Wednesday, December 31, 2008

USB Hidden Flash Drive Watch

ThinkGeek

Since you are probably the clever type, we suspect you could easily find many places to hide a small USB flash drive. This watch features an ample 4GB capacity USB flash drive that slips neatly into the watch case. Simply remove, add data and then re-insert and you're ready to conduct secret missions to building B on the other side of campus.

This watch has a plastic case covered by stainless steel mask with brushed silver finish and convex mineral glass with shiny raised index. The USB flash drive fits flush with the watch case – ready to hold your data safe and secure. You may even forget it's there until you're ready to use it.


Note: Keep an eye out for these to start showing up around the office!

Monday, December 29, 2008

Industrial Espionage escalates

PublicTechnology

Sixty percent of office workers faced with redundancy or the sack admit they will take valuable data with them, if they could get away with it! 40% are downloading sensitive company secrets right now under their bosses nose in anticipation that they could lose their job.

That’s the findings of a survey by IT security experts Cyber-Ark from research they carried out into “The recession and its effects on work ethics” amongst 250 office workers in London’s busy Canary Wharf.

WORKERS SCHEMING BEHIND THEIR BOSSES BACKS
40% of workers who admit to already downloading competitive corporate data will use it as a negotiating tool to secure their next post as they know the information will be very useful to future employers.

Top of the list of desirable information that is currently being extracted from employers is the customer and contact databases, with plans and proposals, product information, and access / password codes all proving popular choices. HR records and legal documents were the least most favored data that employees were interested in taking.

Redundancy is a sore word and rumors that they were looming would send 47% of workers scurrying about prepared to do anything to try and obtain the redundancy list. Half said they’d try using their own IT access rights to snoop around the network and, if this failed, they’d consider bribing a ‘mate’ in the IT department to do it for them or bribe their friends in HR.

More...



Sunday, December 28, 2008

Tangled U.S. Objectives Bring Down Spy Firm

Washington Post

After a federal jury in New York swiftly convicted a major Afghan heroin trafficker and Taliban supporter named Haji Bashir Noorzai, the government promptly issued the usual celebratory news release thanking the men and women of the DEA and FBI for their "countless sacrifices" in making the case.

Left out was any credit to the party most responsible for the government's victory: an unusual three-man private intelligence firm called Rosetta Research and Consulting.

At the instigation of the Drug Enforcement Administration, Rosetta agents lured Noorzai to America and delivered him right into the feds' hands. He spent 11 days in an Embassy Suites Hotel in Manhattan in 2005, enjoying room service and considering himself a guest of the U.S. government -- until he was arrested. He was imprisoned for three years awaiting his trial, which concluded in September. He faces up to life in prison when he is sentenced in January.

Noorzai's capture should have been Rosetta's finest hour. Instead, it led to the company's downfall. A close examination of the case reveals how a spy firm trafficking in sensitive intelligence for profit got sandwiched between conflicting government goals: Noorzai, one of the company's best sources, was considered an asset by the intelligence side of the government, even as the law enforcement side considered him a criminal.

More...


Wednesday, December 24, 2008

Cyber attacks get worse

FierceCIO

Cisco's Annual Security Report found that the overall number of disclosed vulnerabilities grew by 11.5 percent this year, compared to 2007. And if that wasn't bad enough, vulnerabilities in virtualization technology nearly tripled from 35 to 103 year over year. The annual report found that attacks are becoming increasingly blended, cross-vector and targeted.

Cisco said its researchers saw a 90 percent growth during 2008 in threats originating from legitimate domains, nearly double what was seen in 2007. The Cisco report also said spam accounted for nearly 200 billion messages each day, approximately 90 percent of worldwide email.
Despite some signs of progress, this is no time to let your guard down. The Cisco report said to keep on the lookout for the following:
  • Insider threats
  • Data loss
  • Mobility, remote working and new tools as risk factors
More..

Tuesday, December 23, 2008

The Pulse Smartpen

Livescribe

The Pulse Smartpen is a computer within a pen that captures handwriting and simultaneously records audio and synchronizes it to the writing. Consumers tap on their notes to replay what was recorded from the exact moment they were writing. With pre-printed controls at the bottom of the dot paper notebooks, they can fast forward, rewind, jump ahead, pause or even speed up or slow down the audio recordings to easily access information. All of this information, including the audio, can then be uploaded into their computers to save, search for keywords or share with friends, colleagues and classmates.

The 1GB model provides storage for over 100 hours of recorded audio. The 2GB model doubles the storage capacity and provides more flexibility for downloading future applications.

More...

Note: Be on the lookout when the Smartpen shows up at the next business meeting...

Saturday, December 20, 2008

Eavesdropping Husband accused of setting up $5m insider trading ring

mt

A broker allegedly fuelled an insider trading ring by secretly spying on his own wife's work calls...

Matthew Devlin, an ex-Lehman broker now at Barclays Wealth, has been accused by the US SEC of orchestrating a trading ring by passing on confidential information gleaned from his wife, a senior exec at PR agency Brunswick. Devlin allegedly spent four years listening in to his wife’s work calls and checking out her schedule to work out when deals were about to happen, then leaked the information to various friends of his so they could buy and sell shares. In return for these illegal tip-offs, his grateful chums showered him with expensive gifts. Not exactly the kind of tale that will rehabilitate the reputation of Wall Street’s finest with the general populace…

She was universally referred to as ‘the golden goose’, even by her own husband.

More...

Note: Eavesdropping precautions are available!....visit ComSec to learn more.

Thursday, December 18, 2008

Russia says it uncovered nearly 150 spies in 2008


Kyiv Post MOSCOW, Dec 18 (Reuters) - Russian counter-intelligence unmasked nearly 150 spies in 2008, including a network operating on behalf of ex-Soviet Georgia, the head of the FSB Federal Security Service was quoted as saying on Thursday.

"Activities of 48 staff officers of foreign intelligence services have been stopped, as well as actions of 101 local agents of foreign special services," Alexander Bortnikov told an annual meeting with the Russian press.

He said six foreign staff officers and three agents had been "caught red-handed", and nine foreigners accused of spying had been expelled.

The FSB, a target of public criticism in 1990s, has seen a resurgence under ex-President Vladimir Putin, an ex-KGB spy whose two terms as Kremlin chief ended this year.

Putin and top FSB officials have often said that the West, suspcicious of Russia's revived ambitions, has stepped up spying activities in the country. Western officials counter that Russia is itself conducting aggressive espionage abroad.

Does anyone else remember the Cold War?

More...


iPhone Spy Software Hits the Market


Wall Street Journal

LITCHFIELD PARK, Ariz., Dec 17, 2008 /PRNewswire via COMTEX/ -- Retina-X Studios, LLC, announced today the immediate availability of Mobile Spy for the Apple iPhone. Using this groundbreaking iPhone technology, users can silently monitor incoming and outgoing text messages (SMS) and call information of children or employees -- even if activity logs are erased. Mobile Spy had already been available for Windows Mobile and Symbian OS smartphones. The new version for the iPhone is now on the market.
Mobile Spy runs in total stealth mode and no mentions of the program are shown inside the iPhone. After the software is set up on the phone, it silently records the entire text of all SMS text messages along with the associated phone number. The software also records inbound and outbound call information with duration of the call. Immediately after activities are logged, they are silently uploaded to the user's private online account. Accounts can be checked online from any web browser without needing further access to the phone.

More...

Tuesday, December 16, 2008

FBI taps cell phone mic as eavesdropping tool

cnet
The FBI appears to have begun using a novel form of electronic surveillance in criminal investigations: remotely activating a mobile phone's microphone and using it to eavesdrop on nearby conversations.

The technique is called a "roving bug," and was approved by top U.S. Department of Justice officials for use against members of a New York organized crime family who were wary of conventional surveillance techniques such as tailing a suspect or wiretapping him.

Nextel cell phones owned by two alleged mobsters, John Ardito and his attorney Peter Peluso, were used by the FBI to listen in on nearby conversations. The FBI views Ardito as one of the most powerful men in the Genovese family, a major part of the national Mafia.

The surveillance technique came to light in an opinion published this week by U.S. District Judge Lewis Kaplan. He ruled that the "roving bug" was legal because federal wiretapping law is broad enough to permit eavesdropping even of conversations that take place near a suspect's cell phone.

Kaplan's opinion said that the eavesdropping technique "functioned whether the phone was powered on or off." Some handsets can't be fully powered down without removing the battery; for instance, some Nokia models will wake up when turned off if an alarm is set.

The U.S. Commerce Department's security office warns that "a cellular telephone can be turned into a microphone and transmitter for the purpose of listening to conversations in the vicinity of the phone." An article in the Financial Times last year said mobile providers can "remotely install a piece of software on to any handset, without the owner's knowledge, which will activate the microphone even when its owner is not making a call.

More...

p.s., "If a phone has in fact been modified to act as a bug, the only way to counteract that is to either have a bugsweeper follow you around 24-7, which is not practical, or to peel the battery off the phone," Atkinson said. Security-conscious corporate executives routinely remove the batteries from their cell phones, he added.


New range of Nokia spy phones


Cool Gadgets

Just be a bit wary if your worst nemesis (or a friend) hands you a shiny new Nokia - it might mean whatever conversations you hold can be eavesdropped upon simply by dialing a secret code.

The selected phones are able to do the following without the user being any wiser ;-

  • Alert you when the phone is switched on, via SMS, so that you can see the number in the phone no matter how often it is changed.
  • Alert you when ever a phone call is made or received by the phone, via SMS, and will also show the number of other party.
  • Send you a copy of any text message sent or received by the phone, via SMS as well as the other persons number.
  • If you dial the phone from a pre-defined number it will open the microphone, without the holder knowing, so that you can hear room conversations, from anywhere in the world.
  • If you dial the phone from a pre-defined number when it is being used for a phone call you will actually intercept both sides of that conversation and be able to hear the everything that is being said.
  • You can remotely change the pre-defined number as much as you like, by a discreet SMS.
  • You can turn each function on and off as much as you like, by a discreet SMS.
  • There is no log of your calls or the copy SMS’s to your phone on the spy phone.
Note: Of course I'm sure Anthony Pellicano wouldn't mind sharing his Jail cell with you!

Be careful out there...

Monday, December 15, 2008

AT&T, T-Mobile can’t claim hack proof phones

Fudzilla

Permanent injunctions filed and agreed on

Both AT&T Inc. and T-Mobile cellphone providers have agreed to permanent injunctions against their earlier advertising claims that their voice mail systems were safe from sabotage. Both cell phone providers falsely advertised the security of their systems, according to the Los Angeles District Attorney’s Office.

During an investigation, “cell phones purchased by undercover investigators were easily hacked into, enabling the voice mail to be changed at will. Hacking into voice mail allowed messages to be changed or erased. Important information could be removed from the voice mail and phony information could be inserted,” said the District Attorney. “Imagine the havoc that could result.”

More...

HD Spycam Truly Crushes Employee Morale

Wired

The PR company's email begins thus: "You've never seen a camera like this." And it's true. The Digital Window from Scallop Imaging is a rather neat mix of hack and paranoia, a device cobbled together from five cellphone camera lenses, an Ethernet powered box and software which stitches the whole lot together for a seven mega pixel, 15 frames per second, 180º view.

That, for the number-hungry, is a whopping 100 mega pixels per second over 10/100 Ethernet, enough to fill a terabyte hard drive in, well, pretty fast.

To further increase employee paranoia, you'll never know when the camera is looking at you. Because of the 180º view and high-definition, a digital zoom combined with digital pan mean the the cameras never move when looking around.

More...

Saturday, December 13, 2008

The FBI's History of Wiretapping

Washington Post
One of the more baffling questions to come out of the corruption case involving Illinois Gov. Rod Blagojevich is why the two-term governor openly talked about "pay-to-play" schemes in the first place. Shouldn't he have known better? Wiretapping phones is a time-honored FBI tradition.

Wiretap court orders spiked during the Reagan and Clinton administrations and government officials, cabinet members and politicians from both parties, along with the occasional gangster or two, have been caught in the process. Wiretaps in criminal cases, so-called Title III wiretaps, jumped 20 percent in 2007 from the year before, with 457 federal and 1751 state taps being approved.

The FBI broke into civil rights leader Martin Luther King Jr.'s home and office and installed room bugs in an attempt to find evidence King was associating with communists. They didn't uncover anything but did overhear a "sexual encounter" involving King at a party at the Willard Hotel in Washington and another incident in which King told an "off-color joke" about the recently-assassinated President John F. Kennedy.

A video of Rep. John Murtha (D-Pa.) caught on tape by an undercover FBI agent during the Abscam corruption sting.

More here...


Thursday, December 11, 2008

Ineffective Law Enforcement, Bad Economy Fueling Cybercrime

PC World

Cybercriminals operating worldwide are benefitting from ineffective law enforcement and a growing economic recession that could make jittery people more susceptible to cybercrime scams.

So concludes security firm McAfee in its new report, "Virtual Criminology Report--Cybercrime vs. Cyberlaw." published Tuesday. The report pulls together the opinions of about two dozen legal experts, academic researchers and security-response professionals working as far afield as Britain, continental Europe, the Baltic countries, Brazil, India, Japan, Australia, New Zealand and North America.

"There have been a few cases where cybercriminals have been promptly arrested, but they're usually responsible for the small attacks," says Paulo Lima, a Brazilian lawyer specializing in computer-related crime. "Those responsible for the large operations have never been arrested. The public sector has usually acted in a mitigating manner, attacking the symptom and not the illness -- there is an antiquated system and a completely unprepared law enforcement body."

More...

Note: What is the integrity of your company's security posture against corporate, economic and industrial electronic espionage threats?

What is the potential effect on your business if sensitive information (or trade secrets) is intercepted by an eavesdropper? Contact ComSec

Tuesday, December 9, 2008

Illinois Governor "Bugged" Arrested by Fed's


CHICAGO — Gov. Rod R. Blagojevich of Illinois was arrested by federal authorities on Tuesday morning on corruption charges, including an allegation that he conspired to effectively sell President-elect Barack Obama’s seat in the United States Senate to the highest bidder.
A 76-page affidavit from the United States Attorney’s office in the Northern District of Illinois says Mr. Blagojevich (pronounced bluh-GOY-uh-vich) was heard on wiretaps over the last month planning to “sell or trade Illinois’ United States Senate seat vacated by President-elect Barack Obama for financial and personal benefits for himself and his wife.”

The authorities recorded Mr. Blagojevich speaking with advisers, fundraisers, a spokesman and a deputy governor, using listening devices placed in his office, home telephone, and a conference room at the offices of a friend, prosecutors said.

More...

Sunday, December 7, 2008

Super Secret Spy Lens


As you probably already know, it's incredibly hard to get candid shots of those around you when they know the camera is being pointed in their direction — and people seem to have an innate ability to sense this. The Super Secret Spy Lens solves this problem by using a precision mirror and a cut-out in the side to let you point away from your subject, bringing down their defenses and improving the odds you'll get a terrific photograph. For great, candid holiday photos, it's the perfect addition to your camera bag. Also great for weekend espionage work.

More here...

Criminals Auto-dialing With Hacked VoIP Systems

Criminals are taking advantage of a bug in the Asterisk Internet telephony system that lets them pump out thousands of scam phone calls in an hour, the U.S. Federal Bureau of Investigation warned Friday.

The FBI didn't say which versions of Asterisk were vulnerable to the bug, but it advised users to upgrade to the latest version of the software. Asterisk is an open-source product that lets users turn a Linux computer into a VoIP (Voice over Internet Protocol) telephone exchange.

In so-called vishing attacks, scammers usually use a VoIP system to set up a phony call center and then use phishing e-mails to trick victims into calling the center. Once there, they are prompted to give private information. But in the scam described by the FBI, they apparently are taking over legitimate Asterisk systems in order to directly dial victims.

More here...

Friday, December 5, 2008

Camera Found in Church Restroom


BARTLETT, TN - A Bartlett church is now at the center of a police investigation. Bartlett Police say a man planted a camera in the woman's restroom. They say it happened at "That Church," located at 6001 Bartlett Center Drive.

"That Church" in Bartlett has about 50 members. The small congregation is somewhat relieved, but disappointed after learning about what happened in the woman's restroom.

"He would wait until all of the families left. He knew no one was in that building except for them and us. His whole goal was to get video of her, because he was in love with her and she didn't want anything to do with him," says Youth Pastor Corey Force. Force says a church member hid a camera in two of the woman's restrooms to videotape a woman he had a crush on. "His goal was one girl and one girl alone," said Force.

More here...

Wireless-Blocking “Paint"

EM-SEC Coating Creates an “Electromagnetic Fortress” that Safeguards Businesses and Government Facilities from Wireless Attacks

Hampton, VA – March 14, 2007 – EM-SEC Technologies, LLC announced today that the tests performed around the perimeter of their “painted” SCIF (Sensitive Compartmented Information Facility) yielded successful results for the protection of wireless devices and other electronic equipment within the structure. The tests confirmed that wireless transmission of information can be protected from unauthorized access by the use of their EM-SEC Coating System.

“The use of EM-SEC Coating as an electromagnetic barrier for the containment of wireless networks has opened a new realm of possibilities for our company and for the future of wireless communications”

More here...

Wednesday, December 3, 2008

LaCie CurrenKey USB Flash Drive




With the new LaCie CurrenKey you can easily transfer and transport your important data. The USB connector can be revealed by a simple twist. With the universal Hi-Speed USB 2.0 interface, the cross-platform LaCie CurrenKey can be used with all PC or Mac computers. Hi-Speed USB 2.0 not only offers universal compatibility and cross-platform convenience, but features hot-pluggable connection and high-speed transfer rates. Built-in memory of up to 8GB in a tiny USB flash key. Available with a bronze (4GB) or silver (8GB) finish. Shock-proof and durable die-cast casing.

More...

Tuesday, December 2, 2008

Ycam-Knight Online "Baby" Monitor

The Y - cam Knight connects to your wireless router using the same technology as your laptop or desktop PC. Meaning that when you set the camera up looking at your "little one" you can see (and hear) your child from anywhere in the house!

The Y - cam Knight comes with all these great features:


  • Infrared Night Vision
  • Quick and simple setup
  • High quality video with sound - 30fps and 640x480 pixel Resolution
  • Motion detection alerts via email
  • Monitor and record live video and audio from anywhere
  • MPEG-4 compression for reduced bandwidth and storage
  • Mobile Viewing can be viewed from many devices including laptops and iPhone.
  • Multi-client access and password protection
  • Secured wireless connectivity
  • Compact design
Can anyone think of anything else this nifty little device might be used for ?

More...