Saturday, February 28, 2009

Appeals Court Allows Classified Evidence in Spy Case

A federal appeals court dealt a blow to the Obama administration Friday when it refused to block a judge from admitting top secret evidence in a lawsuit weighing whether a U.S. president may bypass Congress, as President George W. Bush did, and establish a program of eavesdropping on Americans without warrants.

The legal brouhaha concerns U.S. District Judge Vaughn Walker's decision in January to admit as evidence a classified document allegedly showing that two American lawyers for a now-defunct Saudi charity were electronically eavesdropped on without warrants by the Bush administration in 2004. The lawyers — Wendell Belew and Asim Ghafoor — sued the Bush administration after the U.S. Treasury Department accidentally released the top secret memo to them.


Thursday, February 26, 2009

New film protecting against bugging and data eavesdropping.

German security and film technology specialist HAVERKAMP gets ready for electronic bugging and eavesdropping as well as attacks involving harmful electromagnetic radiation. A technical development which like a blow: HAVERKAMP integrates patented Signal Defenses® technology in its well-known series of high-security films PROFILON®. Result: Allowing light to pass through, the new PROFILON® SD offers substantial protection against radio frequencies (RF) as well as infrared (IR) and ultraviolet (UV) rays and as such, now increases the effective 'all-round' pro-tection of glass building exteriors against 'invisible' attacks.
The transparent high-tech security window film PRO-FILON® SD blocks the transmission of wireless and other freely transmitted electronic data , mo-bile phones and cordless inside the building through the glass. Furthermore, the high-performance film dampens attempts to transmit high-frequency electro-magnetic interference and protects people against harm-ful electromagnetic radiation.


Classified Documents Allowed in Espionage Trial


A federal appeals court ruled yesterday that two former pro-Israel lobbyists accused of violating the Espionage Act can use classified information at trial, the latest setback for prosecutors in the closely watched case.

The decision by the Richmond-based U.S. Court of Appeals for the 4th Circuit allows the former lobbyists for the American Israel Public Affairs Committee to introduce evidence from two classified government documents at their trial, scheduled for April 21. Attorneys for the lobbyists, Steven J. Rosen and Keith Weissman, consider the information crucial to the defense.

Rosen and Weissman are charged with conspiring to obtain classified information and pass it to journalists and the Israeli government.


Tuesday, February 24, 2009

Uribe denounces illegal wiretap


Colombian President Alvaro Uribe has said he did not give any orders to the country's intelligence service to tap phone calls of prominent figures.

Senior officials in the security service, Das, have offered to resign over claims that agents eavesdropped on politicians, judges and journalists.

Mr Uribe blamed the illegal wiretapping on what he called a mafia gang inside the secret service, the Das. He accused them of damaging Colombian democracy and his government.

Mr Uribe said he had never given a single order during his political career to investigate the private lives of his opponents.


Exiting workers taking confidential data with them


As layoffs continue apace, a survey released on Monday shows what many companies fear--exiting workers are taking a lot more with them than just their personal plants and paperweights.

Of about 950 people who said they had lost or left their jobs during the last 12 months, nearly 60 percent admitted to taking confidential company information with them, including customer contact lists and other data that could potentially end up in the hands of a competitor for the employee's next job stint.

"I don't think these people see themselves as being thieves or as stealing," said Larry Ponemon, founder of the Ponemon Institute, which conducted the online survey last month. "They feel they have a right to the information because they created it or it is useful to them and not useful to the employer."


Monday, February 23, 2009

Colombian prosecutors probe illegal wiretap scandal


BOGOTA (Reuters) - Colombian state prosecutors swooped on headquarters of the national intelligence agency on Sunday to probe charges that rogue agents illegally wiretapped politicians and judges as a paid favor to drug traffickers.

The telephone bugging accusations are the latest scandal to rock the state security agency, known as DAS, and could further stain President Alvaro Uribe's campaign to stamp out corruption of state law enforcement in the world's top cocaine supplier.

"I have ordered a probe of the DAS interception systems and controls," Attorney General Mario Iguaran told reporters. "If necessary, because the seriousness of this case, we could suspend operations in the DAS interception rooms."


Hackers swarm bank accounts

New and nasty banking trojans are on the rise on the Internet and attacking online bank accounts.

The new trojan programs — which wait on your hard drive for an opportunity to crack your online banking account — are different from traditional "phishing" e-mail scams that try to trick you into typing your login information at fake bank websites.

They're invisible, can steal data multiple ways and require no action by the victim to be launched.

"Phishing doesn't work as well as it used to," says Patrik Runald, security specialist at F-Secure, the Internet security firm. "Banking trojans provide a very effective and direct means for the bad guys to get their hands on the money."


Friday, February 20, 2009

Spy for Israel sold bugged cars to Hizbullah members

BEIRUT: To those who knew him, the Hizbullah-supporting car dealer from Nabatiyeh seemed an unlikely Israeli spy. But as Marwan Faqih adjusts to life in military custody, new details have emerged about his secret double life as an undercover agent for the Jewish state.

No-one suspected that every car he sold them was fitted with a satellite monitoring device that allowed Israeli intelligence agents to track their every move. In the end, the paper's sources say, it was a routine repair that led to the discovery of Faqih's secret double life.
According to the report, an auto electrician was trying to fix a problem with a Hizbullah vehicle when he discovered an "unfamiliar device" attached to the electrical system that he thought might have been causing the problem.


Investigators say he videotaped a 13-year-old boy in the bathroom

KENT COUNTY, Mich. (NEWSCHANNEL 3) - There is shock in a small community as a church volunteer has been put behind bars for what he allegedly did in his own house to a teenage boy.

David "Randy" Campbell is facing charges of capturing and distributing an image of an unclothed person, and using a computer to commit a crime. "The pictures were of a young male individual in what appeared to be a bathroom setting without his clothes on," said Lt. Kevin Kelley of the Kent County Sheriff's Office.

Investigators believe that Campbell hid a video camera inside the bathroom of his house on Division Avenue near the Kent/Allegan County border in Gaines Township, and then videotaped an underage boy without his knowledge or consent.


Thursday, February 19, 2009

TelTech Systems Introduces TrapCall to Unmask Blocked Caller ID


TOMS RIVER, NJ - TelTech Systems, the leading innovators of communications technology such as "SpoofCard" and "LiarCard," is excited to introduce "TrapCall," the first cell phone service that unblocks blocked calls, and so much more.

After having great success with the oft-controversial SpoofCard, TelTech is excited to launch their latest endeavor: TrapCall. TrapCall not only unmasks blocked or restricted calls, but it is also the only technology that can record incoming calls -- a first in cell phone technology!

So how does it work? 


Hidden Spy Camera & Mic Found Inside Digital TV Box


A popular video circulating on You Tube shows the discovery of a spy camera and a microphone hidden inside a digital TV converter box. Such devices are part of a government and industry surveillance program that is undoubtedly connected to the forced digital TV switchover being rolled out in the UK and US.

“I could not believe my eyes,” states the blurb accompanying the video clip, “I have a friend who is kind of a conspiracy theorist. He was trying to convince me that many of the digital TV convert boxes that are coming out have microphones and cameras built into them. Knowing a bit about electronics I bought one of these devices opened it up fully intending on proving him wrong. To my surprise he was right. This device has both a miniature camera lens and what looks like a microphone. I was so shocked I took pictures and video. Please send this out to everyone you know who is using one of these devices.”


Kazakh Officials Deny Involvement In Austrian Spy Scandal

ASTANA -- Kazakh officials have denied any involvement in an espionage scandal in which two Austrian policemen were arrested for spying for Kazakhstan. 

Kazakh National Security Committee (KNB) spokesman Kenzhebolat Beknazarov told RFE/RL's Kazakh Service that the KNB had nothing to do with the men arrested and has not received any official documents about the case. 

The Vienna prosecutor's office told RFE/RL that the two officers are suspected of gathering information from a computer about Rakhat Aliev -- the former son-in-law of Kazakh President Nursultan Nazarbaev. 

Wednesday, February 18, 2009

Telstra chief's top-secret phone 'stolen'

A pickpocket has reportedly swiped Telstra boss Sol Trujillo's new mobile phone which is loaded with top-secret software.

The new software, built by Microsoft and not due for release until the end of the year, was on the phone given to Mr Trujillo at the World Mobile Congress in Barcelona, Spain, earlier this week. 

Experts say Microsoft faces an industrial espionage threat if the software falls into the wrong hands, theDaily Telegraph reports. The phone is believed to be either an HTC Touch Pro2 or the HTC Touch Diamond2, which both utilise the new Windows Mobile 6.5 operating system. The software is so classified journalists at the World Mobile Congress were not allowed to touch the new HTC phones.


You too can become the "Ultimate Spy"

It was Colonel Mustard, in the library, with the pipe wrench. Anyone who has ever played the board game Clue (or Cluedo in the UK) will most certainly recognize the first sentence as one of several murder mystery combinations that players must try to figure out during the course of the classic game. So popular is this murder mystery board game, it has seen various incarnations and versions and video games over the decades and even saw a movie released in 1985.

Clue has grown over the ages and a new version coming later this year is taking advantage of common technology to include a gadget that most people own and can use as part of the game. The gadget I’m referring to is the cell phone as the upcoming version of Clue called Secrets and Spies will use text messaging as a method to help players enjoy the game.

Tuesday, February 17, 2009

Police seize surveillance equipment from Chelsea landlord


Police have executed a search warrant at a Chelsea home after a woman complained that her landlord broadcast naked images of himself on a closed-circuit television monitor in the upscale boarding house.

The Citizen has learned that the tenant, in statements to Quebec police, also said she discovered a camera hidden in an unoccupied room in the rooming house, its lens directed at the doors to her bathroom and bedroom.

The police search, conducted by officers from the MRC des Collines force, was executed at Xavier Chouart’s home on Highway 105, just north of Gatineau on Feb. 11.

Mr. Chouart, 48, told the Citizen that he installed the camera as an anti-theft measure. He said the accusation that he exposed himself is “completely false.”


Criminals using Skype, say Italian police


The Italian police force has become the latest to voice complaints that the Skype VoIP service is undermining their use of wiretapping in criminal investigations.

According to a BBC report, authorities in Milan have admitted that organised crime in Italy is increasingly turning to encrypted Skype sessions for critical communications as a way of stymieing remote surveillance.

To back up the claim, customs and tax police are said to have overheard a drug trafficker recommending the use of Skype to discuss confidential details of a consignment, making it impossible for the authorities to intercept it. Wiretaps are heavily used by the Italian police, leading to calls in some quarters to limit their use.


Saturday, February 14, 2009

Hacker Says Obama's BlackBerry Can Be Breached

There's a new "holy grail" for hackers -- President Obama's super-secure BlackBerry.

Despite warnings from his advisers, the president insisted on keeping his beloved PDA, which now has specially designed superencrypting security software.

But that just makes cracking into it more challenging -- and, yes, it can be done, says the world's most famous hacker.

"It's a long shot, but it's possible," Kevin Mitnick told "You'd probably need to be pretty sophisticated, but there's people out there who are."


Deutsche Bahn shaken by spying scandal

Deutsche Bahn is in deep trouble. Not only has the state-owned operator had to postpone a recent planned part-privatisation because of the financial crisis. Now it is also accused of spying on its own staff.

"I am so angry, I still can't believe that they were spying on their workers for so many years," says one employee, who does not want to be identified, as he nervously looks around at the crowd outside the underground station at Potsdamer Platz.

Although people's faces were concealed by large woollen hats and scarves, it seemed as if he was scared that someone would recognise him.


Tuesday, February 10, 2009

Chadema raps police over bugging device

The opposition Chadema yesterday berated the police for "colluding with politicians", while urging the Inspector General of Police to "fully investigate" the unearthing of bugging devices in two opposition legislators' hotel rooms on Thursday.

Gadgets believed to be bugging devices were found on Thursday night in hotel rooms where Chadema secretary-general Willibrod Slaa and Civic United Front (CUF) representative for Konde, Dr Ali Tarab Ali, both of whom are attending the current parliamentary session, are staying in Dodoma.

On the day the gadgets were found, Dr Slaa said he had earlier received a "mysterious" phone call, warning him about "bugging devices" in his room.


Businessman bugged wife 'murdered her.

Businessman who bugged wife 'murdered her after she told a friend she didn't love him'

A millionaire businessman accused of killing his wife today admitted secretly bugging her conversations to find out if she was having an affair.

Martin Hale, 51, was devastated when he learned from a tape of Maureen, 42, talking to a friend that she had never loved him.

The confession sent him into a rage and he attacked his wife, punching her in the head several times.

But the father of four denied killing his wife of 14 years today, saying his family was 'the most important thing' in his life.

No trace of Mrs Hale has ever been found following her disappearance from the family home nearly ten years ago.

Her husband was charged with murder after police re-opened the case last year.


Callpod offers Keeper software for iPhone


Interestingly enough, despite the iPhone’s popularity across both generations of the handset, there are still no safeguards in place to keep your precious data protected from prying eyes, making it one of the easier way to steal a user’s identity if you’re so inclined. Hence the existence of Keeper, touted to be the “ideal solution to protect vital information including account numbers, passwords, social security numbers and anything else that users need to protect” by Callpod. Features of Keeper include :

  • Military-Grade Encryption (128-bit AES)
  • Import/Export/Backup your data
  • Share data between your PC/Mac, multiple iPhones
  • Real-time Search
  • Self Destruct Mode
  • Keeper is stable, secure, fast and extremely easy to use.

Monday, February 9, 2009

Foreign spies bug British offices


Spies from at least 20 countries are targeting British businesses to steal industrial secrets. Spooks are bugging offices, intercepting phone calls and infiltrating corporations to gain commercial details worth millions. 

Senior security sources say networks from Iran, Russia and China are "highly active" here. But other socalled allies such as France, Spain and Saudi Arabia are also involved. A report leaked to the Sunday Mirror says medical advances, particularly in genetics, are one of the spies' main targets. It states: "Intelligence services ... are targeting commercial enterprises far more than in the past.

Spies from at least 20 countries are targeting British businesses to steal industrial secrets.


Sunday, February 8, 2009

Bugging device in Slaa's hotel room

Dodoma regional Crime Officer, SSP Salum Msangi (left) examines a gadget found under a mattress in Karatu MP Dr. Wilbrod Slaa room in Hotel 56 in Dodoma on Thursday .Inset is the suspected bugging.

There was drama in Dodoma when gadgets believed to be bugging devices were found on Thursday night in the hotel rooms of Chadema Secretary-General Willibrod Slaa and another opposition MP, both of whom are attending the current parliamentary session.

It was not immediately clear who might have been behind the covert operation and what their real intentions might have been, though the police, who were called immediately, said they had launched investigations.


Saturday, February 7, 2009

Foreign spies flock to Siberia

The counter intelligence service of Novosibirsk region has recently noticed an increase in activity by Asian-Pacific countries in Siberia. Dozens of foreign spies and agents have been discovered in the region in 2008, according to the FSB.

The FSB press service refused to go into precise details of any espionage, but announced that due to the efficient work of Russian counter intelligence dozens of professional state-secret hunters had been detected in Siberia in the past year.
The head of the regional FSB, Sergey Savchenkov, said some of the spies had been seeking top secret information throughout the region and had used all possible means to get confidential data from Novosibirsk scientists.

The high level of interest from foreign secret services may have been caused by the successful work of Siberian researchers. Speaking on Thursday, the deputy envoy of the President in Novosibirsk underlined their potential.


Wireless drug control


Could remote drug delivery devices be hacked?

Electronic implants that dispense medicines automatically or via a wireless medical network are on the horizon. Australian and US researchers warn of the security risks in a forthcoming issue of the International Journal of Biomedical Engineering and Technology.

With the advent of personalized medicine, advances in diagnostics and the miniaturization of sensors and control systems for delivering drugs automatically, the Remote Intelligent Drug Delivery System (RIDDS) may soon be a reality. Such devices, implanted under the skin, would remove the inconvenience of manual drug delivery. By connecting a RIDDS to a wireless medical control centre wirelessly patients with physical disabilities, learning difficulties, or who are otherwise unable to give themselves medication could benefit.


Surveillance Cameras Can Be Hacked

High-tech surveillance cameras introduced by government organisations are liable to being hacked by cyber criminals unless top security precautions are made, internet experts have warned.

Sensitive images recorded from motorways or financial institutions could be altered or removed if individuals succeed in hacking into the internet-based networks on which the cameras operate.

Government bodies across the UAE have previously used analogy CCTV cameras but according to suppliers, the trend is shifting toward internet-based cameras.

If security officials and police have the right password details, they are able to access these cameras remotely from their own laptops.


Star Trek USB Communicator dials up galactic jetsetters


Heads-up, Trekkies! We just stumbled upon the perfect complement to your LCARS-esque touchscreen, and chances are that you won't have to sell off too many Spock action figures in order to procure it. Created by Dream Cheeky, this VoIP / Skype phone is powered by USB and looks pretty much exactly like one of those classic Star Trek Communicators. Best of all, there's a velcro backing in order to mount it up for everyone to see. Because you will want everyone checking this out, right?

Beam me up Scottie...please! More...

Friday, February 6, 2009

DVR Hidden Cameras for budding spies

Ever wondered whether the maid you hired actually brings in her boyfriend to your apartment when you’re not around? If you’re thinking of catching a secret tryst on video, there are these DVR hidden cameras to consider - it comes in the form of an alarm clock like what you see on the right, but is connected to a special receiver and is smart enough to work only when it detects the presence of another human in the room.
Users can employ the cameras to watch nannies taking care of their children, office or business employees, inventory control at a warehouse, and many other types of covert use. With the SD card allowing anywhere from 8 to 144 hours worth of recording time, the user need not worry about running out of tape as with VHS tape, or space as with a DVD. The hidden camera’s DVR is completely contained within the system, therefore relieving worry of anyone noticing that they are being video recorded - no clicking noises, no lights on - the self recording hidden cameras are completely discreet.

Thursday, February 5, 2009


1/3 of HR people and Business managers admit to searching for potential and current employees’ Social Networking profiles for information about their background and behaviour; 24% admit that they have been put off by something they have found.

A study of 961 HR people and Business managers, commissioned by the World’s biggest people search website, can reveal that 1/3 admit to searching online for people’s social networking pages during the recruitment process and almost ¼ admit that the findings have put them off a potential recruit.
1 in 5 business managers that admit to searching for applicant’s online claim that the content they found was enough to put them off a candidate; the biggest turn-off’s were inappropriate drunk photos (47%) and rude comments (22%).


Fears that new Google software will spy on workers

Google has been accused of putting a spy in everyone's pocket by launching software which maps the location of mobile phone users anywhere in the world.

The internet giant is marketing its Latitude download, which is released today, as a way for friends to keep in touch or for anxious parents to keep tabs on their children.

But critics fear it will evolve into a spying tool for employers who want to track their staff or suspicious partners who want to check up on their other halves.

Simon Davies, director of human rights group Privacy International, said: 'Many people will see this as a cool technology but the reality is it will be a privacy minefield.'

Latitude will be available in 27 countries and will work on most mobile phones and Blackberries, although not iPhones.


Hidden camera violated nurses' rights


A hidden surveillance camera installed in a break room for nurses at Rideout Memorial Hospital in Marysville is among federal labor law violations a judge says the Fremont-Rideout Health Group undertook.

The California Nurses Association said the surveillance represents Fremont-Rideout spying on nurses in an effort to see such matters as who may be reading union brochures.

"We never found out if there was audio or not. We asked," Liz Jacobs, spokeswoman for the nurses association, said Tuesday of the camera surveillance. "A break room is where you should be able to have personal discussions."


Tuesday, February 3, 2009

Spying case is a first for Macomb computer team

Steven Keller befriended his neighbors by saying he'd do a little work on their car.

Then, police said, he sneaked into their 10-year-old daughter's bathroom, hooked up a remote surveillance camera and began recording her without anyone's knowledge.

That's the scenario described Monday by Macomb County Sheriff Mark Hackel, who announced charges against Keller, 39, of Bruce Township in a first-of-its-kind arrest by the Macomb Area Computer Enforcement team.

"We've had people with cameras taking pictures of other people, or using the video cameras on their cell phones, but we've never had a remote camera ... monitoring someone's activity," Hackel said.


Finger-Based ID Technology

Sick of memorizing computer passwords? Are your friends able to easily hack your genius "1234" login code ? Well, we do have some good news, effective personal technology protection is well on its way, and a new authentication method developed by Sony will require that computer thieves hack off one of your fingers in order to boot up your hard drive; sounds promising, right? Early today, Sony announced that they are in the middle of developing a new type of finger-based authentication technology, which they're calling Mofiria. Sure it sounds like a giant dragonfly from a Godzilla movie, but Mofiria is actually a pretty decent representation of what we as tech consumers can expect to see become the norm in the near future when it comes to protecting our personal electronics. Mofiria is different from other biometric authentication techniques in that it uses vein patterns instead of fingerprint patterns, and for a good reason.


Concealed camera found in courtroom office


SEBRING -- Employees in courtroom 309 discovered a concealed camera, and Preston H. Colby and the Highlands County Sheriff's Office (HCSO) are trying to discover why.

The camera, discovered by court employee Amy Peebles and cleaning staff on Jan. 23 in a vent, was photographed by a camera phone and reported to the HCSO.

According to an invoice from Tiger Direct, the camera in question, a Linksys model WVC200 Wireless Internet Camera with Audio was purchased on Jan. 16 and shipped to Brian Franza, 10th Circuit (Court) of Florida.

Franza is an employee of Highlands County, but is funded as an Information Technology employee by the circuit court.


Andover company claims corporate espionage

The Eagle Tribune
ANDOVER — A small Brickstone Square company is accusing a huge, Chicago-based financial services company of using high-tech robots to scan proprietary documents in a secure database and then using the information to steal its clients.

NewRiver Inc., 200 Brickstone Square, filed a lawsuit yesterday in Salem Superior Court alleging that Morningstar Inc., a $1.6 billion company, viewed tens of thousands of pages of documents using "screen scraping" technology, copying them and then using them to woo potential clients from NewRiver.

"We found out about this in early December," said Russell Planitzer, CEO of NewRiver. "We notified them before Christmas they were doing this. We went out to Chicago to see if we could resolve this. When we showed them, I thought they'd say, 'We'll never do this again.'"

Instead, they said, in effect, "We're not afraid of you," said Planitzer, who has headed up the $30 million company for three years.


Monday, February 2, 2009

Espionage employee slams "shameful" Microsoft

A former Microsoft employee accused of stealing company information has lashed out at Microsoft's lawsuit against him calling it "desperate and shameful".

Miki Mullor was employed by Microsoft for three years, but was fired and sued by the company for allegedly downloading documents related to a technology that locks copies of Windows to specific PCs.

According to Microsoft, Mullor intended to use these documents in a patent infringement suit he was lodging against Dell, HP and Toshiba on behalf of Ancora Technologies; a company which he was apparently still the chief executive of. A fact that Microsoft claims he failed to disclose.