Wednesday, December 30, 2009
You’ve probably seen all types of spy cameras by now. Well now there’s a device for those of you that are paranoid that someone is keeping an electronic eye pointed directly at you. Just pull out this not so subtle device and you’ll know for sure. Of course with this big bulky thing, they’ll also know that you know. At least you’ll finally know the dreaded truth though. You’ll either find that you are being watched or that you’re just an incredibly paranoid human being.
The detector is portable, despite that it is a pretty bulky portable device. It has a 2.3” color display, auto scan as well as manual scan and can run for 3-5 hours. It has a couple different ways to keep it powered, you can either use the 4 AA batteries or just plug it into the wall with the Universal AC adaptor.
Tuesday, December 29, 2009
The big brother is always listening, no matter how quietly you speak. In case of cell phones, considering the encryption technology used by most of the GSM operators, it is like speaking on a public addressing system.
To bring this to the notice of the concerned bodies, Karsten Nohl started the most ambitious attempt to compromise the GSM phone system, which is used by over 3 billion people around the world. Others have cracked the A5/1encryption technology used in GSM before, but their results have remained secret. However, Nohl intended to go one big step further and planned to make the keys available to everyone on the Internet.
At the second day of the Chaos Communication Congress, he informed that he had cracked the code and published it for others to read and review. The GSM Association doesn't seem to be very happy with this development. According to NY Times, a GSM spokesperson told the newspaper that Nohl's activity is illegal in the UK and the United stated and that it was not in good faith -- " To do this while supposedly being concerned about privacy is beyond me.”
Monday, December 28, 2009
Understandbly, the White House is trying very hard to get out in front of the would-be Christmas bomber story. The head of the Department of Homeland Security isn't helping. I watched her on three shows and each time she was more annoying, maddening and absurd than the pevious appearance. It is her basic position that the "system worked" because the bureaucrats responded properly after the attack. That the attack was "foiled" by a bad detonator and some civilian passengers is proof, she claims, that her agency is doing everything right. That is just about the dumbest thing she could say, on the merits and politically. I would wager that not one percent of Americans think the system is "working" when terrorists successfully get bombs onto planes (and succeed in activating them). Read more ..
Sunday, December 27, 2009
A Somali news site said at least two officials are under investigation for passing on "sensitive information" to the South African Secret Service (SASS) and the United States's Defence Intelligence Agency (DIA).
The report claims that the African Union is probing the activities of an intelligence analyst from an East African country and a Somali-Tanzanian who works for the United Nations Support Office for Amisom (UNSOA) in Nairobi.
"(They) have reportedly been recruited separately to spy both on Amisom (African Union Mission to Somalia) and Somalis with the view of undermining the Djibouti Process and assisting the West in the War on Terror in East Africa," the news site mareeg.com reported under the headline "Somali Spy Network Exposed".More...
Saturday, December 26, 2009
This report provides an overview of federal law governing wiretapping and electronic eavesdropping. It also appends citations to state law in the area and contains a bibliography of legal commentary as well as the text of the Electronic Communications Privacy Act (ECPA) and the Foreign Intelligence Surveillance Act (FISA). It is a federal crime to wiretap or to use a machine to capture the communications of others without court approval, unless one of the parties has given their prior consent. It is likewise a federal crime to use or disclose any information acquired by illegal wiretapping or electronic eavesdropping. Violations can result in imprisonment for not more than five years; fines up to $250,000 (up to $500,000 for organizations); in civil liability for damages, attorneys’ fees and possibly punitive damages; in disciplinary action against any attorneys involved; and in suppression of any derivative evidence. Congress has created separate but comparable protective schemes for electronic communications (e.g., e-mail) and against the surreptitious use of telephone call monitoring practices such as pen registers and trap and trace devices.
Tuesday, December 22, 2009
ACORN critic Rep. Steve King (R-Iowa) is mystified that both the Democratic-controlled Congress and the Obama administration aren't doing much about the tax-subsidized organized crime syndicate ACORN even as evidence of its wrongdoing continues to pile up.
In an exclusive interview, the House Judiciary Committee member describes the ACORN saga as "the largest corruption crisis in the history of America."
"It's thousands of times bigger than Watergate because Watergate was only a little break-in by a couple of guys," said King. "By the time we pull ACORN out by its roots America's going to understand just how big this is."
LOS ANGELES -- The former owner of a Beverly Hills-based magazine has filed a complaint seeking $5 million from actor Tom Cruise, celebrity lawyer Bertram Fields and private investigator Anthony Pellicano that claims he was illegally wiretapped after Cruise filed a defamation suit against him.
Michael Davis Sapir, in a suit filed in Superior Court, claimed that Pellicano, working for Cruise and Fields, intercepted at least 1,000 conversations before the defamation suit was settled. Cruise filed the complaint after Sapir's Bold Magazine offered a $500,000 reward in 2001 for videotaped evidence that Cruise was gay. The magazine subsequently issued a press release claiming it had received a response to the offer.
Monday, December 21, 2009
Smartphones could be set to spark a whole new set of worries for corporate security managers. This year, there have been reports of several viruses targeting Apple's iPhone and a new family of worms using SMS text messaging to spread malware among 3rd generation Symbian devices like the latest Nokia handsets.
While researchers acknowledge the threat level is currently only small, they predict that as the use of such devices to connect to company networks and conduct mobile commerce increases, so the criminal gangs responsible for commercially-motivated PC malware will start to increasingly target smartphones and other mobile devices.
"The rise in threats to mobile devices is definitely real, although still a very long way from epidemic proportions," said Rik Ferguson, senior security advisor at IT security firm Trend Micro. "The real message is about preparedness, 2009 has seen a limited number of new threats, but a significant increase in their complexity and criminal intent."
Saturday, December 19, 2009
A great deal has happened since Britain's Security Service, MI5, was established in 1909 as a two-man operation.
It has provided invaluable information during two world wars, tried to fend off Soviet spies during the Cold War (with rather little success as the Cambridge Five led by Kim Philby shows), faced the IRA, tracked Communist connections to British unionists and has watched its role shift drastically from counter-espionage to counter-terrorism as the agency marks its centenary.
Christopher Andrew is a respected espionage chronicler and Cambridge University historian who was given access to MI5 records to write this interesting, engaging and massive look at his nation's clandestine anti-spy agency.More...
Friday, December 18, 2009
Tapping into drones’ video feeds was just the start. The U.S. military’s primary system for bringing overhead surveillance down to soldiers and Marines on the ground is also vulnerable to electronic interception, multiple military sources tell Danger Room. That means militants have the ability to see through the eyes of all kinds of combat aircraft — from traditional fighters and bombers to unmanned spy planes. The problem is in the process of being addressed. But for now, an enormous security breach is even larger than previously thought.
The military initially developed the Remotely Operated Video Enhanced Receiver, or ROVER, in 2002. The idea was let troops on the ground download footage from Predator drones and AC-130 gunships as it was being taken. Since then, nearly every airplane in the American fleet — from F-16 and F/A-18 fighters to A-10 attack planes to Harrier jump jets to B-1B bombers has been outfitted with equipment that lets them transmit to ROVERs. Thousands of ROVER terminals have been distributed to troops in Afghanistan and Iraq.More...
Thursday, December 17, 2009
A MAJOR hunt was in progress last night after a laptop crammed with secret data was stolen from inside the Ministry of Defence nerve centre.
The machine, plus an encryption key to unlock highly sensitive files, vanished from the heart of the MoD's London HQ.
It sparked fears that a "mole" is operating there.
Last night a source said: "This has the potential to become one of the most serious security breaches at the Ministry for a very long time.
"Laptops have been mislaid before, but not with encryption keys."
The computer was left in the HQ by a high-ranking RAF officer.
METUCHEN, N.J., Dec. 14 /PRNewswire/ -- Berkeley Varitronics Systems, Inc. (BVS), a leading provider of advanced wireless solutions and products to the domestic and international wireless telecommunications industry, today announced the release of an advanced hand-held cell phone detector fittingly called the Bloodhound. The Bloodhound will enable security officers to scan real-time for unauthorized cell phone activity in correctional facilities and detect the precise location of the caller using a Direction Finding Antenna.
Berkeley Varitronics Systems provides an alternative solution to cell phone jamming that will not interfere with 911 calls, citizens' cell phone use and public safety communications.
Tuesday, December 15, 2009
TEL AVIV (Reuters) - Israel is parlaying civilian technological advances into a cyberwarfare capability against its enemies, a senior Israeli general said on Tuesday in a rare public disclosure about the secret program.
Using computer networks for espionage -- by hacking into databanks -- or to carry out sabotage by planting so-called "malicious software" in sensitive control systems has been quietly weighed in Israel against regional enemies like Iran.
In a policy address, Major-General Amos Yadlin, chief of military intelligence, listed vulnerability to hacking among national threats that also included the Iranian nuclear project, Syria and Islamist guerrillas along the Jewish state's borders.
Yadlin said Israeli armed forces had the means to provide network security and launch cyber attacks of their own.
"I would like to point out in this esteemed forum that the cyberwarfare field fits well with the state of Israel's defense doctrine," he told the Institute for National Security Studies, a Tel Aviv University think tank.
Saturday, December 12, 2009
The smokers in your office are up to something... but what? They huddle outside in all sorts of weather, flicking their lighters, puffing on their cigarettes, and discussing what you're pretty sure is a plan to take over the world. Or at least the office park.
And you have your own plan, an awesome plan to take them down by collecting evidence of their nefarious schemes.
You'll grab the Spycam Classic Lighter Camera, walk out to their area with a candy cigarette and record their smoke break conversation while trying futilely to light your sugar stick.
How To Protect Yourself From Being Secretly Video TapedCHESTERFIELD, MO (KTVI-FOX2now.com) - The case against a Chesterfield CEO who police say secretly recorded women in a bathroom is expanding. We first told you about the story Wednesday night. Now, more potential victims are calling Chesterfield police. Jack Eigles, 55, is accused of using a hidden camera to covertly record women in the ladies' bathroom at Corporate Cash Flow Solutions on Long Road in Chesterfield, Missouri.
Eigles, who lives in Chesterfield, founded the company and is the President and CEO. When we first reported the story Wednesday, Chesterfield police said they had three to five victims. After our story aired, police say they received five to ten new calls. Some of those might be potential new victims. Others were just concerned about contact they had with Eigles.
"We take all of this information and build even more of a case," explained Chesterfield Police Lieutenant Steven Lewis.
Thursday, December 10, 2009
The significance of a counter-measures team set up by Shell in March 2007 is now becoming clearer. We only became aware of it due to a Shell internal email dated 9 March 2007 released to us as a result of an application to Shell under the Data Protection Act.
Days later, on 21 March 2007, Shell initiated an IT project to “monitor internal e-mails from Shell servers globally to Donovan and is also monitoring web traffic to determine internal traffic to their website”. The relevant Shell internal email states: “There is history of several former employees taking internal laundry to Donovan also, internal e-mails have appeared on his website.”More...
Tuesday, December 8, 2009
Who needs anonymous sources when the government is perfectly capable of leaking its own secrets?
Government workers preparing the release of a Transportation Security Administration manual that details airport screening procedures badly bungled their redaction of the .pdf file. Result: The full text of a document considered “sensitive security information” was inadvertently leaked.
Anyone who’s interested can read about which passengers are more likely to be targeted for secondary screening, who is exempt from screening, TSA procedures for screening foreign dignitaries and CIA-escorted passengers, and extensive instructions for calibrating Siemens walk-through metal detectors.
The 93-page document also includes sample images of DHS, CIA (see above) and congressional identification cards, with instructions on what to look for to verify an authentic pass.
The manual, titled Screening Management Standard Operating Procedure, is dated May 28, 2008. It contains this warning: “NO PART OF THIS RECORD MAY BE DISCLOSED TO PERSONS WITHOUT A ‘NEED TO KNOW.’”More...
Friday, December 4, 2009
WASHINGTON — Can Canada be trusted?
In the midst of what turned out to be a bogus espionage scare over commemorative coins, senior Pentagon officials speculated whether Canadians — widely considered to be among America's closest allies — might be "bad guys" involved in the spy caper. "Who knows?" one official wrote in secret e-mails obtained this week by The Associated Press.
The espionage warnings from the Defense Department caused an international sensation a few years ago over reports of mysterious coins with radio frequency transmitters, until they were debunked. The culprit turned out to be commemorative "poppy" quarters with a bright red flower manufactured in Canada.
But at the height of the mystery, senior Pentagon officials speculated about Canada's involvement, according to e-mails marked "Secret/NoForn" and obtained by the AP under the U.S. Freedom of Information Act. The messages reflect the no-holds-barred attitudes over an inherent lack of trust within U.S. spy agencies.
"I don't think it is an issue of the Canadians being the bad guys," the Pentagon's counterintelligence chief wrote, "but then again, who knows."More...
Modern technology might be making life easier for some, but it flat-out perplexes many people, including one Elgin criminal.
Miguel Bribiescas, 25, admitted to placing a pen-size spy-camera in a unisex employee bathroom at Ridgefield Industries Inc. According to authorities, the camera did record one female employee without her permission before someone discovered the device on July 31 and turned it over to police.
But when police watched the video, the very first recorded scenes were of Bribiescas looking into the lens and trying to figure out his own camera. In fact, most of the recorded footage was of the confused criminal handling the device.
It's likely that if he was dumb enough to attempt this perverted crime, he probably wasn't smart enough to read the camera's manual first.More...
Thursday, December 3, 2009
Want to know how much phone companies and internet service providers charge to funnel your private communications or records to U.S. law enforcement and spy agencies?
That’s the question muckraker and Indiana University graduate student Christopher Soghoian asked all agencies within the Department of Justice, under a Freedom of Information Act (FOIA) request filed a few months ago. But before the agencies could provide the data, Verizon and Yahoo intervened and filed an objection on grounds that, among other things, they would be ridiculed and publicly shamed were their surveillance price sheets made public.
Yahoo writes in its 12-page objection letter (.pdf), that if its pricing information were disclosed to Soghoian, he would use it “to ’shame’ Yahoo! and other companies — and to ’shock’ their customers.”More...
Spy Pix is an essential tool for any spy who wants to hide and send secret messages in plain view.
Maybe you’re an international spy who needs to send a covert message to a fellow operative. Or you’ve just infiltrated enemy headquarters and need to transmit top secret plans. Or perhaps you have an embarrassing photo of your friend that you want to hide in plain view.
Spy Pix uses steganography, which comes from the Greek words steganos (”covered”) and graptos (”writing”), to hide one image inside of another decoy image. To a casual viewer, only the decoy image is seen. However, for a seasoned spy, the image can be decoded with Spy Pix to reveal the hidden message.
Thursday, November 26, 2009
Any business can be the target of covert eavesdropping; however, some are under greater risk than others i.e.; software development companies, high tech startups, defense contractors, companies awarded GSA or GPO contracts, or any highly competitive industry. What is the potential effect on you or your business if sensitive information is intercepted by an eavesdropper?
No business in today's highly competitive marketplace is safe from the threat of corporate, economic or industrial espionage. Imagine the financial and strategic damage to your company should confidential plans, trade secrets or competition sensitive information is leaked... If the company's security, trade secrets or confidential information is being breached by an insider who happens to be working for someone else, not only the top executives, but everyone in the company is at risk of having their livelihood taken away. In any given corporation, there could be hundreds or even thousands of employees that depend on that company for their income and security. How can you protect yourself? What signs should you be on the lookout for?
When possible, eavesdroppers or spies take the easiest route to a target or company's assets. In those situations, for example, a spy may gain authorized access as an employee. In other cases, a spy might enter your home or organization as a member of the cleaning crew or gather information from employees by posing as a vendor, potential client, or headhunter. However, when these avenues have been compromised, spies will turn to electronic surveillance technology. Electronic bugging devices are freely available over the web, through retail outlets and mail-order houses. They are used by competitors, disgruntled employees, professional investigators, journalists, or anyone with a reason for obtaining information about you or your company’s plans. The deployment of such equipment takes only seconds and they can be easily concealed. And, as electronic surveillance technology improves and becomes more readily available, executives, security professionals and private individuals must educate themselves about what counter surveillance methods and tools they can use to see that their interests remain safe.
A Counter Surveillance Sweep, or Technical Surveillance Countermeasure (TSCM) “Bug Sweep”, is one of the most effective means of protecting your valuable information. These highly specialized Counter Surveillance Specialist conduct sweeps or surveys that have become more effective in recent years as the counter surveillance technology used to find microphones, transmitters, and other eavesdropping devices has caught up to the sophistication level of covert surveillance equipment. The TSCM or “Bug Sweep” is designed to detect the presence of technical surveillance devices. It should also identify security hazards or weaknesses that could leave you or your company vulnerable to corporate, economic or industrial espionage.
What can you do to protect your Business from Electronic Espionage: 7 steps
1. Recognize the signs and that there is a real threat.
2. Identify and valuate trade secrets.
3. Implement a definable plan for safeguarding your assets.
4. Secure physical trade secrets and limit access.
5. Confine intellectual knowledge.
6. Provide ongoing security training to employees.
7. Contact a professional Counter Surveillance Specialist Today!
2009, © Copyright ComSec LLc All Rights Reserved
Wednesday, November 25, 2009
A second iPhone worm is in the wild, and unlike the jokey Australian worm authored by hacker prankster Ikee two weeks ago, this one is dangerous.
Unlike Ikee’s hack, which merely rick-rolled owners of infected iPhones, the new Dutch variant targets customers of the bank ING. When triggered, the worm redirects users visiting the banking site to an address in Lithuania which shows a fake login screen for ING online banking. It is essentially a phishing attack run on compromised iPhones.
The panic that will inevitably spread from this story is unjustified. First, if you are a regular iPhone customer you are safe, even if you are in the Netherlands. This is because, like the Ikee hack before it, the new worm will only work on a jailbroken, or hacked iPhone. Further, you will have to explicitly install SSH remote access, and then you will have to leave the root password at its default, which is alpine.More...
WAKE UP AMERICA! JDL
Three Navy SEALs involved in nabbing one of Iraq's most wanted terrorists are reportedly facing criminal charges related to his capture -- all because he claimed he had a bloody lip.
The SEALs took down Ahmed Hasim Abed, the alleged mastermind of a ghastly 2004 incident in which four American contractors who worked security for Blackwater USA, were murdered in Fallujah and two of the bodies were hung from a bridge over the Euphrates River.
But instead of being praised as heroes, the SEALs are all facing charges and have hired lawyers, FoxNews.com reported.
An online debate over global warming science has broken out after an unknown hacker broke into the e-mail server at a prominent, British climate-research center, stole more than a thousand e-mails about global warming research and posted them online.
Global warming skeptics are seizing on portions of the messages as evidence that scientists are colluding and warping data to fit the theory of global warming, but researchers say the e-mails are being taken out of context and just show scientists engaged in frank discussion.
The Climate Research Unit at the University of East Anglia is one of the United Kingdom’s leading climate research centers and has been a strong proponent of the position that global warming is real and has human causes. The center confirmed the hack occurred in an e-mail statement to Threat Level.More...
MADISON COUNTY, AL - Our cell phones are our life lines these days. They're as much a part of our wardrobes as the clothes we wear. When we forget them we feel naked. However, a Taking Action Consumer Investigation will make you realize just how vulnerable you and your private information are.
Most of us are on our cell phones all the time. Talking, texting and taking care of business.
Think about the private conversations and information you share over your cell phone. And now imagine someone listening in without you knowing it.
It might be the ultimate invasion of privacy.
In this fast paced world who doesn't have a cell phone! You use it just about everywhere you go. even when you're at work.
"As long as my boss ain't watching," jokingly says Keith McLaglen.
Cell phones are a universal connection to our family and friends around the world!
But how private are your conversations?
Note: Help is available! Click Here for Cellular Anti Virus & Anti Eavesdropping software!
JERUSALEM — An apprentice spy for Israel's once vaunted Mossad overseas intelligence service was arrested by rank and file police during an abortive training exercise in the country's metropolis of Tel Aviv.
"Let's hope the Mossad is more effective abroad," commented Israel's commercial Channel 10 television as reports of the incident swept an aghast Israeli media on Tuesday.
The want-to-be James Bond was spotted on Monday planting a dummy bomb under a vehicle in the bustling commercial capital by a woman passer-by who swiftly alerted a passing policeman, the media reports said.
It was only after questioning at the the local police station that the rumbled trainee assassin managed to convince his captors that he was indeed a member of the famous spy agency.
The Mossad never warns Israel's uniformed security services in advance of its exercises in a bid to give the training an element of reality.More...
ATLANTA -- A registered nurse anesthetist who was arrested for unlawful surveillance and eavesdropping of patients has been re-arrested after a juvenile was identified as an alleged victim, police said Tuesday.
Paul Patrick Serdula, 47, was arrested Monday night on child molestation and sodomy charges, Cobb County police Sgt. Dana Pierce said.
Pierce said the investigation into Serdula is "far from over," and more charges are likely as additional victims come forward.
"We have victims, probably, in the early double-digits, and we expect as many as 100," he said.
Tuesday, November 24, 2009
The recession is creating camaraderie amongst workforces, at the expense of their employers, is the finding of a transatlantic survey. Carried out amongst 600 office workers in Canary Wharf London and Wall Street New York, 41% of workers have already taken sensitive data with them to their new position, whilst a third would pass on company information if it proved useful in getting friends or family a job.
Pilfering data has become endemic in our culture as 85% of people admit they know it’s illegal to download corporate information from their employer but almost half couldn’t stop themselves taking it with them with the majority admitting it could be useful in the future!
However, it would seem employers have only themselves to blame as they appear pretty lackadaisical when it comes to protecting their data from their employees with 57% of respondents stating that it’s become a lot easier to take sensitive information from under their bosses noses this year, up from 29% last year.
Welcome to the tinfoil hat club.
That’s what a federal appeals court is telling Scott Tooley of Kentucky in dismissing his civil rights lawsuit. Tooley believes the government put him under blanket surveillance after he said the word bomb to an airline agent.
Tooley sued the government on allegations of invasion of privacy and for violation of his First Amendment speech rights, claiming he was subjected to “round-the-clock surveillance” following his 2002 B-word utterance.The alleged spying targeting Tooley ranged from phone taps to RFID chips on his vehicles. He claimed he was placed on an airline travel watchlist, and, in 2005, spotted an undercover agent in a Ford Crown Victoria parked outside his Louisville house for about six hours a day.
IN MARTINS FERRY, Ohio, the police chief is going to jail.
A jury yesterday found suspended chief Barry Carpenter guilty of receiving stolen property, theft in office and tampering with evidence relating to a break-in at the home of Michelle Ross, the surrogate mother who carried twins for Sarah Jessica Parker and Matthew Broderick. Carpenter was acquitted on charges of burglary and unauthorized use of property or services.
Carpenter put his head in his hands after the verdict was read.
Prosecutors alleged that Carpenter broke into Ross' home in May, took items related to her pregnancy and the surrogacy and schemed with Police Chief Chad Dojack of neighboring Bridgeport to sell them to celebrity photographers.
Dojack faces trial in January.
Based on yesterday's verdict, he may want to make a deal.More...
Monday, November 23, 2009
During his 25 years in the FBI, Joe Navarro did everything from running a SWAT team to flying a plane.
But it was his work monitoring foreign spies that launched him into his new career as an adviser to businesses on “non-verbal intelligence”.
He and his team would follow spies and try to infer from their behavior what they were up to.
How often did they gather? Which were their favorite restaurants? Were they walking differently one day to the next?
“When we're relaxed, our body has a certain posture,” says Navarro. “But when we're concerned about being followed, it changes.”
Spies were often taught to glance into shop windows to see if they were being followed. But Navarro could easily tell if someone was doing it to see what was inside the shop or to see who was behind him.
For all but the most diligent spies, he says, the habits and disciplines they learned before being sent into the field yielded quickly to ordinary human instincts.More...
Sunday, November 22, 2009
The United States called Friday for the release of Xue Feng, a China-born US oil geologist being held on suspicion of stealing State secrets, according to AFP.
"We encourage China to grant Dr Xue humanitarian release and immediately deport him back to the United States," Susan Stevenson, spokeswoman for the US Embassy in Beijing, told AFP.
"It is an espionage case," the counter-espionage official from the Chinese government department said. "The Chinese side has very solid evidence to prove that Xue Feng stole State secrets and violated China's law."
Xue was detained in China in November 2007 as he prepared to fly back to the United States after trying to purchase a database of information about China's oil industry on behalf of his employer at the time, IHS Inc, according to Jerome Cohen, a New York University law professor who is seeking Xue's release and spoke with The New York Times Sunday.
An anonymous source told AFP that Xue was formally arrested in April the following year and charged with procuring State secrets.More...
BUENOS AIRES – Revelations of illegal wiretapping by a former cop have sparked a war of words between the city’s conservative mayor and the center-left government of Argentine President Cristina Fernandez.
Federal Cabinet chief Anibal Fernandez (no relation to the president) said Thursday that Mauricio Macri “has other no other way out” than to resign, likening the mayor’s conduct to that of U.S. President Richard Nixon during Watergate.
The illegal wiretaps were arranged by former police inspector Jorge “Fino” Palacios and Macri, Anibal Fernandez said.
Palacios and Macri, according to the Cabinet chief, were “working on a kind of small business in which what was done was to carry out telephone intercepts to sell them (the tapes) later to the highest bidder.”
Friday, November 20, 2009
DENVER - It's like something out of a James Bond movie. "Spyware" you can secretly install on a cell phone. It allows you to eavesdrop, and gives you access to everything the person does on the phone.
And they'll never know it's happening.
Fox 31 investigative reporter Julie Hayden found out this new cell phone spyware takes the "big brother" concept to an unprecedented level. "Overall I think this is very dangerous software capability, I think this is an invasion of privacy," said Jennifer, who participated in a test of the new spyware for FOX 31 News.
The spyware was downloaded from the website, and then put on a "target phone," which was given to Jennifer's fiancée, Neil. She had the "monitor phone."
Jennifer watched her phone as a she received a text message that alerted her that Neil made a call on his phone. Every time Neil's phone sent or received a call, text message, or email, Jennifer's phone was alerted.
"I just can't believe that I'm listening in on this conversation," Jennifer said.
Note: Anti Virus & Anti Eavesdropping cell phone software is available! Click here
Chinese spies are aggressively stealing secrets to build up China's military and economic power, a US advisory panel on US-China relations has warned.
Its members urged the US Congress to ensure the country was adequately protected against Chinese spying.
The report was published in the same week that US President Barack Obama made his first official visit to China.
A Chinese embassy spokesman in Washington dismissed the allegations as baseless and irresponsible.
The report - which says China's spying is becoming more intense and sophisticated - was produced by the US-China Economic and Security Review Commission.
"China is changing the way that espionage is being done," said Carolyn Bartholomew, who chaired the commission.
CHARLOTTE COUNTY: A Charlotte County worker is in trouble after serious allegations surfaced regarding him allegedly spying on his wife during their divorce.
It was a letter that sparked an investigation into Donny Bernhagen, the 24-year veteran who works in the Charlotte County Environmental and Extension Services Department.
“Allegations were made that he used county resources on county time for personal business,” said Bernhagen’s boss Jim Thompson.
The letter, signed by employees, claims that Bernhagen used a county system to track his wife - including her finances and whereabouts.
It then goes on to say that Bernhagen used his “position of authority to have two of his employees check up on his wife.”
According to the letter, some of the employees accused Bernhagen of forcing them to follow his wife around town to see if she's at work or the doctor's office.More...
HONOLULU — A former B-2 stealth bomber engineer accused of spying for China suffers from narcissistic personality disorder, expert witnesses for the prosecution and the defense testified in federal court Thursday.
But the forensic psychologists who evaluated Noshir Gowadia of Maui disagreed during the hearing over whether he is competent to stand trial and assist in his defense.
Gowadia, who worked for years on highly classified military systems, has been held without bail since his 2005 arrest on suspicion of selling cruise missile secrets. He has pleaded not guilty to 21 counts of conspiracy, money-laundering and falsifying tax returns.
The charges against Gowadia also assert that he offered to sell classified stealth technology to foreign business people in Israel, Germany and Switzerland.
With Gowadia seated in white prison overalls alongside his attorneys, prosecution witness Lisa Hope testified Thursday that she and a postdoctoral psychology intern evaluated the defendant at a federal prison in Los Angeles last spring.More...
Thursday, November 19, 2009
When asked what comes to mind when the word “espionage” is mentioned, most people would think of the CIA, the Cold War era KGB, or James Bond. The present reality is that espionage is taking on a new form, evolving into more than just the practice of stealing countries’ security secrets, and into the practice of stealing business secrets. Today’s most dangerous spies might not arrive in a helicopter or know how to disarm a bomb, but could be sitting in the next cubicle and drive a Prius.
Espionage, a topic whose actions are usually hidden in the shadows, has been brought into the light recently by various news stories. The story of the three American hikers being held in Iran on charges of spying has caught the attention of many. Industrial espionage also poses a great risk as companies all around the world strive to protect their competitive advantage. This is increasingly becoming more concerning to nations’ as they assess the potential risk of industrial espionage to national prosperity and growth.More...
(CNET) -- Major countries and nation-states are engaged in a "Cyber Cold War," amassing cyberweapons, conducting espionage, and testing networks in preparation for using the Internet to conduct war, according to a new report to be released on Tuesday by McAfee.
In particular, countries gearing up for cyberoffensives are the U.S., Israel, Russia, China, and France, the says the report, compiled by former White House Homeland Security adviser Paul Kurtz and based on interviews with more than 20 experts in international relations, national security and Internet security.More...
US police have released new hidden camera video of a woman allegedly attempting to hire a police informant to kill her husband.
Dalia Dippolito was arrested in August on a charge of solicitation to commit first-degree murder after Florida police staged an elaborate ruse to convince the 26-year-old her husband Michael was dead.
The new video allegedly shows Dippolito in a car with the informant, who was posing as the hired hit man.
"I'm a lot tougher than what I look," she says in the clip.
"I know you came here and were like oh what a cute little girl or whatever — you know but I'm not."
Dippolito proceeds to show the informant photographs of her husband and discuss a price for the murder.
"You're extremely beautiful," the informant says.
"Thank you but I just need to make sure everything is going to be taken care of," she replies.
Police claim Dippolito gave the informant a down payment of $US1200 ($A1428) so he could buy a handgun.
She also allegedly asked for a time for the hit so that she could get her hair done in Boca Raton to create an alibi.More...
NORTH HILLS, N.Y. (WPIX) - A North Hills cardiologist is adamantly denying charges that he spied on female employees with a hidden camera inside his Manhasset office bathroom.
Vincent Pacienza, 54, pleaded not guilty in court Wednesday to one count of second-degree unlawful surveillance, the charge reportedly handed down by a Nassau County grand jury on Oct. 29.
Pacienza was arrested by Nassau County police last June. He was released Wednesday on $2,500 bail.
Nassau County District Attorney Kathleen Rice said Pacienza installed a video camera hidden inside an air purifier inside one of the bathrooms at Manhasset Cardiovascular and Wellness Center. Authorities said Pacienza shut down the employees-only bathroom after the camera was installed, which forced everyone that worked there to use the bathroom equipped with the camera.
Wednesday, November 18, 2009
The Army wants to instantly get eyes in the sky to watch over a potential enemy. But spy drones or satellites or even fighter jets can be too slow to handle the job. The answer: missiles that carry surveillance drones inside.
That’s right. The military wants to shoot off loads of flying, spying robots, using missiles to make for faster surveillance and attack. “ISR (Intelligence, Surveillance and Reconnaissance) platforms delivered from missiles can potentially provide battlefield information that is only seconds old when transmitted from long ranges,” the Army explains in a request for research proposals. “This information is particularly valuable since it is so current. It provides the potential for striking a very mobile enemy before he has time to alter his position.”More...
TORONTO/BOSTON (Reuters) - Hackers could one day turn ordinary smartphones into "rogue" devices to attack major wireless networks, Research In Motion's security chief warned.
Scott Totzke, RIM's vice-president of BlackBerry security, said hackers could use smartphones to target wireless carriers using a technique similar to one used in assaults that slowed Internet traffic in the United States and South Korea in July.
In what's known as a distributed denial of service, or a DDOS attack, criminals use phone signals to order tens of thousands computers to contact a targeted site repeatedly, slowing it or eventually crashing it.
"I think that's an area of concern," Totzke said in an interview this week at the company's headquarters in Waterloo, Ontario.
Totzke said a technique involving data packets might be used to bring down a wireless network, though hackers might accomplish that using a relatively small number of smartphones.More...
Sunday, November 15, 2009
Valerie Plame Wilson cannot publicize details of her work as a CIA operative, even though a government official already outed her as an agent in an attempt to discredit her husband, Joseph C. Wilson, a federal appeals court says.
Plame Wilson, who served as chief of the unit responsible for weapons proliferation issues related to Iraq, argued that confidentiality agreements she signed to win her employment more than two decades ago should be nullified. The CIA has prohibited her from discussing her pre-2002 employment in her 2007 memoir, Fair Game: My Life as a Spy, My Betrayal by the White House.
She maintained the confidentiality agreement should be set aside because Vice President Dick Cheney’s chief of staff, I. Lewis Libby, and others leaked to syndicated columnist Robert Novak that she was an agent. Also, as part of a battle to obtain retirement benefits, her 20-year-employment status became part of the congressional record.
Given that she has been revealed as a operative, the First Amendment allows her to sidestep her confidentiality agreement, she argued.More...
South American neighbours Chile and Peru are embroiled in a serious diplomatic row following a Peruvian court's arrest order for two Chilean military officers for allegedly spying.
Peru is seeking the extradition of the two Chilean military officers and has opened an official inquiry into the matter.
The two officers were allegedly in league with a Peruvian Air Force officer who has been charged with revealing state secrets, espionage and money laundering.
Peruvian president Alan Garcia cancelled talks with his Chilean counterpart Michelle Bachelet at the APEC summit in Singapore to return to Peru early for a briefing on the scandal.More...
Saturday, November 14, 2009
There is an expectation of privacy for files stored on a laptop computer but not for files stored on a central office server, a federal magistrate judge ruled Thursday in a case of alleged corporate espionage.
U.S. Magistrate Judge C. Clifford Shirley Jr. found that e-mail messages of defendant Clark Alan Roberts were stored under an expectation of privacy in a case where employees of WYCO Inc. of Greenback are accused of conspiring to steal trade secrets.
Roberts and co-defendant Sean Edward Howley have been charged in a federal indictment of gaining access to the Goodyear Tire and Rubber Co. plant in Topeka, Kan., in May 2007 to steal trade secrets.
Attorneys for both defendants squared off with federal prosecutors Thursday in U.S. District Court in Knoxville over issues related to the admissibility of evidence in the case based on the seldom-prosecuted Economic Espionage Act of 1996.More...
Thursday, November 12, 2009
A Lebanese Military court has sentenced to death four people on charges of spying for Israel and conspiring with the regime to wage a war on the country.
Two of the defendants were tried in absentia because they had reportedly fled to Israel, the Lebanese media reported on Wednesday.
The other two were a staff sergeant in the Lebanese internal security services and his wife.
The four were found guilty of "conspiring with Israel, allowing it to launch an attack against Lebanon and to make contacts with its agents in Lebanon."
Lebanon launched a counter espionage crackdown last spring through which it arrested at least 100 suspects.
According to senior Lebanese security officials the arrests have dealt a severe blow to Israel's spy networks in the country.
Note: "Pray for the Peace of Jerusalem"...JDL
t's official: you can never be sure someone isn't watching you at all times. I mean, just take a look at this tissue box. It looks benign enough. But inside is a camera that takes color footage in the daytime and black and white footage at night, all at a resolution of 720x480 with a framerate of 30fps. It uses SD cards to store footage, and can be programmed to activate automatically at a particular time. In fact, there might be one somewhere in your home right now. Probably not, but there might be.
Four men were indicted on Tuesday for allegedly hacking into Atlanta, Ga.-based payment processor RBS WorldPay and stealing over $9 million from ATMs around the globe.
A federal grand jury returned indictments against Sergei Tsurikov, 25, of Tallinn, Estonia; Viktor Pleshchuk, 28, of St. Petersburg, Russia; Oleg Covelin, 28, of Chisinau, Moldova; and a person identified only as "Hacker 3." A year ago, RBS WorldPay, owned by the Royal Bank of Scotland, was hacked in what Acting U.S. Attorney Sally Quillian Yates described as "perhaps the most sophisticated and organized computer fraud attack ever conducted." On December 23, 2008, the company announced that on November 10 of that year, it had discovered "its computer system had been improperly accessed by an unauthorized party."
On December 23, 2008, the company announced that on November 10 of that year, it had discovered "its computer system had been improperly accessed by an unauthorized party."
Wednesday, November 11, 2009
The U.S. has agreed to pay $3 million to a former government worker who accused officials with the CIA and State Department of spying on him with a bugged coffee table.
Rather than comply with a court order to provide lawyers in the case with what the U.S. government says is classified information, the government has agreed to settle to end the 15-year-old suit.
A close review of the case suggests that the Justice Department may have also decided to pay off the plaintiff in order to quash the series of damaging legal rulings issued by the influential judge overseeing the case that would have forced them to disclose the classified information. Those decisions may have a bearing on the “state secrets privilege” that the Bush and Obama administrations have used to try and thwart a high-profile lawsuit in California over illegal wiretapping conducted in the war on terror.More...