Commission of sending assassins after her. 

Patience also accused the anti-graft agency of bugging her telephone lines, adding that agents of the commission had been sending threatening text messages to her.

The former President’s wife said, “The EFCC and its agents have repeatedly bugged the personal telephones of our client and her relations through its many operatives and has inundated her with numerous threatening calls and text messages.” more

The Great Seal Redux - Former Minister Admits to Installing a Video / Audio Bug

Ghana - The former Minister of Lands and Natural Resources, Alhaji Inusah Fuseini, has said that he installed the spying device retrieved from the office of the current Minister, John Peter Amewu...

According to him, the hue and cry over the incident was not necessary as the device was not even fully installed... (it appears fully installed)

The device was planted in the huge Coat of Arms plaque hanging in the far left corner of the Minister’s office.

The device included a camera, a storage unit and another device suspected to be a transmitter. It was neatly housed in a black metal box and used batteries.* more

* This description is not totally accurate, based on what's seen in the photo. 
For more on the original Great Seal Bug click here

UPDATE #1
It has emerged that, the secret audiovisual recording device planted at the Lands and Natural Resource Minister’s office was discovered by an Israeli national and not National Security operatives as widely speculated.

According to the Public Relations Officer of the Lands Ministry, Abraham Otabil, the Israeli national [name withheld], who had called on the minister to discuss some private matters when he surprisingly detected the ‘spying’ gadget...

He added that, the detective and his team discovered the bugged device after a brief inspection was carried out at the office. Though the said Israeli national, could not tell the minister how long the device had been planted, National Security operatives were alerted to pick up the matter for further investigations. more

UPDATE #2
Following the bugging of the office of the Minister of Lands and Natural Resources by a former minister under the out-gone National Democratic Congress (NDC) administration – Inusah Fuseini, the Majority Leader in Parliament, Osei Kyei-Mensah-Bonsu, has suggested to all ministers and deputy ministers in the current regime to have their offices screened and swept by the Bureau of National Investigations (BNI).

He said personally, he was going to ask the security agencies to also screen and sweep his office. more

UPDATE #3
The Member of Parliament for Kumbungu, Ras Mubarak, has admitted bugging the office and vehicle of the current acting Chief Executive of the National Youth Authority, Mr Emmanuel Asigiri. more

Thursday, July 6, 2017

Security Director Alert: Satellite Phone Encryption Cracked

Chinese researchers have discovered a way to rapidly decrypt satellite phone communications -- within a fraction of a second in some cases.

The paper, published this week, expands on previous research by German academics in 2012 by rapidly speeding up the attack and showing that the encryption used in popular Inmarsat satellite phones can be cracked in "real time."

Using their proposed inversion attack thousands of time on a 3.3GHz satellite stream, the researchers were able to reduce the search space for the 64-bit encryption key, effectively making the decryption key easier to find.

The end result was that encrypted data could be cracked in a fraction of a second. more

Surveillance Robots Share and Interpret Images

A new system that allows a team of robots to share and interpret information as they move around could enable these same robots to relieve humans of dangerous jobs such as disposing of landmines, cleaning up after a nuclear meltdown or surveying the damage after a flood or hurricane. 

Seeing the same area from many points of view could be confusing to a human, but a computer can manage it and combine all the information to build a "model" of the scene and track objects and people from place to place.

Researchers from Cornell University have developed the system, which would allow robots to conduct surveillance as a single entity with many eyes.

"Once you have robots that cooperate, you can do all sorts of things," said Kilian Weinberger, associate professor of computer science...

The researchers plan to test their system on the Cornell campus, using research robots to "surveil" crowded areas while drawing on an overview from existing webcams. Their work might lead to incorporating the new technology into campus security. more

Things to Come...

The Espionage What Goes Around...

China fears cyberattacks because it is creating cutting-edge technology that others will want to steal, says its envoy to Canada (Lu Shaye), a rebuttal of the widely held view that the country is a leader in internet espionage.

Canada and China recently agreed to stop state-sponsored hacking of each other’s trade secrets and business information, but experts say the deal is unverifiable and potentially meaningless...

“China is technically advanced now and we are afraid that our things will be stolen by others,” Lu said through a translator in an interview with The Canadian Press.

China’s innovators are making great strides in quantum communications, supercomputing, and other information technology, he continued.

Last year, China launched a large satellite to support quantum communications, which New Scientist magazine describes as “a form of secure communication in which the laws of quantum mechanics prevent eavesdroppers from snooping in.” more

Wednesday, July 5, 2017

The Bootlegger, the Wiretap, and the Beginning of Privacy

By
Nearly a century before a U.S. President accused his predecessor of ordering a “tapp” on his private telephone line, and before he tweeted a warning to the head of the F.B.I. that he had “better hope that there are no ‘tapes’ of our conversations,” a professional spy, armed with a pack of cigarettes and an earpiece, hid in the basement of the Henry Building, in downtown Seattle, catching crackling bits of words being spoken miles away.

Richard Fryant had worked as a wiretapper for the New York Telephone Company, tasked with eavesdropping on his own colleagues, and now took freelance assignments in the Queen City.

On this occasion, he was seeking dirt on Seattle’s corrupt mayor—who was suspected of having ties to Roy Olmstead, a local bootlegger—for a political rival. At the behest of his client, Fryant rigged micro-wires to a certain exchange, ELliott-6785, and began to listen.

“They got that load,” one man said, breathing heavily.

“The hell they did—who?” asked another.

“The federals.”

The men speaking on ELliott-6785 hung up, but the conversation had only just begun... more

Roy Olmstead kicked off a long, twisted, legal trail of litigation, decisions and laws regarding electronic surveillance. It's a trail that hasn't ended yet.

Quote of the Week

"There are no hackers; there are only spies," ~ Eric O'Neill

Tuesday, July 4, 2017

Without Spies There May Have Been No 'Fourth of July'

By Nina Strochlic, for National Geographic magazine.

In 1777, the American colonies were badly losing their fight for independence from Great Britain. The British Army had captured New York City’s crucial port. Expecting further advances, the Continental Congress was evacuated from Philadelphia. It seemed that the war was lost.
Then George Washington, then Commander-in-Chief of the Continental Army, wrote a letter that changed the course of the war.

Washington was desperate to discover what was happening inside New York, but military scouts couldn’t get close enough. The general needed someone to penetrate enemy lines, but when he asked for volunteers, few of his troops raised their hands.

“Spying wasn’t seen as gentlemanly,” says Vince Houghton, resident historian at the International Spy Museum in Washington, D.C.

Finally, a young army captain named Nathan Hale volunteered for the dangerous assignment. He was caught a week later and hanged, the first known American spy to be executed on the job. (He’s memorialized with a statue outside CIA headquarters.)

Washington realized that the mission was too big for untrained volunteers, so he set about building an espionage organization.

John Jay, later the first Chief Justice of the Supreme Court, had been running counterintelligence as head of the New York State Committee and Commission for Detecting and Defeating Conspiracies. One of Jay’s operatives, a merchant named Nathaniel Sackett, had experience in secret writing and codes. 

In February 1777, Washington wrote a letter to Sackett in which he offered him $50 a month—out of his own pocket—to establish the first formal apparatus for the “advantage of obtaining the earliest and best Intelligence of the designs of the Enemy.” “Without the organization that Sackett set up, it would have been very difficult for us to win the war,” says Houghton. “We had a ragtag army and [the British] had the greatest army, greatest navy, and greatest economy in the world. We had no real business winning this war.”

But America’s spy service got off to an inglorious start. Most of Sackett’s agents failed at their jobs—including Sackett himself, who was fired after just six months.

Fortunately for the infant nation, Sackett’s replacement, 26-year-old Benjamin Tallmadge, created what is considered one of America’s greatest espionage operations: the Culper Spy Ring. Comprised of childhood friends from Long Island, the group included a shop owner inside New York City who gathered information, a traveling trader who smuggled it out of the city, and a whale boat captain who delivered it to Washington’s camp.

Employing the tools and tricks of the 18th-century spy trade—hiding secret messages in hollow feather quills, using “dead drops” to transport letters—the Culper operatives unmasked enemy spies, busted a money counterfeiting plan, and stopped the British from sabotaging a French aid mission to the colonies.

After important letters were lost during an enemy raid, Tallmadge invented a “numerical dictionary” code that matched 763 cities, names, and words to numbers. (Washington’s code name was Agent 711.) Washington also asked physician James Jay (brother to John) to invent an invisible ink that could be revealed only with another chemical and would “relieve the fears of such persons as may be entrusted in its conveyance.

Washington’s espionage experiment paid off. In 1781 the British surrendered, thanks in part to the intelligence gathered by the Culper Ring and their networks. “Washington didn’t really out-fight the British. He simply out-spied us,” a British intelligence officer allegedly said after the war.

None of the Culper spies were ever caught, and even Washington himself never learned exactly who was in the group. The ring’s very existence wasn’t discovered until the 1900s, and to this day no one knows for certain how many members it had.

After the war Washington asked Congress to reimburse him $17,000—nearly half a million dollars today—for his espionage expenses. The lawmakers obliged.

Monday, July 3, 2017

Weiwei - All Leave Hansel & Gretel Digital Breadcrumbs

The Chinese artist-activist Ai Weiwei is nothing if not connected. All through the introductory remarks at the press preview for Hansel & Gretel, the giant art installation about electronic surveillance at the Park Avenue Armory in New York (open through August 6), Ai was busy on his phone...

Hansel & Gretel—the latest in the Armory’s series of huge Drill Hall extravaganzas, whose title indicates that we all leave breadcrumb trails, whether we want to or not—is another collaboration among Mr. Ai and Mssrs. Herzog and de Meuron...

Part 1 of this technology-rich dystopian spectacle occupies the whole of the darkened 55,000-square-foot Drill Hall, which the audience enters not from the Armory’s grand, staircased main entrance, but through an inconspicuous rear door on Lexington Avenue.

Once inside, visitors make their way through almost pitchblack corridors to a ramp that takes them up a few feet to the main attraction: a floor on which are projected their surveilled overhead images, which follow them around like digital puppy dogs.

The images come from dozens of overhead cameras, not the tethered drones buzzing around overhead. The phenomenon undoubtedly inspires awe in a few... The Drill Hall gizmopalooza gives everyone a visceral experience of what it’s like to be watched by unseen forces... more

Spycam News: Docs Know What's Up

The National Healthcare Professionals Association of South Africa has filed papers in the Pretoria High Court

accusing 19 medical aid schemes of spying on doctors and sneaking hidden cameras into their consulting rooms...

The lawsuit specifically named Discovery, stating that the scheme has sent spies and private investigators with concealed video cameras and recording equipment into private consultation rooms without consent. more

Saturday, July 1, 2017

Where Smartphones Became Spyware Piñatas

A spying scandal in Mexico widened after it was confirmed by experts that several of the country’s top opposition leaders — along with journalists and human rights advocates — were targeted by high-tech spyware exclusively sold to governments.

The Internet watchdog group Citizen Lab exposed the scandal (in June) in a report that showed that spyware known as Pegasus had been used in recent years to infiltrate the cellphones of 12 prominent journalists and rights activists, all of whom had been critical of the Mexican government...

The victims received messages with links to the malware, which, when activated, allows outsiders to remotely access a phone’s data as well as activate its camera and microphone. more

Business Espionage Cautionary Tale - Bugs, Taps and Now... Drones

Australia - An international drug syndicate used drones to conduct counter-surveillance on police...

"During the investigation phase, this syndicate has used aerial drones to conduct counter-surveillance on police activity," Commander Beveridge said.

"The syndicate was using a drone when they were holding their meetings, to conduct counter-surveillance, to see if anyone, like law enforcement, was watching...


"It did cause the surveillance staff to initiate procedures and methodologies to defeat it. "These syndicates are getting a lot more sophisticated, and so are we. We've just got to be awake to it." more

Murray Associates Industrial Espionage Takeaway Points:
• Even with an upper floor office you are no longer immune to optical surveillance.

• If you have window blinds, use them.
• Make sure computer screens and whiteboards don't face windows.
• Institute a clear desk policy.
• If you see a drone, don't assume it's some hobbyist playing. Take a photo or movie for evidence.
• Be alert. A drone in your parking lot can grab all license plate numbers in a minute. (One of the first warning signs of an espionage attack.)