The ‘Real-Life Q’

Gizmodo has an interesting interview with Ralph Osterhout, a man who builds spy gadgets for a living, interview by Sean Hollister.

As a boy, Osterhout was so enamored with Ian Fleming’s Bond novels that he decided to become a spy himself. He trained himself to shoot, drive, fight, even build his own weapons and gadgets. He studied the Bond films and, at the age of 22, built his own miniature submarine like the ones in the Bond classic Thunderball. He started a company building high-tech dive gear, and traveled around Europe to visit the exotic Bond locales he’d read about. “I stayed at the same hotels, went to the same restaurants and villages, smoked John Player No. 10 cigarettes,” he once told Wired.

That’s roughly when the US government came calling. They needed Bond-grade gear for their elite Navy SEAL divers. Soon, […]

2016-12-16T20:23:41-05:00February 22nd, 2015|

LA Confidential; West Hollywood council deputy suspended in eavesdropping case

We’re not sure how this eavesdropping was accomplished, whether through a bugging device or perhaps just through the phone. Phone call recording is often a built in feature for phone systems, but can also be performed through the use of external devices. Phone technicians could have access to the recordings. Even digital phones and VOIP phones can be recorded easily. It could be legal in many locations, if the person doing the recording is part of the conversation. What happens with the content of recordings, on the other hand, could be illegal and can often lead to detrimental results. Wayward employees or staff often think they acting righteously as whistle blowers when committing eavesdropping, but they could be breaking the law and end up in prison.

By Hailey Branson-Potts, LA Times;

A West Hollywood City Council aide has been suspended and is being investigated by sheriff’s detectives on charges of eavesdropping on […]

2016-12-16T20:23:42-05:00February 14th, 2015|

TV vs Reality: former intelligence officers discuss new NBC spy show “Allegiance”

NBC’s new spy drama “Allegiance” was previewed at the International Spy Museum in Washington, DC, along with a panel discussion with former intelligence officers including Vince Houghton, historian and curator at the Spy Museum, CIA analyst Mark Stout, and former KGB General Oleg Kalugin. Their comments offer some insight into the real world of spying.

10 Things We Learned Watching Allegiance at The International Spy Museum,
By Nancy Dunham, February 7, 201, pastemagazine.com

If you watched the premiere of Allegiance, NBC’s new spy drama, on Thursday night, you likely wonder what the creators can possibly do to top it. Modern day sex, lies and videotape—not to mention some pretty gnarly torture and a spy-within-a-spy plots—kept us on the edge of our seats when we previewed it at the International Spy Museum in Washington, D.C.

Still, questions arise as to whether or not the show, which centers on a 40-something Brooklyn couple (she’s Russian-born, […]

2016-12-16T20:23:42-05:00February 9th, 2015|

Hacked phone systems lead to credit card fraud

Phone system and voicemail hacking have been going on ever since they were invented it seems. Recent attacks, though, show a new level of complexity and severity.

THEN

In the 80’s hackers would get hold of DISA numbers (Direct Inward System Access- numbers that were often used to allow remote workers make long distance calls on a company’s phone account). These numbers allowed the hackers to route their dial-up modems through toll free numbers that passed the call through the company PBX phone system. The hacker could then access long distance electronic bulletin board numbers and not worry about the cost.   (Long distance calls were a bit more expensive back then, and no Internet as we know it today.)

In the 90’s, voicemail systems became much more affordable and the varieties of hacks grew. A hacker from the Philippines calling himself “the sniper” became well known in certain telecom circles hacking numerous US based PBXs, forcing the systems […]

2016-12-16T20:23:42-05:00February 6th, 2015|

FBI busts alleged Russian spy ring in New York City

They “tried to recruit U.S. citizens as intelligence sources in New York… Their targets included people working for ‘major companies’ and ‘young women with ties to a major university located in New York,’ according to authorities.”
New York (CNN) The men would sometimes say they needed to meet to exchange tickets, but they never seemed to end up actually attending or discussing a sporting event or a concert. They once talked about going to a movie. But that was it.
The reason for the puzzling behavior, according to a federal complaint unsealed Monday, is that the men were Russian spies exchanging intelligence information in New York City. They used tickets and other everyday objects — like […]
2016-12-16T20:23:42-05:00January 28th, 2015|

Panama: ex-president at center of wiretap probe

From McClatchyDC by T. Johnson

— When the United States rejected former Panamanian President Ricardo Martinelli’s request for spying equipment to eavesdrop, U.S. diplomats feared, on his political enemies, the former supermarket baron turned to another source: Israel.

Now scores of Panama’s political and social elite are learning that the eavesdropping program that Martinelli’s security team set in place sprawled into the most private aspects of their lives – including their bedrooms. Rather than national security, what appears to have driven the wiretapping was a surfeit of the seven deadly sins, particularly greed, pride, lust and envy.

Nearly every day, targets of the wiretapping march to the prosecutors’ office to see what their dossiers contain, often emerging in distress. Martinelli, who left office in July, is facing a rising tide of outrage not only over the wiretapping, but also over reports of vast corruption. His personal secretary has left […]

2016-12-16T20:23:42-05:00January 28th, 2015|

UK: Former deputy prime minister finds car was bugged.

John Prescott seems to be taking this find in stride, but it could be a sign of something more sinister going on. Vehicle TSCM sweeps are an important part of regular security precautions.

The former Deputy Prime Minister discovered the device hidden in his car when he took it to a garage because it had problems starting. John Prescott has turned detective after finding his Jaguar had been bugged.

John Prescott with tracker found in his car.

Mechanics found a tracker concealed under the driver’s seat that was hooked up to the car battery, draining its power.

The sophisticated device uses mobile phone technology and is capable of reporting the Jag’s movements at all times. It also has an inbuilt microphone enabling it to pick up conversations.

And the 6 inch-square black box is even capable of immobilizing the car if instructed to by mobile phone.

Lord […]

2015-01-18T19:03:53-05:00January 18th, 2015|

Waiting to be hacked… new consumer devices offer new eavesdropping potential.

Internet connected devices are attracting a lot of attention. Many, though, have potential security vulnerabilities just waiting to be hacked.  The following devices may not have been exploited yet… but considering the possibilities, it’s only a matter of time. Some of these just appeared at the CES show in Las Vegas and may not have hit the street yet but many are already at work in homes and offices.

Netatmo Welcome, uses facial recognition to detect and alert you to people in view. “Welcome” sends the names of the people it recognizes to your smartphone. The camera also notifies you when it sees an unknown face. Through the app you can check who is currently home, access live stream and past events.

Netatmo Welcome

Netatmo touts “stunning HD images, extensive 130 degree field of view, and superior night vision

 

Petcube brings video and audio monitoring into your living room. […]

2016-12-16T20:23:43-05:00January 12th, 2015|

Know your eavesdropping laws, even if you’re a former police chief…

Former Windham, NY police chief, now the town supervisor, has been arraigned on eavesdropping charges following a 10 month state police investigation. Stacey Post is accused of planting an audio and video recording device in the Windham town office building, recording employees without their knowledge.

The arrest goes back to March, 2014, when a Bureau of Criminal Investigation unit executed a search warrant at Post’s office and at her residence. A computer was seized from her office.

She faces three counts of felony eavesdropping and one misdemeanor count of possessing eavesdropping devices. Further charges are pending.

 

More from Albany, NY, News 13 WNYT:

Stacey Post, Windham, NY town supervisor accused of eavesdropping on town employees.

2016-12-16T20:23:43-05:00January 12th, 2015|

Hackers attack LA road signs

Science fiction stories often have tales of computerized devices taking over the world. Probably a more immediate worry, rather than the devices controlling us, would be hackers take over those devices, as that is already happening.  Cyber security researcher, Graham Cluley, clues us in on happenings in downtown LA where hackers changed the words on a traffic sign. Not the first time, of course. His article also mentions road signs warning of approaching Daleks and even a pending British invasion.

The threat of a mastermind Moriarty broadcasting a sinister message to the world through every road sign, advertising sign, and every TV channel, is still a bit distant, but as attacks appear daily on individual devices, the threat comes closer to home. Any devices that have remote programming access via the internet could be vulnerable, from road signs or laboratory equipment  to phone systems and alarm systems – any network connected device. On […]

2016-12-16T20:23:43-05:00January 12th, 2015|

Walls have ears: Toronto’s new mayor wants better walls to prevent eavesdropping.

Audio leakage from an office or boardroom is a significant but often overlooked concern. Toronto’s new mayor is taking it seriously. Repairs on walls have been requested to help prevent inadvertent eavesdropping. “In this office you can hear straight through the wall.” …”the issue is that the drywall in the office does not extend above the tiles in the drop ceiling, so sound carries through the open space above the partitions.”  said Amanda Galbraith, director of communications in Mr. Tory’s office. A proper TSCM inspection will help reveal such vulnerabilities.

by Elizabeth Church, The Globe and Mail

Toronto’s new mayor, John Tory, came to power on a pledge to build bridges, but inside his city hall office, he’s putting up better walls.

Turns out the divider between Mr. Tory’s boardroom and the office next door – occupied by none other than former mayor Rob Ford – is in need of an […]

2016-12-16T20:23:43-05:00January 10th, 2015|

Morgan Stanley sacks employee who pilfered account data

...companies now no longer face just external threats. Employees may give in to threat or greed, and with their access to information, can cause a data breach without specialized knowledge or cyber security skills. Staff are often given far-reaching data access rights, but with this power, rouge employees can prove to be a serious risk to corporations. While the threat of insiders is unlikely to wane, companies can protect themselves more effectively by setting in place access restrictions to sensitive data and monitoring employee access to information caches.

2016-12-16T20:23:45-05:00January 7th, 2015|

The Sony hack should make cyber security a hot boardroom topic

From Fortune, by Tom Huddleston, Jr.

The massive scale of the cyber attack shows why top executives need to be more involved in shaping cyber strategy at companies.

Spooked by the Sony Pictures hack and the leak of sensitive documents, companies of all kinds are now scrambling to shore up their cyber defenses.

The movie studio’s breach is just the latest in a series of hacks in recent years, including attacks on Target, Home Depot, and JPMorgan Chase that collectively compromised the personal information of tens of millions of customers. But Sony’s hack stands out as a more frightful example because of hackers’ unfettered access, the huge damage they caused and the ultimate capitulation to their demands, seen by Sony’s controversial — albeit short-lived — decision to shelve the comedy film The Interview.

“I think the scale of this impact on Sony is what’s going to make a lot of […]

2016-12-16T20:23:45-05:00December 28th, 2014|

Skype for Android Bug Can Be Used for Eavesdropping

A vulnerability in Skype that could be used for eavesdropping has been discovered and described by Reddit user “Ponkers“. He explains it this way: “All you need is Skype on two [of your own] devices, call someone with one, then disconnect it from the net as it’s ringing. Their phone will now call you back on your other device, camera, mic and all.”

Detailed graphic of Skype Interruptus [Image:Ponkers/Reddit]  

 

Ponkers’ description may not be that clear, and the cute graphic may not help, so I’ll try to explain it again. Use Skype on your phone AND on your computer, logged in on both devices, then place a Skype call to a different party with Skype on their Android phone.  Before they answer, drop the Internet connection on the device you originated the call from (such as turning on airplane mode). The recipient device may try to automatically reconnect […]

2016-12-16T20:23:45-05:00December 23rd, 2014|

Surveillance alert: Elf On A Shelf and a Santa Spy Cam

Ontario professor Laura Pinto thinks the popular “Elf on a Shelf”  toy is conditioning children for growing up in a surveillance state. Is that any different than Santa knowing when you are sleeping, when you’re awake, and if you’ve been naughty or nice?  It is apparently quite sinister.  

from the Inquisitr.com

Laura Pinto is a digital technology professor at the University of Ontario Institute of Technology. Pinto recently published an academic report which argues that the Elf On The Shelf book fosters a “sinister” message. The “Who’s The Boss” paper claims that the idea of an elf reporting back to Santa Claus each night in regards to the behavior of children, “sets up children for dangerous, uncritical acceptance of power structures.”

What you looking at?

Elf on the Shelf is a story about how

2016-12-16T20:23:45-05:00December 17th, 2014|

Internal threat: Spying, subterfuge and stolen treasure- Inside Nike and Adidas

by Drew Harwell, Washington Post

The massive heist from the world’s biggest sportswear firm was, as Nike attorneys allege, an inside job.

Nike vs Adidas

Faking a broken laptop, one of the sneaker giant’s top directors is said to have met secretly with an interloper to copy some of what a Nike lawsuit this week called the firm’s “most important and highly confidential” intelligence.

Days later, the director and two other elite designers defected to the firm’s bitter rival, allegedly scrubbing e-mails and text messages that, attorneys said, hid “evidence of their betrayals.”

 The claims of stealth and subterfuge have reignited Nike’s decades-long sneaker war with Adidas, the German-based shoe titan and Nike’s chief competitor. But they have also cast a spotlight on the high-stakes palace intrigue hidden beneath the world’s fiercely competitive, multibillion-dollar sneaker and sportswear empire.
2014-12-16T17:40:52-05:00December 16th, 2014|

Future watch: iPhone with laser beams, 3D mapping, more…

Consumer technology eventually encroaches on ideas that were only dreamed of in the past. Developments come quickly these days, so it’s worthwhile to keep an eye on where things are going. An eavesdropping technique that has been difficult to deploy in the past, could also be built right into an iPhone if this reported patent comes to fruition. Lasers can be used for eavesdropping by beaming onto a distant object or window pane, then interpreting reflections of vibrations of that beam in order to get audio from the target room. If the lasers described below get built into a smart phone, I’m sure it wouldn’t be long until an app is developed for using them for eavesdropping as well. As it is, though, a pocket-sized 3D laser mapping device would also be a spy’s delight. 

“such technology may result in museums and other public venues [not to mention engineering and […]

2016-12-16T20:23:46-05:00December 8th, 2014|

NSA tools highlight the need for Cyber Security and TSCM to work together.

Pages leaked from the supposed National Security Agency – Advanced Network Technology (NSA-ANT) catalog reveal eavesdropping and spy technology using advanced wireless communications (revealed in Der Spiegel in 2013 here). Edward Snowden may not be on your Christmas list, and the NSA may or may not be out to get you, but here’s the thing, if the NSA has such devices, surely other nation states and advanced criminal espionage organizations can be expected to have similar items available. In the past, one may have assumed this type of technology existed, but now there is clear description of some of the potential threats.

A number of the NSA-ANT product sheets are displayed on Wikipedia as well as other websites revealing leaked information. Take a look at a few of them listed below.

Detection of such devices goes beyond the normal cyber-crime security efforts. These miniature circuits can appear as standard pieces […]

2016-12-16T20:23:46-05:00November 28th, 2014|
Go to Top