Friday, January 30, 2009

"Peeping Tom" electrician pleads guilty, gets 270 days in jail

RANCHO CUCAMONGA - An electrician accused of watching women through hidden cameras he installed in homes where he was hired to work has pleaded guilty to a felony burglary charge.

David Mitchell Clark, 35, of Rancho Cucamonga will be sentenced to 270 days in county jail and be required to register as a sex offender for the rest of his life.

According to a police report attached to Clark's court file, Clark allegedly placed cameras in at least three different locations to view and record video of women.

The first camera was discovered in August in a bathroom in a home in the 6400 block of Cambridge Avenue in Rancho Cucamonga where Clark was hired to perform electrical work.

When confronted about the camera, which was attached to a power tool Clark allegedly left on the bathroom floor, Clark said he used the camera to view hard-to-see spaces - such as the inside of walls - while doing his work.

San Bernardino County sheriff's deputies later found a hard drive belonging to Clark in the home's attic that contained video footage of a woman changing clothes in a bathroom.

Deputies also discovered a hidden camera in the bathroom of another home where Clark was hired to do work.


Microsoft sues CEO of Ancora for spying

Deception charged in patent dispute

Microsoft Corp. is suing a former employee, claiming that he applied for a job at the company under false pretenses and then used his role at Microsoft to gain access to confidential data related to patent litigation he is now waging.

Miki Mullor was hired by Microsoft in November 2005, after stating in his job application he was a former employee at Ancora Technologies, a Sammamish software development company that he said had gone out of business.

But, according to Microsoft, Ancora had not gone out of business and Mullor was still chief executive.

While at Microsoft, Mullor downloaded confidential documents to his company-issued laptop, according to the complaint, which was filed Jan. 22 in King County Superior Court.


Thursday, January 29, 2009

Putting A Price On Cyberspying

A study by Purdue researchers paints a picture of a world economy plagued by costly digital espionage.

In the murky world of cyber espionage, the spied-upon are often just as silent as the spies. Even as governments publicize the problem of intellectual property theft by digital intruders, few companies' chief information officers will admit they've been targeted.

But question those CIOs anonymously, and their candid answers begin to sketch the size of the problem: A hemorrhaging breach in research and development secrets that, in the last year, may have added up to roughly $4.6 million in lost or stolen intellectual property per company.


Paint made in Japan blocks Wi-Fi


This might be unneighborly, since it'd mean that your nosy neighbors can't piggyback off your wireless connection anymore.

But for the price of a can of house paint, this may very well be one of the most cost-effective ways to secure your office wireless network against hackers and freeloaders, particularly in a time of thrift.

Researchers at the University of Tokyo have blended paint with aluminum iron oxide, which has been found to resonate at the same frequencies used by Wi-Fi, thus canceling out any electromagnetic waves in that frequency. It sounds like really cool Minority Report stuff.


Spy-cam lighter


Bond, eat your heart out. This rugged, patriotic lighter is something every smoking American would be proud to carry in their Levi 501s. But, this classic has an ulterior motive. There is a spy camera, with microphone built right into the functioning lighter.

The camera records TV-quality video, and while it lacks internal memory, it has a microSD slot for up to 8GB of memory. The built-in Li-on battery will shoot for 6 hours and charges via the USB port on the lighter. The wholesale price is about $150. Do big fancy spies worry about price?

Good luck trying to get this bad boy through a TSA checkpoint.

Tuesday, January 27, 2009

DigiGone Encrypted & Anonymous Internet Access

DigiGone™ is a low-cost, self-contained secure Internet communications and browsing tool for the Windows™ operating system, housed on a convenient USB flash drive.

Originally developed for, and currently in use by both covert government agencies and the private security/intelligence community, the secure, portable and easy-to-use, DigiGone™ key provides today’s mobile corporate executive with fully encrypted IM chat, file transfer, and VoIP communications, as well as file encryption and shredding.

Suitable for traveling executives wishing to discuss/exchange sensitive information with colleagues both at home and abroad, users can
via secure chat, and VoIP, and securely transfer files, simultaneously, from anywhere around the world and close the session instantly, without any fear of their communications falling into unwanted hands.

Monday, January 26, 2009

Executive's car bugged in corruption probe

DETROIT, Jan. 25 (UPI) -- FBI agents reportedly bugged a Synagro Technologies executive's car while investigating the sludge hauler's contract with the city of Detroit.

The Detroit Free Press reported Sunday that authorities made sound and video recordings from the car belonging to then-Synagro Vice President James Rosendall.

There are at least three videos taken in the car, the newspaper reported. Two of the tapes show Rosendall making payments to John Clark, who at the time was chief of staff to then-City Council President Ken Cockrel Jr.

Rosendall is reportedly to plead guilty Tuesday in federal court to conspiring to bribe a public official.

In 2007, he lobbied Detroit's City Council to approve a $47 million sludge disposal contract in Detroit. The council approved the deal in a 5-4 vote despite resident objections, the newspaper said.


Saturday, January 24, 2009

Mini USB MicroSD/T-Flash + M2 Card Reader

Brando knows just how many of us out there have a myriad of memory cards to fiddle with, which is why there is always room for one more memory card reader. This time round, Brando has taken the shrinking gun and fired a good dose of its miniaturizing ray which resulted in the Mini USB MicroSD/T-Flash + M2 Card Reader. Almost as small as those wireless Bluetooth dongles that fit into your USB port, this diminutive memory card reader does microSD and M2 memory cards for those who tend to do a whole lot of file transfer. The newer microSDHC format is supported as well, and you can choose from black or white colors.


Thursday, January 22, 2009

Obama 'to get spy-proof smartphone'

Self-confessed BlackBerry addict Barack Obama may not have to kick the thumbing habit after all, despite the concerns of a notoriously technophobic White House.

The new U.S. president was often seen hunched over the mobile e-mail device during his election campaign and even featured at No. 2 on one celebrity Web site's list of obsessive BlackBerry users.

But, like previous Oval Office incumbents, Obama had been expected to take a vow of technological celibacy following his inaugural oath on Tuesday, despite telling CNBC in an interview that security officials would have to "pry it out of my hands." He protests that a mobile device would help him stay in touch with the real world.

But according to reports Thursday, Obama could now be in line to receive a spy-proof alternative to his favorite toy. The exclusive Sectera Edge, made by General Dynamics, is reportedly capable of encrypting top secret voice conversations and handling classified documents.


SoundBulb makes a speaker out of a lightbulb

Now there is a new multi-functional device on the tech block with the SoundBulb, a lightbulb that has an 8 ohm speaker inside. These Soundbulbs also have a Bluetooth receiver that allows for wireless streaming of audio from a computer or cellular phone. There is an on/off switch on the outside that helps to ping to a Bluetooth or Wi-Fi device.

Inside the SoundBulb is an LED light bulb, and the outer edge functions as a volume control. Hopefully you won’t burn yourself on the hot glass when you are turning your music up or down. As for power, it runs off of whatever is powering the bulb, be it a battery or AC cord.

Gee, I wonder what else it might be used for? More...

Swann's camera pen lets you play spy

BERLIN (AP) — With my trench coat and dark glasses, I looked like a rumpled, portly version of Jason Bourne or James Bond as I stood by the Glienicke Bridge between Berlin and Potsdam, famed as the transfer point for captured spies between the East and the West during the Cold War.

As for the secret I carried, well, it was technological: Swann Communications Ltd.'s new PenCam DVR, a thick ball point pen that sports a tiny video camera and 2 gigabytes of memory. I felt well prepared to be a super spy instead of an anonymous reporter. Sadly, fact trumps fantasy, and though the PenCam is plenty of fun, it has its limitations.

As spy craft goes, there's been no dearth of tiny cameras. Agencies like the Soviet-era KGB, Britain's MI6 and the East German Stasi were quite adept at hiding them in everything from belt buckles to coat buttons.


New paint promises high-speed Wi-Fi shielding


IT managers should start familiarising themselves with a new security tool, the paint brush, as Japanese researchers have come up with a paint that they say will block high-speed wireless signals, giving businesses a cheap option to protect their wireless networks.

The problem of securing wireless networks has been an issue for a while now. Wi-Fi LANs with no encryption or running the obsolete WEP system, run the risk of having hackers outside the building eavesdrop on wireless LAN traffic, or simply stealing bandwidth. However, there are a number of solutions, besides encryption, for companies wishing to secure their networks.


Conficker USB Worm Spreading Quickly


Security researchers are reporting that the Conficker worm virus, which preys on a recently reported vulnerability (MS08-067) in the Microsoft Windows server service, is spreading rapidly even as we speak.

According to a warning issued today by PandaLabs, some six percent (115,000-plus) of the two million computers that it has scanned for the virus in the last week or so have tested positive for Conficker, which is propagated via infected USB memory devices, including MP3 players.

PandaLabs said that the spread of the attack has been fairly ubiquitous worldwide as well, with infections showing up on machines in 83 countries. Over 18,000 machines carrying the threat were found inside the U.S. alone. The company said there were concentrated pockets of affected computers in Brazil, Mexico, Spain and Taiwan as well.


Tuesday, January 20, 2009

Bullet Proof eMessaging

Remember Telex?
Telex was actually the first ever electronic messaging (email) system introduced as a Teleprinter around 1930. For decades Telex was the sole means of sending an electronic message until fax & email arrived.
iTelex® is the worlds most secure, encrypted email messaging system.
iTelex® blows away all email security, delivery & spam problems with 2,048 bit (128 SSL) encryption, digitally signed certificates, SSL security, guaranteed delivery, proof of opening, 25 year archive back up... and for the first time since the outdated Telex terminals, legally binding eMessaging.


Monday, January 19, 2009

Obaba spy belt buckle

Just in time for President Obama’s presidential inauguration we have spotted the Obaba Buckle DVR (yes it’s spelled “Obaba”), which really is nothing more than a spy cam in a place you wouldn’t normally look. The buckle includes a hidden video cam complete with audio.

Go under cover with the Obaba Buckle DVR to grater information to compete your very own investigation. The buckle was originally carved out of wood but was eventually changed to a “beautiful master piece” by casting it in an aluminum mold making it more believable. Looks may be deceiving in the case as you have a total of 8GB of recording space. If that does not appear to be enough you can expand the memory up to 2GB more via microSD card slot.


Wednesday, January 14, 2009

Feds play candid camera with Gov. Blagojevich


Federal authorities used a video camera as part of their cache of tools to investigate Gov. Blagojevich in the final weeks of 2008 before his arrest, the Chicago Sun-Times has learned.

The camera, which likely was remote-controlled, was trained on the Friends of Blagojevich offices, 4147 N. Ravenswood, to help FBI agents identify individuals entering and leaving the campaign offices -- and to identify who was talking on bugs agents covertly planted inside. Federal authorities used a video camera to keep an eye on everyone coming and going from Gov. Blagojevich's campaign offices -- and to keep track of who was talking on the bugs secretly planted inside.

U.S. Senate Majority Leader Harry Reid is likely among the numerous individuals recorded because he called Blagojevich's campaign office Dec. 3 to discuss his preferences for the seat.


Covert Flash Drive Wrist Band

There have been numerous attempts at making a wearable flash drive that the general public can use and appreciate. This new Flash Drive Band will appeal to the minimalist that doesn’t need the crystal covered flash drives. It’s just a simple black bracelet, that would work for both men and women. That is of course as long as they enjoy the overall look of the bracelet. However, it does have the usual setback that comes with most wearable USB drives, it’s lacking a bit in storage space.

It features a 512mb drive, which will work for smaller files. It just all depends on what you use it for.


Note: Watch for this one to start turning up around the office..

VIEVU PVR-PRO 2 Portable Video Camera


The VIEVU PVR-PRO 2 is a camera that is small enough to be clipped on to a user’s shirt for home and law-enforcement purposes. There is a small lens there, and the cover can be flipped open to start recording, and shut for stopping it. With every flip, the video footage is saved as a separate file.

The video footage is SVGA and shoots at 30 frames per second with resolution of 640 x 480. The PVR-PRO 2 has an internal 4 GB memory card for over four hours of recording time. After filming, a user can then connect the VIEVU via USB to a PC or MAC for downloading the videos.


Texas man accused of using hidden camera to spy on teenage stepdaughter

News 2

A Texas father is accused of secretly viewing his 16-year-old stepdaughter in her bedroom.

Bexar County deputies say the man was spying on the girl through a hidden camera he installed in her TV.

Investigators say they don’t know how long the man’s been spying on his stepdaughter in her most intimate moments.

Deputies say 52-year-old David Alan Kimbrough was secretly watching his 16-year-old stepdaughter.

The teenager told deputies she’d first changed her clothes to clean out her car Saturday.

Then she went into a workshop behind the house to get a vacuum cleaner.

That’s when officers say she noticed a TV monitor on picking up images from her bedroom.


Monday, January 12, 2009

LG Touch Watch Phone


LG Electronics made a splash in Vegas when it unveiled what it claims is the world's first market-ready touch-screen watch phone. That's right, a phone you wear on your wrist.

"You want to think James Bond, 'Get Smart,' Dick Tracy. It's all that and more," LG spokesman Martin Valdez said. "You'll never have to worry about losing your phone anymore."

The tiny, 3G-capable gadget has a 1.4-inch screen but packs a host of features such as Bluetooth, text messaging, still and video camera and a built-in speaker for playing music files.


Pocket knife with 32GB USB flash drive


Relatively few of us actually need a folding pocket knife with 32GB USB flash drive, laser pointer, biometric security and bluetooth powerpoint controller but you know you want one anyway. Even if you never use powerpoint.

The new Presentation Pro from Victorinox adds tech to the traditional blades and scissors of the Swiss Army knife. The range includes a de-clawed “flight” model that has no pointy bits making it suitable for hand luggage.


Saturday, January 10, 2009

Judge rejects Feds' attempts to snoop on touch tones


What happened, according to court records and other documents:
Just about everyone knows that the FBI must obtain a formal wiretap order from a judge to listen in on your phone calls legally. But the U.S. Department of Justice believes that police don't need one if they want to eavesdrop on what touch tones you press during the call.

Those touch tones can be innocuous ("press 0 for an operator"). Or they can include personal information including bank account numbers, passwords, prescription identification numbers, Social Security numbers, credit card numbers, and so on--all of which most of us would reasonably view as private and confidential.

That brings us to New York state, where federal prosecutors have been arguing that no wiretap order is necessary. They insist that touch tones cannot be "content," a term of art that triggers legal protections under the Fourth Amendment.


Friday, January 9, 2009

Top cops urge greater focus on cybersecurity

With cybercrime booming and terrorists becoming more proficient in using the Internet, the United States and other nations must put a greater focus on solving the problems posed by Internet threats, top law enforcement officials said this week.

Shawn Henry, assistant director of the FBI's cyber division, told attendees at the International Conference on Cyber Security in New York on Tuesday that cyber attacks on critical infrastructure come second in importance only to the threat of weapons of mass destruction, Agence France-Presse reported. Deputy Attorney General Mark R. Filip echoed the sentiment on Wednesday, stating that organized criminals are becoming more adept at using the Internet for large, complex schemes.

"We must secure the our cyber infrastructure in a manner that addresses threats from foreign armies, adversary intelligence services, criminals and terrorists," Filip stated in prepared remarks. "It's hard to exaggerate how important this is or how hard it is to accomplish fully."


Thursday, January 8, 2009

Want to join MI6?


It could be you - do you have what it takes to be a spy?

Recruiting for HM Secret Intelligence Service used to be a subtle, stylish business. One afternoon in term time, a promising undergraduate at Oxford or Cambridge would find himself invited to tea with the eccentric classics don known to everyone, from master to cleaner, as the college talent spotter.

In the quiet of an oak-panelled study, the potential recruit (right school, right family) would be subjected to gentle interrogation over crumpets, before being asked (clink of spoon on china) if he had ever considered 'official work'. If the encounter proved satisfactory, the candidate received a letter inviting him to an interview at an address in St James's. The interviewer would beat about the bush for a while, before clearing his throat and coming to the point.

Fast-forward three years and there is our man in crumpled linen suit, sitting in a Lisbon café sizing up his target, a Czech military attaché.


Spyball webcam/spycam


The Spyball sounds like something straight out of a sci-fi movie. It’s a remote control ball that opens up to be a webcam/spycam. It’s rechargeable, Wi-Fi enabled, and can record both still images and video. Definitely one for capturing some embarrassing moments around the home, or for a totally different perspective at a party.

This tiny remote controlled robotic ball features built-in Wi-Fi connectivity and traverses around on sleek wheels, capable of smooth mobility and quick 360-degree turns. It is able to transform from a ball to a camera and back within seconds, and it goes about its job quietly - perfect for sneaking around the home, or office.


Bugged Teddy Bear Was Ex-Wife's Spy


Man Sues His Ex-Wife, Alleging She Hid Listening Device in Daughter's Toy.

The teddy bear was there for more than just a picnic: It turns out it may have been a spy.

An Omaha man is suing his ex-wife in federal court, alleging that she, or someone working on her behalf, planted a listening device in their daughter's ever-present teddy bear to gain information to use against him in an ongoing custody dispute.

William "Duke" Lewton, 36, and several acquaintances who claim they were recorded by the bear are suing Lewton's ex-wife Dianna Divingnzzo, her father and her former lawyer for allegedly recording conversations without their consent. Their daughter Ellanna is 5 years old, and the couple has been involved in a custody dispute for four-and-a-half of those years. Lewton first learned of the allegedly bugged bear when a judge reviewed notes between Divingnzzo and a court-appointed therapist, in which the girl's mother said recordings were made.


Tuesday, January 6, 2009

Cell Phone Spy Gadget Recovers Deleted Text Messages


Pleasant Grove, Utah - March 31, 2008 - Paraben Corporation, a digital forensic Technology, provider announced today that it has released SIM Card Seizure v1.0.2. This software, combined with a SIM card reader, can download the entire contents of a SIM card, including deleted data. SIM cards (Subscriber Identity Module) are used in GSM phones to store account information for your cell phone. Some phone models store information such as text messages and last numbers dialed on the SIM card. This opens up a world of information for people trying to recover text messages or phone numbers.

Paraben Corporation is the global leader in cell phone forensics and has been innovating and leading this field since 2002. SIM Card Seizure is one of many products offered for digital investigations of cell phone, PDA, and GPS device data.


Sunday, January 4, 2009

DECT wireless eavesdropping made easy


Conversations relayed through cordless household phones might be far easier to snoop upon than previously suspected. A new attack against phones based on DECT (Digital Enhanced Cordless Telecommunication) technology - demonstrated during the Chaos Communication Congress in Berlin earlier this week - might be carried out cheaply using off-the-shelf kit, together with a little know-how. A modified $30 VoIP laptop card running on a Linux portable were used to demonstrate the attack, which relies on using specially outfitted equipment to impersonate legitimate wireless base stations.

Encryption does feature as part of the DECT standard, but even when it's enabled, it might easily be bypassed in order to allow rogue devices to pose as the real thing, heise Security reports.


Thursday, January 1, 2009

Listening device discovered at CHP headquarters


A covert listening device has been discovered at the headquarters of the main opposition Republican People’s Party (CHP) in Ankara.

The bugging device was found in the office of Algan Hacaloğlu, the CHP’s assistant secretary- general, earlier this week by his secretary. The CHP’s chief accountant, Mustafa Özyürek, said on Tuesday that experts were examining the device.

“Our party has nothing to hide from anybody. But, wiretapping an individual is an insult to human rights and the freedom of communication. The government should prevent illegal wiretapping activities,” Özyürek stated. He said they had not filed a complaint with police over their discovery.