Wednesday, December 30, 2009
You’ve probably seen all types of spy cameras by now. Well now there’s a device for those of you that are paranoid that someone is keeping an electronic eye pointed directly at you. Just pull out this not so subtle device and you’ll know for sure. Of course with this big bulky thing, they’ll also know that you know. At least you’ll finally know the dreaded truth though. You’ll either find that you are being watched or that you’re just an incredibly paranoid human being.
The detector is portable, despite that it is a pretty bulky portable device. It has a 2.3” color display, auto scan as well as manual scan and can run for 3-5 hours. It has a couple different ways to keep it powered, you can either use the 4 AA batteries or just plug it into the wall with the Universal AC adaptor.
Tuesday, December 29, 2009
The big brother is always listening, no matter how quietly you speak. In case of cell phones, considering the encryption technology used by most of the GSM operators, it is like speaking on a public addressing system.
To bring this to the notice of the concerned bodies, Karsten Nohl started the most ambitious attempt to compromise the GSM phone system, which is used by over 3 billion people around the world. Others have cracked the A5/1encryption technology used in GSM before, but their results have remained secret. However, Nohl intended to go one big step further and planned to make the keys available to everyone on the Internet.
At the second day of the Chaos Communication Congress, he informed that he had cracked the code and published it for others to read and review. The GSM Association doesn't seem to be very happy with this development. According to NY Times, a GSM spokesperson told the newspaper that Nohl's activity is illegal in the UK and the United stated and that it was not in good faith -- " To do this while supposedly being concerned about privacy is beyond me.”
Monday, December 28, 2009
Understandbly, the White House is trying very hard to get out in front of the would-be Christmas bomber story. The head of the Department of Homeland Security isn't helping. I watched her on three shows and each time she was more annoying, maddening and absurd than the pevious appearance. It is her basic position that the "system worked" because the bureaucrats responded properly after the attack. That the attack was "foiled" by a bad detonator and some civilian passengers is proof, she claims, that her agency is doing everything right. That is just about the dumbest thing she could say, on the merits and politically. I would wager that not one percent of Americans think the system is "working" when terrorists successfully get bombs onto planes (and succeed in activating them). Read more ..
Sunday, December 27, 2009
A Somali news site said at least two officials are under investigation for passing on "sensitive information" to the South African Secret Service (SASS) and the United States's Defence Intelligence Agency (DIA).
The report claims that the African Union is probing the activities of an intelligence analyst from an East African country and a Somali-Tanzanian who works for the United Nations Support Office for Amisom (UNSOA) in Nairobi.
"(They) have reportedly been recruited separately to spy both on Amisom (African Union Mission to Somalia) and Somalis with the view of undermining the Djibouti Process and assisting the West in the War on Terror in East Africa," the news site mareeg.com reported under the headline "Somali Spy Network Exposed".More...
Saturday, December 26, 2009
This report provides an overview of federal law governing wiretapping and electronic eavesdropping. It also appends citations to state law in the area and contains a bibliography of legal commentary as well as the text of the Electronic Communications Privacy Act (ECPA) and the Foreign Intelligence Surveillance Act (FISA). It is a federal crime to wiretap or to use a machine to capture the communications of others without court approval, unless one of the parties has given their prior consent. It is likewise a federal crime to use or disclose any information acquired by illegal wiretapping or electronic eavesdropping. Violations can result in imprisonment for not more than five years; fines up to $250,000 (up to $500,000 for organizations); in civil liability for damages, attorneys’ fees and possibly punitive damages; in disciplinary action against any attorneys involved; and in suppression of any derivative evidence. Congress has created separate but comparable protective schemes for electronic communications (e.g., e-mail) and against the surreptitious use of telephone call monitoring practices such as pen registers and trap and trace devices.
Tuesday, December 22, 2009
ACORN critic Rep. Steve King (R-Iowa) is mystified that both the Democratic-controlled Congress and the Obama administration aren't doing much about the tax-subsidized organized crime syndicate ACORN even as evidence of its wrongdoing continues to pile up.
In an exclusive interview, the House Judiciary Committee member describes the ACORN saga as "the largest corruption crisis in the history of America."
"It's thousands of times bigger than Watergate because Watergate was only a little break-in by a couple of guys," said King. "By the time we pull ACORN out by its roots America's going to understand just how big this is."
LOS ANGELES -- The former owner of a Beverly Hills-based magazine has filed a complaint seeking $5 million from actor Tom Cruise, celebrity lawyer Bertram Fields and private investigator Anthony Pellicano that claims he was illegally wiretapped after Cruise filed a defamation suit against him.
Michael Davis Sapir, in a suit filed in Superior Court, claimed that Pellicano, working for Cruise and Fields, intercepted at least 1,000 conversations before the defamation suit was settled. Cruise filed the complaint after Sapir's Bold Magazine offered a $500,000 reward in 2001 for videotaped evidence that Cruise was gay. The magazine subsequently issued a press release claiming it had received a response to the offer.
Monday, December 21, 2009
Smartphones could be set to spark a whole new set of worries for corporate security managers. This year, there have been reports of several viruses targeting Apple's iPhone and a new family of worms using SMS text messaging to spread malware among 3rd generation Symbian devices like the latest Nokia handsets.
While researchers acknowledge the threat level is currently only small, they predict that as the use of such devices to connect to company networks and conduct mobile commerce increases, so the criminal gangs responsible for commercially-motivated PC malware will start to increasingly target smartphones and other mobile devices.
"The rise in threats to mobile devices is definitely real, although still a very long way from epidemic proportions," said Rik Ferguson, senior security advisor at IT security firm Trend Micro. "The real message is about preparedness, 2009 has seen a limited number of new threats, but a significant increase in their complexity and criminal intent."
Saturday, December 19, 2009
A great deal has happened since Britain's Security Service, MI5, was established in 1909 as a two-man operation.
It has provided invaluable information during two world wars, tried to fend off Soviet spies during the Cold War (with rather little success as the Cambridge Five led by Kim Philby shows), faced the IRA, tracked Communist connections to British unionists and has watched its role shift drastically from counter-espionage to counter-terrorism as the agency marks its centenary.
Christopher Andrew is a respected espionage chronicler and Cambridge University historian who was given access to MI5 records to write this interesting, engaging and massive look at his nation's clandestine anti-spy agency.More...
Friday, December 18, 2009
Tapping into drones’ video feeds was just the start. The U.S. military’s primary system for bringing overhead surveillance down to soldiers and Marines on the ground is also vulnerable to electronic interception, multiple military sources tell Danger Room. That means militants have the ability to see through the eyes of all kinds of combat aircraft — from traditional fighters and bombers to unmanned spy planes. The problem is in the process of being addressed. But for now, an enormous security breach is even larger than previously thought.
The military initially developed the Remotely Operated Video Enhanced Receiver, or ROVER, in 2002. The idea was let troops on the ground download footage from Predator drones and AC-130 gunships as it was being taken. Since then, nearly every airplane in the American fleet — from F-16 and F/A-18 fighters to A-10 attack planes to Harrier jump jets to B-1B bombers has been outfitted with equipment that lets them transmit to ROVERs. Thousands of ROVER terminals have been distributed to troops in Afghanistan and Iraq.More...
Thursday, December 17, 2009
A MAJOR hunt was in progress last night after a laptop crammed with secret data was stolen from inside the Ministry of Defence nerve centre.
The machine, plus an encryption key to unlock highly sensitive files, vanished from the heart of the MoD's London HQ.
It sparked fears that a "mole" is operating there.
Last night a source said: "This has the potential to become one of the most serious security breaches at the Ministry for a very long time.
"Laptops have been mislaid before, but not with encryption keys."
The computer was left in the HQ by a high-ranking RAF officer.
METUCHEN, N.J., Dec. 14 /PRNewswire/ -- Berkeley Varitronics Systems, Inc. (BVS), a leading provider of advanced wireless solutions and products to the domestic and international wireless telecommunications industry, today announced the release of an advanced hand-held cell phone detector fittingly called the Bloodhound. The Bloodhound will enable security officers to scan real-time for unauthorized cell phone activity in correctional facilities and detect the precise location of the caller using a Direction Finding Antenna.
Berkeley Varitronics Systems provides an alternative solution to cell phone jamming that will not interfere with 911 calls, citizens' cell phone use and public safety communications.
Tuesday, December 15, 2009
TEL AVIV (Reuters) - Israel is parlaying civilian technological advances into a cyberwarfare capability against its enemies, a senior Israeli general said on Tuesday in a rare public disclosure about the secret program.
Using computer networks for espionage -- by hacking into databanks -- or to carry out sabotage by planting so-called "malicious software" in sensitive control systems has been quietly weighed in Israel against regional enemies like Iran.
In a policy address, Major-General Amos Yadlin, chief of military intelligence, listed vulnerability to hacking among national threats that also included the Iranian nuclear project, Syria and Islamist guerrillas along the Jewish state's borders.
Yadlin said Israeli armed forces had the means to provide network security and launch cyber attacks of their own.
"I would like to point out in this esteemed forum that the cyberwarfare field fits well with the state of Israel's defense doctrine," he told the Institute for National Security Studies, a Tel Aviv University think tank.
Saturday, December 12, 2009
The smokers in your office are up to something... but what? They huddle outside in all sorts of weather, flicking their lighters, puffing on their cigarettes, and discussing what you're pretty sure is a plan to take over the world. Or at least the office park.
And you have your own plan, an awesome plan to take them down by collecting evidence of their nefarious schemes.
You'll grab the Spycam Classic Lighter Camera, walk out to their area with a candy cigarette and record their smoke break conversation while trying futilely to light your sugar stick.
How To Protect Yourself From Being Secretly Video TapedCHESTERFIELD, MO (KTVI-FOX2now.com) - The case against a Chesterfield CEO who police say secretly recorded women in a bathroom is expanding. We first told you about the story Wednesday night. Now, more potential victims are calling Chesterfield police. Jack Eigles, 55, is accused of using a hidden camera to covertly record women in the ladies' bathroom at Corporate Cash Flow Solutions on Long Road in Chesterfield, Missouri.
Eigles, who lives in Chesterfield, founded the company and is the President and CEO. When we first reported the story Wednesday, Chesterfield police said they had three to five victims. After our story aired, police say they received five to ten new calls. Some of those might be potential new victims. Others were just concerned about contact they had with Eigles.
"We take all of this information and build even more of a case," explained Chesterfield Police Lieutenant Steven Lewis.
Thursday, December 10, 2009
The significance of a counter-measures team set up by Shell in March 2007 is now becoming clearer. We only became aware of it due to a Shell internal email dated 9 March 2007 released to us as a result of an application to Shell under the Data Protection Act.
Days later, on 21 March 2007, Shell initiated an IT project to “monitor internal e-mails from Shell servers globally to Donovan and is also monitoring web traffic to determine internal traffic to their website”. The relevant Shell internal email states: “There is history of several former employees taking internal laundry to Donovan also, internal e-mails have appeared on his website.”More...
Tuesday, December 8, 2009
Who needs anonymous sources when the government is perfectly capable of leaking its own secrets?
Government workers preparing the release of a Transportation Security Administration manual that details airport screening procedures badly bungled their redaction of the .pdf file. Result: The full text of a document considered “sensitive security information” was inadvertently leaked.
Anyone who’s interested can read about which passengers are more likely to be targeted for secondary screening, who is exempt from screening, TSA procedures for screening foreign dignitaries and CIA-escorted passengers, and extensive instructions for calibrating Siemens walk-through metal detectors.
The 93-page document also includes sample images of DHS, CIA (see above) and congressional identification cards, with instructions on what to look for to verify an authentic pass.
The manual, titled Screening Management Standard Operating Procedure, is dated May 28, 2008. It contains this warning: “NO PART OF THIS RECORD MAY BE DISCLOSED TO PERSONS WITHOUT A ‘NEED TO KNOW.’”More...
Friday, December 4, 2009
WASHINGTON — Can Canada be trusted?
In the midst of what turned out to be a bogus espionage scare over commemorative coins, senior Pentagon officials speculated whether Canadians — widely considered to be among America's closest allies — might be "bad guys" involved in the spy caper. "Who knows?" one official wrote in secret e-mails obtained this week by The Associated Press.
The espionage warnings from the Defense Department caused an international sensation a few years ago over reports of mysterious coins with radio frequency transmitters, until they were debunked. The culprit turned out to be commemorative "poppy" quarters with a bright red flower manufactured in Canada.
But at the height of the mystery, senior Pentagon officials speculated about Canada's involvement, according to e-mails marked "Secret/NoForn" and obtained by the AP under the U.S. Freedom of Information Act. The messages reflect the no-holds-barred attitudes over an inherent lack of trust within U.S. spy agencies.
"I don't think it is an issue of the Canadians being the bad guys," the Pentagon's counterintelligence chief wrote, "but then again, who knows."More...
Modern technology might be making life easier for some, but it flat-out perplexes many people, including one Elgin criminal.
Miguel Bribiescas, 25, admitted to placing a pen-size spy-camera in a unisex employee bathroom at Ridgefield Industries Inc. According to authorities, the camera did record one female employee without her permission before someone discovered the device on July 31 and turned it over to police.
But when police watched the video, the very first recorded scenes were of Bribiescas looking into the lens and trying to figure out his own camera. In fact, most of the recorded footage was of the confused criminal handling the device.
It's likely that if he was dumb enough to attempt this perverted crime, he probably wasn't smart enough to read the camera's manual first.More...
Thursday, December 3, 2009
Want to know how much phone companies and internet service providers charge to funnel your private communications or records to U.S. law enforcement and spy agencies?
That’s the question muckraker and Indiana University graduate student Christopher Soghoian asked all agencies within the Department of Justice, under a Freedom of Information Act (FOIA) request filed a few months ago. But before the agencies could provide the data, Verizon and Yahoo intervened and filed an objection on grounds that, among other things, they would be ridiculed and publicly shamed were their surveillance price sheets made public.
Yahoo writes in its 12-page objection letter (.pdf), that if its pricing information were disclosed to Soghoian, he would use it “to ’shame’ Yahoo! and other companies — and to ’shock’ their customers.”More...
Spy Pix is an essential tool for any spy who wants to hide and send secret messages in plain view.
Maybe you’re an international spy who needs to send a covert message to a fellow operative. Or you’ve just infiltrated enemy headquarters and need to transmit top secret plans. Or perhaps you have an embarrassing photo of your friend that you want to hide in plain view.
Spy Pix uses steganography, which comes from the Greek words steganos (”covered”) and graptos (”writing”), to hide one image inside of another decoy image. To a casual viewer, only the decoy image is seen. However, for a seasoned spy, the image can be decoded with Spy Pix to reveal the hidden message.