Wednesday, November 10, 2010

"Just throw in some scary words."

from a recent press release...
...is the world's leading provider of high attenuating radio frequency and infrared optically clear substrates for privacy and electronic eavesdropping protection i.e. RF flood attacks, "bugs", LASER attacks, thermal imaging, also known as Technical Surveillance Counter-Measures (TSCM). (more)

Dudes. Thermal imaging?!?!
1. Thermal imaging is not an electronic eavesdropping technique.
2. Thermal imaging is not even a visual privacy invading technique.

"What did you say your name was?"

CA - The former chief executive of the Sacramento area's largest independent real estate firm was arrested early Wednesday morning for secretly recording guests in his homes, says Sacramento County District Attorney Jan Scully... Investigators interviewed the three women, identified as Jane Doe #1, Jane Doe #2, and Jane Doe #3, who said they did not know or consent to the videotaping

Lyon, 54, was arrested by sheriff's deputies at his home in Carmichael and was booked into Sacramento County Jail. Jail records show Lyon was arrested on four felony counts of electronic eavesdropping on separate occasions, with bail set at $60,000.

After posting bail, the former CEO of Lyon Real Estate told reporters the charges are "all allegations." "I am intent on clearing my good name." (more)

When Suits Investigate

Pacific Gas and Electric announced that it placed an executive on paid suspension while it investigates his admitted efforts to surreptitiously infiltrate a community of activists. William Devereaux, senior director of PG&E's SmartMeter program, admitted to multiple news outlets that he used a fake name Thursday in an effort to join an online discussion group of SmartMeter opponents. (more)

Best Sites for Online Snooping

via Forbes.com...
A few simple tools can get you information once available only to private investigators and police.

In May Matthew Smith received a piece of junk e-mail from a marketer. The marketer chose the wrong guy to spam. 

Smith, a pseudonym, is a former hacker and now works as a network security engineer. He runs a blog called Attack Vector devoted to online security issues. He decided to use the marketer, named Steve, as his guinea pig to show how easy it is to track down information about someone based solely on an e-mail address, and documented how he did it to serve as a warning to others who may not understand the power of what's available to anyone looking to dig into your background. (more)

Tuesday, November 9, 2010

How Your Boss Knows Your XBox Habits

via windowsitpro.com
Q. I'm a boss who tricked my workers into adding me as Xbox Live friends. How can I spy on them when they're "working" from home to make sure they're not playing Xbox?
A. One of the great features of the Xbox and its online service is the integration with the xbox.com website. It lets you easily see all your Xbox friends. It can be abused by mean bosses to quickly, in table form, see the last time the friends were on XBOX and what they were doing. 

Just perform the following:
Go to www.xbox.com and select "Sign In" in the top right of the xbox.com site.
Sign in with the Live ID associated with your XBox Live ID.
• Click on your own profile.
• Select View All Friends under Friends.
You can see who's online, who's offline, when they were last online, and what everyone is or was doing. (more)

The Fine Line Between Listening and Eavesdropping

During the Middle Ages, eavesdropping was illegal in England, but overheard conversations could be used as evidence in court. Today, the internet, cell phones and reality TV make it difficult not to pry into the conversations and private lives of friends or strangers. In a new book, linguistics professor John Locke argues that eavesdropping is actually a good thing. Prying has helped humans stay away from danger, find food, identify mate mates, and assured us that we are not alone. (New Hampshire Public Radio audio report)

Monday, November 8, 2010

"If it wasn't the guards, it must be the cleaners."

Australia - A Tasmanian cleaner who stole State Government documents, and leaked them to the Opposition and the media, has been sentenced to 84 hours of community service... Outside court, Nigel John Jones maintained his innocence and said he will appeal against the conviction. (more)

Saturday, November 6, 2010

This Week in Spy News

Real Life
• The Georgian special services arrested 15 people today accused of spying for Russia. (more)

• The highest-ranking CIA officer ever convicted of espionage was expected to plead guilty to additional charges that he tried to collect money from old contacts in Russia while in prison, a newspaper reported Thursday. (more)

• Freed U.S. hiker Sarah Shourd says she doesn't know if she'll return to Iran to face espionage charges with her two companions still held in prison there. (more)

• Authorities in Norway have launched an investigation into whether the United States conducted illegal surveillance in the Nordic country, the Ministry of Justice told CNN Thursday. (more)

• Officials of the US embassy in Copenhagen may be illegally collecting data about Danish citizens, they find suspicious, the Politiken newspaper reports. (more)

Taiwan got another spy shock recently when they arrested two men who were spying for China. The shock part came from the fact that one of the men, Lo Chi Cheng was an army colonel. The other was an unnamed Taiwanese businessman who had business in China and spied on China. Then came another shock. The other guy was really a double agent, who had recruited the colonel, who obtained classified information that was then delivered to China. (more)

Northrop Grumman’s ginormous experimental spying blimp is progressing rapidly... The Army awarded Northrop a $517 million contract in June to develop a trio of unmanned, seven-story, football-field sized mega-blimps called Long Endurance Multi-Intelligence Vehicles. If successful, the blimp will stay in the air for up to three weeks at a time, using 2500 pounds’ worth of “sensors, antennas, data links and signals intelligence equipment” to capture still and video images of civilians and adversaries below and send the pictures to troops’ bases. (more)


Art Imitates Real Life
Though based on a true story with a well-known outcome, Doug Liman's "Fair Game" is as suspenseful as any fictional thriller -- and considerably more tragic. Based-in-truth thriller about CIA spy Valerie Plame. With Naomi Watts, Sean Penn. Director: Doug Liman (1:44). PG-13: Language. At area theaters. (more) (trailer)

• NBC is scrapping J.J. Abrams' spy series "Undercovers..." ...middling reviews and declining ratings made the show increasingly destined for the chopping block. Wednesday night's airing delivered only 5.8 million viewers. Three more episodes will air in the coming weeks. (more)

• Like Aaron Eckhart? Spy dramas? Then perhaps you'll like THE EXPATRIATE. Former Bat villain Aaron Eckhart (THE RUM DIARY, RABBIT HOLE) has been cast as an ex-CIA agent in the spy drama from German director Philipp Stölzl (NORTH FACE, BABY) and newcomer scribe A.E. Amel. xists, his coworkers are gone, and his assistant is really a trained operative out to kill him. Production begins next year Belgium and Montreal. (more)

Sprint Excludes Chinese Companies From Contract Over Security Fears

Sprint Nextel is excluding Chinese telecommunications-equipment makers Huawei Technologies and ZTE from a contract worth billions of dollars largely because of national security concerns in Washington. The Defense Department and some U.S. lawmakers have been increasingly concerned about the two companies’ ties to the Chinese government and military, and the security implications of letting their equipment into critical U.S. infrastructure. Some officials argue China’s military could use Huawei or ZTE equipment to disrupt or intercept American communications. (more)

Wednesday, November 3, 2010

Personal Spying - Drones On

Here at Kevin's Security Scrapbook I have been watching the development of drones for years. These are my two personal favorites: Do It Yourself Sky Spies - The Draganflyer and "MAV" The Scariest SiFi Movie You'll See this Year.

If you followed the Scrapbook, you already knew where this is going.  

Time for an official FutureWatch prediction... Private Investigators will start selling off all the old TSCM gadgets they bought which never turned a profit to invest in a drone. Although the applications will be limited (by practicality and law), drones will offer solutions to previously unsolvable problems. 

Early adopters will easily recoup their investments and turn a profit via rental of the drone for special assignments, and/or selling the photos/video at a premium price. In fact, having a drone should bring in previously unattainable assignments. 

P.S.
This is a window of opportunity. It may take up to ten years for new laws (and FAA regulations) protecting public safety and privacy to catch up.

...via The Wall Street Journal...
Personal drones aren't yet plying U.S. flyways. But an arms race is building among people looking to track celebrities, unfaithful lovers or even wildlife. Some organizations would like them for emergency operations in areas hit by natural disasters. Several efforts to develop personal drones are scheduled for completion in the next year.

"If the Israelis can use them to find terrorists, certainly a husband is going to be able to track a wife who goes out at 11 o'clock at night and follow her," said New York divorce lawyer Raoul Felder. (more)

The AR.Drone, an iPhone-controlled helicopter powered by four separate blades
Can't wait?
Check out what's available now!
A.R. Drone (specs) (video)
AERYON Labs (specs) (video)
And many more

SpyCam Tee Shirt

"Even Mr. Bond has to have an off day when all his fancy duds are at the $1.50 Dry Cleaners and he's down to his last pair of underpants. But just because his suit jackets are gone doesn't mean he can't hide fancy spy gadgets on his person. Before he drags out the t-shirts he wore while canvassing for decade-old political campaigns or his favorite band that broke up when he was in college, he goes for his old standby, the From Tokyo With Love Electronic Spy Camera Shirt.

It's so deliciously obvious. Centered in the artwork on the shirt is the man himself, holding a camera to his face. But not just a picture of a camera. Hidden behind the soft cotton exterior is a fully-functioning spy camera. That's right. Whatever your chest can see, the camera can see. A cable connects the camera to a small black box that fits discreetly in your pocket. Just reach in, press the button, and your shirt will capture the evidence before you." (more)

Tuesday, November 2, 2010

Open Season on Marital Bugging and Tapping in the United States Court of Appeals for the Fifth Circuit

A Texas court has ruled that a husband accused of monitoring his wife's computer through a keystroke logger did not violate federal wiretapping laws. 

Larry Bagley was sued in June by his wife Rhea Bagley, who accused him of surreptitiously placing audio recording devices in their house as well as a software keystroke logger. The Bagleys are in the process of divorcing.

The complaint in this civil case says that during the divorce proceedings, the husband revealed the existence of the surveillance tech and acknowledged that the "software recorded screenshots of activity on this computer." The husband replied in court documents that "in all conversations, the defendants' children were present and defendant was able to consent to recordation by way of vicarious consent."

U.S. District Judge Lee Rosenthal ruled on October 18 in favor of the husband, saying that the court was required to follow a Fifth Circuit decision saying that the federal wiretap law known as Title III does not apply to marital relationships.

Here are some excerpts from the court's opinion:
Whether Title III provides a remedy for interspousal wiretapping within the marital home is a question that has divided the federal courts of appeal. The Fourth, Sixth, Eighth, Tenth, and Eleventh Circuits have held that such wiretapping is actionable under Title III. The Second and Fifth Circuits have held that Title III does not apply to interspousal wiretaps. (more)

P.S. The United States Court of Appeals for the Fifth Circuit includes:

Industrial Espionage Case Expands

Silicon Valley is bracing itself for fireworks as a long-running intellectual property and industrial espionage dispute between two of the most powerful names in technology finally reaches court.

Oracle is suing its arch-rival SAP for exploiting what it says were illegal downloads of Oracle software code three years ago, and the case has now dragged in another technology titan, Hewlett-Packard, which hired the former SAP boss Leo Apotheker to be its chief executive a month ago. (more)

A few weeks ago I accused HP’s new CEO, Leo Apotheker, of overseeing an industrial espionage scheme centring on the repeated theft of massive amounts of Oracle’s software,” Mr Ellison said in a statement released this week. (more)

Book Banning Over Industrial Espionage Fears

Many of Germany's top companies are blocking access to Facebook and other social networking sites over fears of industrial espionage and other security concerns, according to a new report. Business weekly Wirtschaftswoche said that many companies on the Dax-30 blue-chip index saw an unacceptable risk posed by employees using such sites at work. (more) ...not to mention the financial drain of social notworking.

Monday, November 1, 2010

"Crito, we owe a rooster to Asclepius. Please, don't forget to pay the debt."

Greece is having a Patriot Act moment, drafting legislation that would break down privacy laws and significantly increase police power. But their catalyst is debt, not terrorism.

Draft legislation obtained by The Katimerini would create government agencies to regulate tax evasion, entitlement issues and use of public property. Police officers in these departments would have unprecedented power to eavesdrop on suspects' conversations and communications and to disguise their identity in pursuit of a suspect.

This would be a major change for a country known for strict privacy laws, according to The Katimerini. (more) (sing-a-long) (Socratic drink)

Are whack jobs bugging our Hollywood Actors?

Actor Randy Quaid (aka General George S. Merlin, "Bug Buster") and his wife, Evi... were in Canada seeking political asylum over their stated fears they would be "whacked'' if they returned to Hollywood... they fled to Canada to escape the so-called "star whackers" - a cult that is bugging their phones and hacking their computers.

"They're absolute businessmen. It's the mafia; it's organized crime," said Mrs. Quaid... The couple has said this "mafia" is behind eight celebrity, including Heath Ledger, deaths in the last 5 years. (more) (trailer)

Don't tell Mrs. Quaid. It will just upset her.

John McTiernan, director of the movie “Die Hard,” was sentenced to one year in prison for lying about his association with a private investigator, Anthony Pellicano, to illegally wiretap a movie producer. (more)

Hoist by a Voicemail Petard

Employees at a CBS affiliate in Anchorage left an accidental voicemail for an aide to GOP Senate candidate Joe Miller in which they discussed and laughed about the possibility of reporting on the appearance of sex offenders at a Miller rally. And they chatted about responding with a Twitter alert to “any sort of chaos whatsoever” including the candidate being “punched.”
 
Jerry Bever, general manager for KTVA, said in a statement that a call to Miller spokesman Randy DeSoto to discuss the candidate’s planned appearance on a newscast wasn’t disconnected after the conversation ended. The call took place during a KTVA staff meeting to plan coverage of that evening’s Miller rally in downtown Anchorage. (more)

Sunday, October 31, 2010

Hamas warns against buying cars imported from Israel

The Hamas government in the Gaza Strip is warning local politicians, government officials and faction leaders against buying cars imported from Israel for fear they may contain eavesdropping equipment or even remote-activated bombs planted by Israeli security agencies. (more)

Test your car...
If you own a late model General Motors car with OnStar, try this test. Tune your radio to 770 AM, turn up the volume and tap on the OnStar microphone near the rear view mirror. Do you hear yourself coming through the radio? No? Maybe they only bugged my car. ~Kevin

Google Bans SMS Spy App Tap

A controversial mobile phone application, which helps a cell phone user read the text messages of others secretly, has been removed from sale by Internet search engine Google.
Google said the application, called SMS Secret Replicator, violated its terms.

Once installed on a mobile phone, the Android phone application automatically creates carbon copies of incoming text messages and forwards them to a selected number - prompting fears it could be used by jealous lovers and even work colleagues to snoop on private messages. (more) (video)
Google may have dropped it from their marketplace, but doesn't mean this $9.99 app is not available elsewhere. (more
Coming soon, a way you can detect if your phone is infected with spyware. (more)

Thursday, October 28, 2010

Security Alert: iCracked

A security flaw in the iPhone allows strangers to bypass the handset’s lock screen with a few button presses.

...the quick method to circumvent an iPhone’s passcode-protected lock screen:
• tap the “Emergency Call” button,
• then enter three pound signs,
• hit the green Call button
• and immediately press the Lock button.
That simple procedure gives a snoop full access to the Phone app on the iPhone, which contains the address book, voicemail and call history. (more)

Apple:
“We’re aware of this issue and we will deliver a fix to customers as part of the iOS 4.2 software update in November." 

"Why is this important?”
Not having password protection on a smart phone leaves you open to information theft, jail-breaking and injection of spyware.

"Why does this trick exist?"
• It is a software loophole.
• It is a programmer's shortcut they forgot to patch.
• It is a programmer's Easter egg.
• It is a law enforcement backdoor never meant to become public knowledge.
Interesting question. You decide.

FutureWatch: The ability to create passwords longer than four measly digits... which is only a pool of only 10,000 passwords. ~Kevin

Wednesday, October 27, 2010

Firesheep Makes Stealing Your Wi-Fi Secrets Easy

via Steven J. Vaughan-Nichols
From all the yammering, you’d actually think there was something new about Firesheep, the Firefox extension that lets you grab login IDs, passwords, and other important information. What a joke. I, and any hacker or network administrator worth his salt, have been able to do this kind of stuff for years.

The only thing “new” about Firesheep is that how it easy makes it to do. I’m unimpressed. Anyone who was serious about grabbing your personal information has already been doing it for years. Trust me, if someone really wanted your data and you’ve been using open Wi-Fi networks, they already grabbed it.

No, the real worry isn’t about some jerk grabbing your Twitter password in a coffee house. The real worry has always been that your office Wi-Fi is easy to compromise and then someone can use a packet-sniffer to get something that really matters like your your Accounts Payable password. (more)

Need a Wi-Fi Security Audit and Compliance Inspection? (you do) Please call me. (more)

11/4/10 - UPDATE:  IBM researchers are proposing an approach to WiFi security they call Secure Open Wireless in light of the release of the Firesheep tool. (more)

11/5/10 - UPDATE: 10 Ways to Protect Yourself from Firesheep Attacks (more)

Our Spy Coin Receives the Ultimate Compliment

I give spy coins to my clients.
It is a reminder that information loss is mostly a people problem, not an electronic problem. Filing cabinets of information can walk out the door in pocket change!


Careless people often blab information, forget to secure it, toss it in the garbage can, or otherwise lose it—hundreds of laptops are lost every day. People also steal it when they become greedy, spiteful, conned, blackmailed, or caught up in a “cause.”

Investigating an information loss, however, begins with an electronic surveillance detection audit.

Here’s why...
• Serious espionage will include electronic surveillance.
• The possibility must be resolved before accusing people.
• Bugging is the easiest spy technique to discover.
• Electronic surveillance evidence helps prove your case.

Best advice...
Conduct audits on a regular basis. Uncover signs of espionage during the intelligence collection stage, before your information can be abused. (more)

A client reports back...
"I think of all of the trinket type things we’ve accumulated over the years, the spy coin is *by far* the coolest, and is made even cooler with the background story provided on the chip!!

I took mine with me to the FBI building today and had the guards there X-ray it along-side of a normal quarter to see if its secret contents could be seen on an “airport quality” X ray machine.  They printed out a copy of the scan image, I’ve attached it to this email for your amusement as well. 

Several agents commented on how well it was made, and how hard it would be to detect such a thing."

Tuesday, October 26, 2010

Sunday, October 24, 2010

Why Wiretap When You Can buy the Phone Company?

A proposed deal between Sprint Nextel, Cricket and two Chinese telecom companies has raised a few eyebrows, with some U.S. senators concerned about security.

The Hill reports a bipartisan group of legislators wrote a letter seeking reassurance about the deal from Federal Communications Commission Chairman Julius Genachowski.

The letter, signed by Susan Collins (R-Maine), Jon Kyl (R-Ariz.) and Joe Lieberman (I-Conn.), contends the two Chinese companies, ZTE Corporation and Huawei, have ties to the Chinese military and are financed by the Chinese government.

The letter raised the specter of the Chinese government or military using the companies to spy on American communications. (more)

How to Solve a TSCM vs, CCTV Mystery

Chicago, IL - It may sound like cloak and dagger fiction, but FOX Chicago News has learned something very odd happened Wednesday night on the fifth floor of the Cook County building. The latest bizarre twist in the ongoing corruption scandal in Stroger's office involves high-tech surveillance experts caught leaving the office of Cook County Board President's office.

A deputy sheriff patrolling the building stopped a group of five men leaving Todd Stroger's office around 9:30 p.m. Wednesday.

One of the men identified himself as the county's Homeland Security Director David Ramos. The other four men were asked to provide identification.

They did, and at least three of them have experience in surveillance and counter-surveillance... (One of the men) would not comment on what they were doing in Stroger's office, but there is rampant speculation at the County building they were sweeping the offices for electronic bugs.

Cook County Inspector General Pat Blanchard said his staff visited Stroger's office Thursday afternoon and removed some evidence related to the ongoing investigation into sham contracts...
 
David Ramos, the county's Homeland Security Director who escorted the men into the office, said through a spokesman they were simply scouting locations for placement of security cameras in the President's office. (more)

Solution: Ask the Deputy if the "visitors" were leaving empty-handed. A sweep requires several cases of instrumentation. Conducting a CCTV design layout does not.

Friday, October 22, 2010

CSI - Who Poo'ed

What can property managers do when dog owners don’t pick up after their dogs? Under normal circumstances, not much, because there is no way of knowing who the violators might be. But now, with a new program called PooPrints that uses DNA to identify the dog in question, managers can catch the culprit (dog owner) in a matter of days.

PooPrints is a dog DNA identification program from BioPet Vet Lab built on a scientific foundation, providing communities with a means to enforce community regulations for pet waste clean-up. “The problem of pet owners not picking up after their pets is tearing apart communities,” says BioPet Vet Lab CEO Tom Boyd. Consumer Reports lists ‘dog poop’ as one of the nation’s top ten personal gripes. So BioPet Vet Lab used its research in animal DNA identification systems to help provide community leaders with a tool to bring peace back to the neighborhood. (more)

Thursday, October 21, 2010

Ex-Chief Legal Counsel Pleads Guilty

OH - The former state lawyer behind an electronic eavesdropping scheme agreed yesterday to plead guilty to three misdemeanor charges and cooperate in other investigations, including one into an aborted operation at the Governor's Residence.

Joshua Engel, the former chief legal counsel for the Ohio Department of Public Safety, faces three misdemeanor counts of intercepting and disclosing sensitive, confidential information from investigations by the state inspector general, the Ohio Ethics Commission and federal authorities. (more)

Wednesday, October 20, 2010

Weird Wiretap Story of the Week

How does watching a football game land you in court facing wiretapping charges?
You're a former police detective. Your accuser is a former judge.
Care to judge this one yourself? 
If you have the time... (more)
P.S. Wiretapping is a McGuffin.

In the Land of the Lords, no tenant skips

Australia - Tenants' groups say they are outraged by a service that enables real estate agents to find out when a tenant is considering moving house. The service is offered by the database company TICA and involves the company sending an email alert to an agent if a tenant submits an application for another property. (more)

Tuesday, October 19, 2010

U.S. Pushes to Ease Technical Obstacles to Wiretapping

Law enforcement and counterterrorism officials, citing lapses in compliance with surveillance orders, are pushing to overhaul a federal law that requires phone and broadband carriers to ensure that their networks can be wiretapped, federal officials say.

The officials say tougher legislation is needed because some telecommunications companies in recent years have begun new services and made system upgrades that create technical obstacles to surveillance. They want to increase legal incentives and penalties aimed at pushing carriers like Verizon, AT&T, and Comcast to ensure that any network changes will not disrupt their ability to conduct wiretaps. (more) (sing-a-long)

Monday, October 18, 2010

Business Espionage - The Feds are Warning You

via The New York Times...
Huang Kexue, federal authorities say, is a new kind of spy.

For five years, Mr. Huang was a scientist at a Dow Chemical lab in Indiana, studying ways to improve insecticides. But before he was fired in 2008, Mr. Huang began sharing Dow’s secrets with Chinese researchers, authorities say, then obtained grants from a state-run foundation in China with the goal of starting a rival business there...

Law enforcement officials say the kind of spying Mr. Huang is accused of represents a new front in the battle for a global economic edge. As China and other countries broaden their efforts to obtain Western technology, American industries beyond the traditional military and high-tech targets risk having valuable secrets exposed by their own employees, court records show.

Rather than relying on dead drops and secret directions from government handlers, the new trade in business secrets seems much more opportunistic, federal prosecutors say, and occurs in loose, underground markets throughout the world.

Prosecutors say it is difficult to prove links to a foreign government, but intelligence officials say China, Russia and Iran are among the countries pushing hardest to obtain the latest technologies.

“In the new global economy, our businesses are increasingly targets for theft,” said Lanny A. Breuer, the assistant attorney general in charge of the Justice Department’s criminal division. “In order to stay a leader in innovation, we’ve got to protect these trade secrets.” (more)

If you still don't have a counterespionage strategy, or your current one isn't working, call me. ~ Kevin

WSJ Finds Sheep Are Easy to Track

The down side of social not-working...
Many of the most popular applications, or "apps," on the social-networking site Facebook Inc. have been transmitting identifying information—in effect, providing access to people's names and, in some cases, their friends' names—to dozens of advertising and Internet tracking companies, a Wall Street Journal investigation has found.

The issue affects tens of millions of Facebook app users, including people who set their profiles to Facebook's strictest privacy settings. (more)

Sunday, October 17, 2010

Turk Taps Top 70,000 Drops

More than 70,000 telephones in Turkey are currently officially under electronic surveillance, daily Radikal reported Sunday.

Radikal said it was the first media institution to have visited the Telecommunications Directorate, or TÄ°B, in Ankara, the institution responsible for installing and maintaining telephone surveillance by court order.

Exactly 71,538 telephones have been tapped by TÄ°B through court orders, among which 65 percent have ostensibly been tapped to gather intelligence on terrorism and organized crime, Radikal reported. 

Wiretaps for the purpose of gathering intelligence can be requested by intelligence institutions to prevent crimes from being committed.

The remaining 35 percent of surveillance is being carried out because of strong suspicions that a crime has been committed and no other way to obtain evidence. (more)

RED - A spies-in-action comedy

A spies-in-action comedy (based on a graphic novel), populated by terrific actors and blessed with a consistently funny and occasionally hilarious script, however implausible. The acronym RED stands for “Retired, Extremely Dangerous” and refers to Frank Moses (Bruce Willis).

A retired CIA “black ops” agent, Frank is so bored in his suburban home that he keeps calling a Social Security clerk, Sarah (Mary-Louise Parker) in Kansas City, pretending his check didn’t come, just to chat. When masked Ninja-like assassins break into his home, Frank demolishes them, then heads to Kansas City to protect Sarah, knowing their calls have been tapped. (more) (trailer)

Local Politics - Wiretapping II

The Allegheny County Jail Oversight Board has no plans to investigate how fired Capt. Thomas R. Leicht Jr. kept his job for years despite failed internal investigations, allegations of bid rigging and a controversial wiretapping program, the board's chair said...

He also used county equipment to wiretap jail telephones from his home and sent recordings of at least six attorney-client calls to prosecutors, according to the American Civil Liberties Union. (more)

Local Politics - Wiretapping I

Editorial from local paper...
NC - Even before anyone knew for sure what was on the digital flash drive that mysteriously appeared in Hope Mills Mayor Eddie Dees' mailbox, town residents had plenty of reason for concern about their leaders.

The "thumb drive" contained recordings of conversations between Town Manager Randy Beeman and Police Chief Robert Hassell. They were all or part of five calls recorded between Feb. 25 and May 17...

It appears that the wiretap originated in the town's Police Department. The mayor says the drive contains calls made into and out of the department. If that's true, it also raises serious questions about the department and its internal security. It fairly screams for a full-blown criminal investigation.

But instead, the commissioners have chosen to wait for the town attorney to investigate, which he's been doing for months now. (more)

Friday, October 15, 2010

iLied, iSnapped.

via Cult of Mac...
"There’s no other way of saying this: Camera Camouflage is sneaky. It’s a camera app that goes out of its way to avoid looking like a camera. It disguises itself as an incoming phone call. You can even instruct it to activate your phone’s ringtone, so you can pretend to take the call and hold the phone to your ear. At which point, things get even sneakier. Camera Camouflage is activated by your voice. When you start speaking, it takes a photo. To onlookers, you’re just answering a phone call. You can keep talking, and keep snapping, for as long as you want." (more)

Thursday, October 14, 2010

Do You Know How to Protect Your Cell Phone Calls?

...So, the problem of cell phone interception is real, growing and unlikely to be eliminated in the foreseeable future.

For an organization, knowing that phone calls have been intercepted at all is difficult. There is rarely a test that can be done, other than looking at the consequences of a lost deal or secret information in the public domain. In fact, in 2010, the Ponemon Institute found that 80 percent of CIOs admitted they would not find out directly if they had been intercepted.

The problem shows a wide geographical variation, both in the number of instances and in the public perception of risk. 

In the United States and mainland Europe, the perception of risk is relatively low. However, travel to Latin America or some parts of Asia, and the perception of an issue has reached the consumer with advertisements on mainstream television for protection equipment. 

Yet few executives traveling around the world have taken special measures to secure their cell phone conversations.

Research from ABI shows that 79 percent of companies' cell phones were routinely used to discuss information that, if intercepted, would lead to material loss to the business. Yet less than one in five had in place adequate measures to address this risk. (more)

New book coming soon...  
Stay tuned for details.

PA Spycam Suit Settled - Lawyers Win

PA - A suburban Pennsylvania school district accused of spying on students using school-issued laptops has agreed to pay $610,000 to settle litigation stemming from its controversial practice.

Under the proposed settlement, the Lower Merion School District will pay $185,000 to two high school students who had sued the district earlier this year for allegedly snooping on them. The remaining $425,000 will go to attorneys fees. (more)

Wednesday, October 13, 2010

Business Espionage - Conference Call Eavesdropping

State Republican Party staff members eavesdropped on a conference call organized by party activists to strategize ways to convince GOP candidates adopt more of the party platform, according to several people who participated in the meeting.

S.C. GOP 1st Vice Chairman Patrick Haddon organized the call with party activists including Randy Page, Chad Connelly and Justin Evans. Organizers said the call was intended as brainstorming session for fall campaigns, and not to discuss party leadership or direction.

But when the call ended, the list of participants contained an unknown number. Organizers called the number and reached a phone within Republican Party offices. State party officials declined to discuss the conference call.

No comment,” S.C. GOP executive director Joel Sawyer said. “I’m not confirming or denying anything.” (more)

To all Murray Associates clients, please re-read the Conference Call section of your reports again. This problem is real and surfaces in the news quite often. Thank you, Kevin

Tuesday, October 12, 2010

A New Suite of Phone Espionage Software

Phone Creeper V0.9 (BETA) for Windows Mobile Cell Phones - "This is a phone espionage suite. It can be silently installed by just inserting an SD card with the files below on it. The program does not show up under installed programs or running programs and allows for a useful array or features. Phones running this software can be remotely controlled by SMS text messages. All commands will be silently received and deleted immediately and results will be issued back to sender. Pre-configured settings can be added to the installer to have your own default password and phone number to receive live updates. By default, this program will silently reinstall itself even after a hard reset, if the memory card with these files is still in the device." (more)

P.S. There is even an Anti-Creeper app. Both are FREE but donations are solicited.

"Used car... or 'copter, Mr. Bond?"

Three James Bond sports cars – and one helicopter – will be auctioned Oct. 27 at RM Auctions’ Automobiles of London sale at the Battersea Evolution arena.

The highlight of the lot is a 1964 Aston Martin DB5 driven by Sean Connery in “Goldfinger”. There’s also the green 1998 Jaguar XKR driven by the villain ‘Zao’ in “Die Another Day” and the 1969 Lamborghini Islero GTS driven by Sir Roger Moore in “The Man Who Haunted Himself”.

The helicopter at stake is a 1960 Hiller UH -12 E4, which was flown by actress Honor Blackman in her role as Pussy Galore. (Its first time on film was for a 1963 movie called “The VIPs”, which starred Elizabeth Taylor and Richard Burton.) RM says the chopper will likely go for nearly £400,000. (moore, Roger Moore)

Time to Recycle the Quote of the Century

“The growing use of the electric automobile, with its many advantages of simplicity, ease of operation and noiselessness, has resulted in a demand for some means of conveniently charging the batteries.” — GE Bulletin No. 4772, September 1910.

Monday, October 11, 2010

SpyCam Story #585 - "Purely Platonic, your Honor."

GA - A man was arrested Friday for using his cell phone to take video of a woman in a dressing room.
According to a report released Saturday by the Athens-Clarke County Police Department, Vicente Bautista, 26 of Greensboro, Ga. was in the dressing area of the Plato's Closet located at 196 Alps Road shortly before noon. Police said he put his cell phone under the divider to tape a 36-year-old woman as she tried on clothes. (more)

Business Espionage - Bratz v. Barbie

Mattel Inc will answer accusations it spied on rival toymakers by infiltrating their private showrooms around the globe, after a U.S. court denied its motion to dismiss claims filed by rival MGA.

In an escalation of a long-running battle over MGA's popular "Bratz" dolls, MGA Entertainment Inc accused Mattel of gaining entry to toy fairs with false credentials to steal trade secrets. It says Mattel then concealed evidence about these activities, according to court filings.

MGA has accused Mattel employees of gaining access to private showrooms of toy makers -- including Hasbro Inc, Lego and Sony Corp -- armed with fake business cards and spy cameras, to steal price lists and other sensitive information. (more)

Legal Phone Taps Vulnerable to DOS Attacks

Researchers at the University of Pennsylvania say they've discovered a way to circumvent the networking technology used by law enforcement to tap phone lines in the U.S.

The flaws they've found "represent a serious threat to the accuracy and completeness of wiretap records used for both criminal investigation and as evidence in trial," the researchers say in their paper, set to be presented Thursday at a computer security conference in Chicago.

Following up on earlier work on evading analog wiretap devices called loop extenders, the Penn researchers took a deep look at the newer technical standards used to enable wiretapping on telecommunication switches. They found that while these newer devices probably don't suffer from many of the bugs they'd found in the loop extender world, they do introduce new flaws. In fact, wiretaps could probably be rendered useless if the connection between the switches and law enforcement are overwhelmed with useless data, something known as a denial of service (DOS) attack. (more)

Business Espionage - This Zeus is no Cretan

The Zeus banking Trojan could be a useful tool in corporate espionage...

Zeus typically steals online banking credentials and then uses that information to move money out of internet accounts. In the past year, however, Gary Warner, director of research in computer forensics with the University of Alabama, who has been closely monitoring the various criminal groups that use Zeus, has seen some hackers also try to figure out what companies their victims work for...

"They want to know where you work," he said. "Your computer may be worth exploring more deeply because it may provide a gateway to the organisation."

That's worrying because Zeus could be a very powerful tool for stealing corporate secrets. It lets the criminals remotely control their victims' computers, scanning files and logging passwords and keystrokes. With Zeus, hackers can even tunnel through their victim's computer to break into corporate systems. (more)

Saturday, October 9, 2010

Espionage Life in the Fast lane

Luxury car manufacturer Porsche has banned employees from using Internet sites such as Facebook, Google Mail or Ebay during office hours, for fear of industrial spying, German media reported on Saturday. Corporate security chief Rainer Benne told business weekly Wirtschaftswoche that the company feared information could be leaked via social networking site Facebook in particular.

The magazine reported that foreign intelligence agencies systematically used Facebook to contact company insiders and win their trust in order to obtain information.

Roughly a quarter of Porsche's 13,000 global employees use Facebook and other social networking sites, Wirtschaftswoche reported. (more)

Espionage Research Institute - Day 2

Attending and presenting at the annual ERI meeting means telling clients we will be unavailable for a few days. They understand once I tell them what goes on behind these closed doors. The information I gather directly benefits them. If you think any of this can help you, give me a call and I will brief you in greater detail.

This is what I heard today...

• Need to track down Cellular, Wi-Fi or Bluetooth signals?
Berkerley Varitronics RF Detection Products probably has just the little handheld instrument you need. Each instrument, with its own weird name (Yellowjacket, Swarm, Mantis, WatchHound, etc.) handles a very specific chore. You only buy what you need. That keeps the costs down. Need a special enclosure, like hiding their contraband cell phone detector in a water bottle, or secreting an antenna in a pocket pen? No problem. Very cool Jersey engineering dudes.

The rest of the day, ERI members taught what they know... 

• Protecting Your Computer Network - Dr. Gordon Mitchell
• Laser Eavesdropping Techniques - Dr. Gordon Mitchell
• Alternative Power Sources for the Eavesdropper - Mark Clayton
• Android App Vulnerabilities - Charles Patterson
• 4G LTE Cellular Network - Russ VasDias
• Covert Store and Burst Digital Stereo Bug - Vicente Garcia
• Display of most of the TSCM instrumentation designed and built by Glenn Whidden (with commentary by Glenn). Instrumentation provided by J.D. LeaSure.
• Discussions about topics for next year's meetings.

The discussions continue tomorrow.

Thank you to our client family for adjusting your schedules to allow us time to attend this important meeting in Washington, DC. Tomorrow we are back on the road again completing visits this month to Virginia, Maryland, Ohio, Philadelphia, Anchorage, Boston, New York City, New Jersey and Illinois. ~ Kevin D. Murray
Kevin's Security Scrapbook is prepared fresh almost daily for the clients and friends of Murray Associates - Eavesdropping Detection and Counterespionage Consulting for Business and Government