Secure Mobile Phone

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Monday, 25 February 2013

Papal telephony

Posted on 14:02 by Unknown
(Updated: March 27, 2013)

Earlier this month, pope Benedict XVI announced his historical decision to step down from his office on February 28, 2013. This makes him the first pope to resign since 1415! Therefore, a good moment to take a look at the telephone equipment, which is used by this leader of almost 1.2 billion catholics.


Pope Benedict XVI, assisted by his private secretary, signs a papal bull.

In this picture we see pope Benedict XVI at work in his private study in the papal apartment of the Apostolic Palace in Vatican City. At the far right we can see two white telephones sitting on a side table: an older one with a rotary dial and a newer one with a keypad.

The same combination of a somewhat older rotary dial phone and a newer keypad telephone can be seen at the table of the guard, next to the main entrance door of the papal apartment:


Swiss Guard soldier garding the door
to the papal apartment, ca. 1989


Three rotary dial phones in different colors on a side table
next to the desk of pope John Paul II in the early 1980's.

To prevent people from directly calling the pope, the extension number of the papal apartment is listed nowhere, not even in Vatican phone books. Only a handful of people chosen by the pope himself have his number, which also changes with each new pope. Pope Benedict XVI had no a beeper or cell phone, but he could be reached through the cell phone of his personal secretary, msgr. Georg Gänswein.

The Vatican receives almost 2000 calls a day, and there are always a handful of people saying they must speak with the pope for whatever reasons. One of them was Steve Wozniak, the co-founder of Apple, who once dialed Vatican City, using a so called blue box. He identified himself as Henry Kissinger by imitating Kissinger's German accent and asked to speak to the pope. But due to the different time zone, he was sleeping at that time.*


A very rare picture of pope Benedict XVI using a telephone

The papal telecommunications started in 1886, at the beginnings of telephony, thanks to Giovanni Battista Marzi who invented the world's first automatic telephone exchange, which linked 10 separate phones, but could only make internal calls. A few decades later, Guglielmo Marconi effected the first Italian link via radio, connecting the Vatican and the papal summer residence at Castel Gandolfo.

After the 1929 Lateran Pacts agreement with Italy, by which the Vatican City State was created, the Vatican was finally allowed to send and receive calls to and from the rest of the world. Therefore, in 1930 a new central telephone exchange was donated by the International Telephone & Telegraph (ITT). It was installed in the Belvedere building and provided telephone services for approximately 360 end users in the various Vatican offices and residences. The telephone exchange was consecrated by pope Pius XI on November 19th, 1930.


The first Vatican telephone switchboard,
with the upper left lines 2 and 3 are for the pope
The book is the Annuario Pontificio, the directory of the Holy See
(Photo: David Seymour, 1948)

The Bell Rotary Telephone-system was state of the art at the time and had the following functions:
1. Dial a direct phone set inside the Vatican
2. Get a connection with any phone with only two numbers
3. Get an automatic connection with someone in Rome by just dialling the number and adding a "0" in front for an external line
4. Answer calls from outside the Vatican at a post with 2 seating areas
5. priority for some telephone sets for emergencies and important calls

Together with the new exchange, catholics in the United States donated pope Pius XI the first papal telephone: an apparently solid gold phone set, inlaid with mother-of-pearl, emblazoned with the papal arms and decorated with blue enamel. The phone is now for display at the Vatican State Telecommunications Department:


The first papal telephone, donated to pope Pius XI by catholics in the United States.
(Photo: Dancejill @ TripAdvisor)

This golden papal telephone was used by several popes, until the end of pope John XXIII's pontificate in 1963. Later, the phone in the pope's apartments was a standard phone in 'papal' white.

In 1957 the International Telephone and Telegraph (ITT) also presented a (less elaborate) ceremonial golden telephone to the Cuban dictator Fulgencio Batista. This was depicted in the 1974 movie The Godfather Part II, where "United Telephone and Telegraph" and American industrialists present a solid golden telephone to the Cuban dictator.


Pope Pius XI sitting at his desk, with the golden telephone.


Postcard showing pope Pius XII writing a letter. In the background we can
see the golden phone of Pius XI and another white telephone set,
probably made by the Italian manufacturer Olivetti.

In the forties and fifties it was very special when the pope was calling. For example, when Pius XII picked up the phone and said "que Pacelli" (his original family name), the receiving end would kneel to hear the papal message.

In 1960 the Bell telephone system was replaced by an ITT Pentaconta exchange with a capacity of 1500 numbers, which was later extended to 3000. In June 1992 the Vatican's third central telephone exchange was inaugurated, providing the Vatican with an advanced technological interface, qualifying the Vatican State amongst the first to have a completely numeric telephone network.

The new telephone plant was installed in a forepart of the Belvedere building and consists of a modern numeric telephone exchange with 5120 terminations. The exchange is also equipped with a numeric switch for operator call management and it is linked via radio to the San Giovanni in Laterano, the Palazzo di San Callisto and the Palazzo della Cancelleria. These Roman buildings are extra-territorial zones under jurisdiction of the Holy See.

Since 1948, the Telephone Service of the Vatican State has been run by members of the religious order of the Society of St. Paul. It employs over 30 laymen, a few priests and a dozen nuns, who are members of the Pious Disciples of the Divine Master. On account of their in-depth knowledge of foreign languages, they work for 24 hours a day in six-hour shifts as operators of the manual switchboard:


Two nuns operating the Vatican telephone exchange
(Photo: 30giorni, date unknown)

The Vatican Telephone Service is the telecommunications provider of Vatican City, which is part of the Governorate’s Department of Telecommunications since 2002. The Telephone Service maintains a complex infrastructure of telephone and data networks, designed and maintained by its own personnel. In 2005, the Vatican telephone service handled 8.5 million outgoing calls.

In November 2005 the telecommunications department moved into a new three-story brick building, with sleek, comfortable and modern facilities. They also include historical items, such as papal telephones and early technological equipment, on display in glass cases.


A better look at the present-day keypad telephone, here in
a room used by the cardinal secretary of state, Bertone


After the resignation of pope Benedict XVI, the cardinals of the Roman Catholic Church came together to elect a new pope. The traditional election was done in the famous Sixtine Chapel, but the cardinals stayed in the Casa di Santa Marta, with over 120 rooms. This guesthouse was build in 1996, and got a state-of-the-art Voice over IP (VoIP) telephone network, with Cisco 7911G Unified IP phone sets, as can be seen in the picture below:


A Cisco 7911G Unified IP phone on a side table in the Vatican
(Photo: Orbis Catholicus Secundus, December 2010)


After the Argentinian archbishop and cardinal Jorge Mario Bergoglio SJ was elected to be the new pope on March 13, he named himself Francis. Shortly afterwards he spoke to former pope Benedict by phone - the first time ever a pope calls his predecessor!

In the days to follow, pope Francis personally called quite a number of other people (including his dentist), probably with the Cisco phone from his Santa Marta suite, but maybe he is also the first pope using a mobile cell phone. We will see.


Sources and Links
- Web page of the Vatican Telephone Service
- Extensive article: On call 24/7: Vatican phone system directs thousands of call each day
- Blog posting: 'Cept for the Pope maybe in Rome
- Wikipedia article: Golden Telephone

See also:
- Bruce Schneier's blog about Hacking the Papal Election
- Article about Vatican admits secretly bugging its own clergy

Read More
Posted in Gold Phone, Vatican | No comments

Friday, 22 February 2013

Security Scrapbook Reader's Question - Spy School

Posted on 09:05 by Unknown
Q. "I really enjoy your articles. Let me ask you: Would a spy school go over here in the U.S.?"

A. It probably would. There are plenty of people - from kiddies to Mitty's - who think spying is cool, albeit illegal. Training is probably not illegal, just implementing the skills. 

I educate my clients on spying techniques, just so they know what to look out for. Being aware helps them protect themselves against spying. 

Come to think of it, we are one of the very few countries whose government spy agencies do not support the private sector with the business intel they collect. Perhaps there is a spy school niche market, to help us level the international economic playing field. Hummm... Just don't have your Bonds reporting to HR or Facilities, like the security departments I see in some corporations.

Examples of spy schools, games and books...
http://www.jamesbondlifestyle.com/news/bond-experience-launches-november-7th
http://thebondexperience.com
http://www.spymuseum.org/education-programs/
http://www.stilettospyschool.com/newyork.php
http://www.mi6academy.com/newyork.php
http://www.spyschool.com/
http://www.beyondweird.com/survival/sschools.html
http://www.fxnetworks.com/archer/spyschool (game for kids)

Spy School (book for kids) 
Another Spy School (book for kids)
So You Want to Be A Spy (book for kids)
So you want to be an industrial spy? (rare, out of print)
The Complete Idiot's Guide to the CIA (book)
Spy's Secret Handbook (Project X Top Secret) (book for kids) 

It's True! This Book is Bugged (book for kids) 
How to be a Spy: The World War II SOE Training Manual
The Spycraft Manual: The Insider's Guide to Espionage Techniques

The Official CIA Manual of Trickery and Deception
The Spy's Handbook: Learn How To Spy On Anyone At Anytime Without Getting Caught By Using Spy Gadgets And Other... 

 
Read More
Posted in advice, spy school | No comments

Thursday, 21 February 2013

Business Espionage - Quote of the Month

Posted on 10:22 by Unknown
“This is an absolute tidal wave of criminal activity, and we’re not even scratching the surface. We are literally having our nation systematically stolen out from under us.”

 – Brett Kingstone, a one-time victim of trade secret theft and writer of The Real War Against America, a book that details how his start-up company was crippled by the theft of trade secrets related to LED lighting. (more)
Read More
Posted in book, business, cautionary tale, employee, espionage, quote, trade secret | No comments

Spykpe

Posted on 10:01 by Unknown
A technology called Legal Intercept that Microsoft hopes to patent would allow the company to secretly intercept, monitor and record Skype calls. And it's stoking privacy concerns. (more)

We're shocked. q.v. - Yesterday's story.
Read More
Posted in business, government, VoIP, wiretapping | No comments

Express Scripts vs. E&Y - Trade Secret Theft Allegations

Posted on 08:28 by Unknown
Express Scripts Inc. sued the accounting firm Ernst & Young LLP and one of its partners for the alleged theft of trade secrets and misappropriation of the pharmacy benefit manager’s confidential and proprietary data.

The Express Scripts Holding Co. unit said in a complaint filed yesterday in state court in Clayton, Missouri, that it learned last year that accounting firm partner Don Gravlin had been “sneaking” into its St. Louis headquarters and e-mailing documents to a private Google account via the account of an Ernst & Young consultant...

The accountants allegedly took the equivalent of more than 20,000 pages of data, including pricing information, business strategy, projections and “performance metrics” documents, to aid development of Ernst & Young’s own health-care business segment, which includes Express Scripts and Medco Health Solutions Inc., which it acquired last year, as well as some of their competitors. (more)
Read More
Posted in business, email, employee, espionage, lawsuit, trade secret | No comments

Wednesday, 20 February 2013

U.S. Unveils New Strategy to Combat Trade-Secret Theft

Posted on 15:20 by Unknown
The White House unveiled a new strategy to exert pressure on China and other countries that engage in corporate espionage against the U.S. as part of a new Obama administration push to counter cyberattacks and commercial spying.

The strategy, released Wednesday in a report that was the subject of a White House meeting, raised the prospect of stepped-up U.S. trade restrictions on products and services derived from stolen trade secrets. Officials also outlined a series of diplomatic actions to reinforce the administration's commitment to curbing such thefts.
 

The new push comes on the heels of fresh revelations of Chinese cyberspying and represents an effort by Washington to respond to growing complaints about theft of military and corporate secrets, with a number of the allegations focusing on China. (more)  

Trade restrictions and diplomatic actions are historically ineffective, not to mention unrealistic and counterproductive when trying to develop a global economy. These hand slaps are likely viewed as a cost of stealing doing business. Reward outweighs punishment. 

The missing element in intellectual property protection... 
Holding caretakers responsible. If your information would hurt the country if stolen, there should be a legal duty to protect that information. Add that element to trade restrictions and diplomatic actions, and you may just have a workable counterespionage strategy. Hey, it works for the other guys. (more)

P.S. "Promote Voluntary Best Practices by Private Industry to Protect Trade Secrets" (Section 2 of the report) is both vague and voluntary. It will never be adopted. Why? Two words... Risk Analysis. Think HIPAA or Sarbanes-Oxley would work if they were just voluntary best practices?

Don't get me started.
~Kevin
Read More
Posted in advice, espionage, government, law | No comments

Skype Plebes Petition Redmond Patricians

Posted on 07:14 by Unknown
A coalition of activists, privacy organizations, journalists, and others have called upon Microsoft to be more forthright about when, why, and to whom it discloses information about Skype users and their communications.

In an open letter published on Thursday, the group argues that Redmond's statements about the confidentiality of Skype conversations have been "persistently unclear and confusing," casting the security and privacy of the Skype platform in doubt...

The group claims that both Microsoft and Skype have refused to answer questions about what kinds of user data the service retains, whether it discloses such data to governments, and whether Skype conversations can be intercepted. (more)


"more forthright" 
"in doubt" 
Please.

The original Skype-in-the-wild was viewed as high security privacy tool. Guess who didn't like that. Guess why Skype was "bought" in from the wild and given adult supervision. (Think Spypke.)

Post de facto petitioning is painful to watch. If you want privacy, you need to start much earlier in the game. It begins with self-reliance.  

Example: You don't see smart corporations sitting around waiting for 'the government' or some free software to protect their information. No, they take proactive measures like TSCM and IT security. They don't wait and whine later.
Read More
Posted in advice, amateur, business, cautionary tale, encryption, FutureWatch, government, Internet, IT, political, privacy, telephone, wiretapping | No comments

Yet Another Teleconference Eavesdrop (with recommendations)

Posted on 06:33 by Unknown
Alaska’s largest statewide commercial fishing trade association announced (it will) request Alaska authorities to investigate what they say was unauthorized eavesdropping of their United Fishermen of Alaska private teleconference by the Kenai River Sportfishing Association's office.

According to UFA Interim President Bruce Wallace, on January 17, 2013 the United Fishermen of Alaska, representing 34 member organizations, held a private teleconference. 

In addition to 25 UFA Board members, UFA alleges an individual or individuals at the offices of the Kenai River Sportfishing Association (KRSA) was also on the line during the private teleconference.

This allegation was later confirmed by the teleconference vendor, who provided a phone log, which included a phone number registered to the Kenai River Sportfishing Association (KRSA) office. KRSA is not affiliated with UFA in any way. (more) (REAL Spy Fishing)


A reminder to our clients, and a free sample for potential clients...

Murray's Teleconferencing Checklist

Passcodes...
     • Change all current passcodes, now.
     • Prohibit employees from mass e-mailing or posting passcodes.
 

Switch to a conference call system with accountability features...
     • each participant is given a unique passcode,
     • the passcode is changed for each new conference call,

     • only the pre-authorized number of callers may be admitted,
     • and a record of all call participants is available to the call leader.
 
Read More
Posted in advice, business, cautionary tale, eavesdropping, espionage, password, privacy, telephone, wiretapping | No comments

Send Employees for Counterespionage Training? Brilliant!

Posted on 06:00 by Unknown
Russia - Reviving the Soviet cult of vigilance in the digital age, the administration of Russia’s second biggest city launched a tender to teach its officials the basics of combating technological espionage.

A hand-picked cadre of 25 civilian bureaucrats in St. Petersburg will train in ways of “countering foreign technical intelligence services and technical data protection,” according to the tender’s description... The course would last for 108 hours and end in a test. The tender has a price tag of 727,000 rubles ($24,000)...
 
In December, the administration of St. Petersburg – headed by Governor Gennady Poltavchenko, also a former KGB officer – also contracted anti-espionage companies to look for covert listening devices in its offices, Fontanka.ru city news website reported. (more)

The ROI on this should be tremendous. 
Every organization should be so smart. 
~Kevin
Read More
Posted in business, counterespionage, employee, FutureWatch, government, mores, social engineering, spy school | No comments

Tuesday, 19 February 2013

United States Intelligence Community - Virtual Career Fair

Posted on 08:17 by Unknown
The United States Intelligence Community (IC) invites you to attend the fourth annual IC Virtual Career Fair - a free online event - on Tuesday, February 26, 2013, from 2 p.m. to 8 p.m. (Eastern). 

Space is limited. To guarantee entrance, pre-registration is highly encouraged. Reserve your spot today!

Don't miss this opportunity to learn about IC careers and get tips on how to apply for positions.

The following agencies and components will be participating in the 2013 IC Virtual Career Fair:
Central Intelligence Agency (CIA)
Defense Intelligence Agency (DIA)
Federal Bureau of Investigation (FBI)
FBI Language Services Section (FBI LSS)
National Geospatial-Intelligence Agency (NGA)
National Security Agency (NSA)
National Virtual Translation Center (NVTC)

Read More
Posted in government | No comments

Weird Security News of the Week

Posted on 08:01 by Unknown
Japanese police believe they have finally caught the man behind an extraordinary malware campaign that included taunting police in January by sending them clues on an SD card strapped to a cat.

According to TV station NHK, 30 year-old Yusuke Katayama was picked up after Tokyo police accessed CCTV pictures that showed the accused near the animal not long before the memory card was retrieved from its collar.
 

It later emerged that police had attempted to coerce confessions from four of the innocent suspects which led to a hugely embarrassing climbdown when they were shown to be uninvolved.

Disturbing messages were also received by a lawyer in Tokyo and a TV station threatening suicide, backed up by a picture of an anime doll inside a noose made from Ethernet cable. (more)


More strange security news...
Ex employee wiped financial data from bikini bar
Fugitive John McAfee taunts police as he evades capture
Burglar unintentionally films robber while using iPhone as flashlight
Read More
Posted in weird | No comments

Mechanic Hits Emails at Rival Limo Firm

Posted on 07:56 by Unknown
A Las Vegas limousine company executive was convicted Friday of hacking into the emails of his former employer. 

John Sinagra, vice president and general manager of VIP Limousines of Nevada, was indicted last year on charges of obtaining information from a protected computer and aggravated identity theft.
 

Federal prosecutors alleged that Sinagra, who once was charged as a mob hitman in a sensational New York murder case, hacked into the emails of rival Las Vegas Limousines, owned by Frias Transportation, and stole key information. (more) (The Mechanic)
Read More
Posted in computer, data, email, Hack, lawsuit | No comments

Hobby Drones Under Fire

Posted on 05:59 by Unknown
On Dec. 26, a grand jury handed down several indictments against the owners of the Columbia Packing Company for dumping pig blood into a creek. They now face hefty fines and even prison time stemming from the water pollution, and the plant has since been shuttered. 

Neighbors had complained about noxious fumes and other issues for a while, according to the local news. But investigators didn’t get involved until this drone pilot took his pictures.

Under a new law proposed in the Texas legislature, sponsored by a lawmaker from the Dallas suburbs, this type of activity could soon be criminal. Not the pollution--the drone. (more)


And from down under...
One Tasmanian man is using a drone to help take video in tricky places and some of the video has gone viral. (video)
Read More
Posted in aerial, amateur, drone, law, lawsuit, mores, political, toy | No comments

A UAV Alternate POV

Posted on 05:52 by Unknown
Cute animated video from The New York Times... (more)

Read More
Posted in aerial, drone, KGB, mores, satire | No comments

Monday, 18 February 2013

President Reagan using a STU-II telephone

Posted on 16:14 by Unknown
Here we see a great and very rare, maybe even unique picture of former US president Ronald Reagan using a STU-II secure telephone:


President Reagan making an early morning telephone call regarding the invasion of Grenada
(Photo: Reagan Library, October 22, 1983)


In this picture we see president Reagan making a phone call to his staff regarding the invasion of Grenada. Because he was staying at the Eisenhower cabin on the Augusta National Golf course in Georgia, it was necessary to create a secure telephone line with the White House.

This was done by installing a STU-II, which was the second generation Secure Telephone Unit (STU). This system was introduced by the NSA in the early 1980s, and replaced older systems, like the extremely bulky KY-3, and was the successor to the STU-I.

In the picture we see the STU-II telephone, with handset, a normal keypad, some indicator LEDs and three extra buttons at the bottom, for selecting secure or nonsecure mode. This phone only acted as terminal or user interface, because the actual encryption system (crypto designation: KY-71) was located in a large metal cabinet, with which it was connected through a thick 9-way cable. The STU-II was built by ITT with Northern Telecom as a sub-contractor.


The same room with left to right: national security advisor Bud McFarlane,
secretary of state George Shultz and president Ronald Reagan.
The STU-II secure phone is on the table at the far right.
(Photo: Corbis)


Additionally, a reader of this weblog told us that during presidential roadtrips the STU-II was transported in aluminium transit cases with a packed weight of 170 lbs. Each case contained one KY-71 (the crypto engine), one HYX (the handset) and two ZAMX (unknown).


As of 1987, the STU-II was replaced by the much smaller STU-III, which was a secure phone that consisted of one single desktop device only and had much better speech quality. This new phone became available for president Reagan by the end of his second term:


President Reagan using a Motorola SECTEL 1000 version
of the STU-III secure telephone program
(Photo: NSA, date unknown)


Read More
Posted in POTUS, STU-II | No comments

Thursday, 14 February 2013

US State Department red phones

Posted on 13:23 by Unknown
On February 1st, senator John Kerry became the new US Secretary of State, succeeding Hillary Clinton, who held this office since January 2009. John Kerry is just two weeks in office, but we already have a nice picture of him in his new office:


U.S. Secretary of State John Kerry speaks by telephone with
UN Secretary-General Ban Ki-moon from his Inner Office
at the Department of State, February 5, 2013.
(State Department photo)

This picture is taken in the so called inner or private office, which is next to the bigger ceremonial office, where the secretary of state is most often seen, receiving and talking to his guests. The smaller private office is used for the actual work, and therefore that's also where the phones are (the US president also has a rarely seen private office, next to the ceremonial Oval Office).

On the desk we see a Cisco 7975 unified IP phone with a 7916 expansion module. With a close look we can see that the phone has a yellow faceplate (like the one in the header of this weblog), instead of the standard silver one, which indicates that it's part of the new, highly secure Executive Voice over Secure IP-network. This network connects the president with all major decision makers.

The phone which secretary Kerry is using in the picture, is a high end Avaya/Lucent 6424D phone set, which is part of the internal State Department telephone network. This phone can also be seen in many pictures of the ceremonial office. Finally, we see a really large videoteleconferencing (VTC) screen with camera on top.

It seems the Cisco phone and the VTC-screen are installed quite recently, because when former secretary of state Hillary Clinton showed her inner office in May 2010, there was at least one other type of phone, which was there already when Madeleine Albright held this office:


Video still of former Secretary of State Hillary Clinton showing her
private office to Scott Pelley of the CBS show 60 Minutes.
(click to watch the video!)


Former Secretary of State Madeleine Albright in her private office
(Date unknown)

In both these pictures, we see a big white Integrated Services Telephone (IST) at the lower right corner of the bookshelfs. This futuristic looking phone was designed by Electrospace Systems Inc. and later on produced by Raytheon. It was part of the Defense Red Switch Network (DRSN), which is the main secure telephone network of the US military.

As we saw in an earlier posting, the president had a newer version of this phone, the IST-2, on his desk in the Oval Office. In 2011 that phone was also replaced by a Cisco 7975 IP phone, just like the one which is now at the desk of the secretary of state. So it looks like these new IP phones of the top secret executive VoIP network are gradually replacing the so called red phones of the DRSN, which is still an old fashioned switched telephone network.

The phones of the Defense Red Switch Network are sometimes called "red phones", because in the sixties and seventies, the telephone sets connected to predecessors of this network were often red. A nice example of such an early day red phone is the one in this picture:


This is a very common phone without rotary dial, made by ITT. Phones like this are still available today, for example for hotlines or emergency lines of any kind. This phone was probably used for a predecessor of the DRSN, like the Automatic Secure Voice Communications Network (AUTOSEVOCOM). This is indicated by the label, which says: "Up to TOP SECRET Information may be processed on this system" with next to it, the eagle from the seal of the United Stated and the words "Bureau of Diplomatic Security":


The Bureau of Diplomatic Security (DS) is an agency of the State Department, which is responsible for protecting US embassies and diplomatic personnel and securing critical information systems, like for example the telephone networks.

Therefore, the red telephone in the picture was probably used for a secure telephone connection at one of the major embassies, at the State Department operations center, or maybe even in the office of the secretary of state of that time!

Read More
Posted in Red Phone, USA | No comments

Sunday, 10 February 2013

Two Princesses in a Bug House

Posted on 09:15 by Unknown
GLOBE reveals that the royal couple’s new home, Kensington Palace, is bugged, and it seems that Camilla Parker-Bowles is the prime suspect for bugger. 

According to the cover of GLOBE’s current edition, February 18, two listening devices were discovered right inside the couple’s apartments. In this royal bombshell GLOBE will explain exactly how and where the royal bugs were discovered and why suspicion naturally fell on evil Camilla.

Now that the bugs have been discovered and removed what will Camilla do? Do you think that there are other listening devices spying on the royal couple? (more)

Déjà vu...
Princess Diana hired a private security firm to secretly sweep Kensington Palace for bugs.

She was so concerned about eavesdropping that she called in a four-man team to carry out a search for listening devices.

The check was ordered in May 1993 after the princess expressed fears that her conversations were being monitored...

 
But it went disastrously wrong when police detained the security firm's workers, who had arrived at the palace posing as carpet-fitters...


She had her butler Paul Burrell and his colleague Harold Brown - later both cleared of stealing from her after her death - arrange for the de-buggers to access the palace without the police knowing.

They gained access to the palace by claiming to be from a carpet firm. The secret mission was only discovered-when one of the team went to the palace gate house and asked for access to mainframe telephone equipment located in the engineers' room next to the police gate house.

Officers became suspicious and realised that the team from Moran Security Support Services Ltd had been contracted to "de-bug" the royal apartment. (more)
Read More
Posted in eavesdropping, political, TSCM, wiretapping | No comments

If the competition isn't bugging you, they are probably doing this...

Posted on 07:19 by Unknown
Interesting read...
A competitive intelligence consultant discusses things that can help a business--at the expense of another. (more)
Read More
Posted in advice, business, cautionary tale, employee, espionage, leaks, mores, social engineering | No comments

Report Recommends a TSCM Sweep of City Hall

Posted on 07:11 by Unknown
According to the report*, many staff members worry there are bugs in city hall that an exterminator cannot remove.

So much so, that one of the official recommendations is to sweep city hall.  


"The Council should retain an outside firm to conduct a sweep of City Hall for bugs or other surveillance or electronic devices," the report reads. "While it is doubtful that any such devices exist in City Hall, there is a clear and present perception among staff that the facility is not secure and possibly bugged. Many employees in the City have resorted to the use of their personal cell phones and often leave the premises to discuss sensitive matters. A sweep of City facilities would help restore confidence in the security and privacy of the City buildings."

The findings of fact revealed that "based on credible and objective evidence, Police Chief Debra Duncan secretly tape recorded former City Manager Wayne Herron." (more)


* The rest of the story...
"the report" aka "The Fox Report" - "Attorney Anthony Fox led the team of two attorneys, Sarah Hutchins and Mary Crosby. They interviewed about 24 people, including current and former employees." "The report cost $50,000." 

A sweep of the sensitive City Hall areas would have cost less than 1/4 of that. ~Kevin
Read More
Posted in eavesdropping, employee, government, police, political, privacy, recording, TSCM | No comments

Wednesday, 6 February 2013

Law Proposed to Let Parents Wiretap Kids

Posted on 07:32 by Unknown
An Ohio lawmaker plans to introduce a bill that would allow parents to wiretap their child’s cell phone conversations to be used in court.


Under the bill, only parents or guardians would be allowed to track online or cell phone communications of a minor under the age of 18. (more)
Read More
Posted in amateur, cell phone, eavesdropping, FutureWatch, law, mores, Ra-parents, wiretapping | No comments

Groundbreaking Encryption App is a Fed Freaker

Posted on 07:27 by Unknown
For the past few months, some of the world’s leading cryptographers have been keeping a closely guarded secret about a pioneering new invention. Today, they’ve decided it’s time to tell all. 

Back in October, the startup tech firm Silent Circle ruffled governments’ feathers with a “surveillance-proof” smartphone app to allow people to make secure phone calls and send texts easily. Now, the company is pushing things even further—with a groundbreaking encrypted data transfer app that will enable people to send files securely from a smartphone or tablet at the touch of a button. (For now, it’s just being released for iPhones and iPads, though Android versions should come soon.) That means photographs, videos, spreadsheets, you name it—sent scrambled from one person to another in a matter of seconds. 

Click to enlarge.
“This has never been done before,” boasts Mike Janke, Silent Circle’s CEO. “It’s going to revolutionize the ease of privacy and security.” 

The sender of the file can set it on a timer so that it will automatically “burn”—deleting it from both devices after a set period of, say, seven minutes. Until now, sending encrypted documents has been frustratingly difficult for anyone who isn’t a sophisticated technology user, requiring knowledge of how to use and install various kinds of specialist software. 

What Silent Circle has done is to remove these hurdles, essentially democratizing encryption. It’s a game-changer that will almost certainly make life easier and safer for journalists, dissidents, diplomats, and companies trying to evade state surveillance or corporate espionage. Governments pushing for more snooping powers, however, will not be pleased. (more)
Read More
Posted in computer, data, encryption, FutureWatch, government, product | No comments

Authorities... "No probing all the way. Promise."

Posted on 06:45 by Unknown
The U.K. plans to install an unspecified number of spy devices along the country’s telecommunications network to monitor Britons’ use of overseas services such as Facebook and Twitter, according to a report published Tuesday by Parliament’s Intelligence and Security Committee.

The devices — referred to as “probes” in the report — are meant to underpin a nationwide surveillance regime aimed at logging nearly everything Britons do online, from Skype calls with family members to visits to pornographic websites. The government argues that swift access to communications data is critical to the fight against terrorism and other high-level crime.

Authorities have been at pains to stress that they’re not seeking unfettered access to the content of emails or recordings of phone calls, but rather what many have described as “outside of the envelope” information: Who sends a message, where and how it is sent, and who receives it. (more) ...for now.
Read More
Posted in computer, eavesdropping, email, FutureWatch, government, Internet, law, mores, privacy, Ra-parents, spybot, wiretapping | No comments

Tuesday, 5 February 2013

Business Espionage - Sentences Short - Fines Small

Posted on 12:38 by Unknown
MO - A Chinese business owner and one of his employees have pleaded guilty in Missouri to conspiring to steal trade secrets from a U.S. company, in what one expert called a rare example of foreign business people being successfully prosecuted for corporate spying.

Ji Li Huang, 45, and Xiao Guang Qi, 32, admitted Friday, Jan 25 in federal court that they tried to buy Pittsburgh Corning Corp.’s proprietary formula for cellular glass insulation by bribing an employee of the company’s Sedalia plant.

U.S. District Judge Brian Wimes sentenced Huang to 18 months in federal prison and fined him $250,000. Qi — Huang’s employee at a plastic novelties manufacturer called Ningbo Oriental Crafts Ltd. — was sentenced to time served and fined $20,000, with the understanding that he would leave the United States immediately. Both men paid their fines Friday, The Kansas City Star reported. (more)
Read More
Posted in business, cell phone, espionage, lawsuit, trade secret | No comments

British Army Unveils New Mini Spy Drone

Posted on 12:16 by Unknown
The British army has demonstrated a new tiny spy drone as the latest weapon against Taliban militants in Afghanistan.

Soldiers from the Brigade Reconnaissance Force at Camp Bastion demonstrated the eight-inch long plastic moulded drone, which has three cameras hidden inside its nose and weighs just 15 grams.

Codenamed the Black Hornet, the tiny aircraft is being used by British troops against the Taliban in Afghanistan.

The small flying machine, which has a smooth grey body and twin black rotors, can either be controlled directly or programmed to fly to a given set of co-ordinates and then return to base after carrying out its spy missions. (more)
Read More
Posted in aerial, drone, government, spybot, spycam | No comments

Two sneaky Android apps have been detected...

Posted on 11:59 by Unknown
The apps cloaks as cache cleaners but instead snoop around once connected to PC. Superclean and DroidCleaner are the two applications uncovered by Kaspersky Labs. Both feature clean-up of Android phone or tablet cache files.

The so-called "cleaners" promise to make devices faster and to increase processing but turns out to download three separate files - autorun.inf, folder.ico, and svchosts.exe. These components are automatically placed in the root of the device's SD card, and once the user connects it to the computer using USB mode, the malware begins to execute itself.

The malware activates the desktop microphone, encrypts all recording, and send all gathered information back to the developer of the malicious application according to Kaspersky. Aside from infecting the PC, the malware also uploads Android device's information, opens arbitrary browser links, uploads and deletes SMS, and distributes contacts, photos, and coordinates online. (more)
Read More
Posted in advice, Android, App, cell phone, eavesdropping, espionage, spyware, wiretapping | No comments

Sunday, 3 February 2013

New Wave Of Hidden Cameras Make Spying Easy

Posted on 06:45 by Unknown
It’s becoming easier than ever to keep an eye on spouses, children, business partners, and nannies with a new wave of spy gear.


Note: The spy gadgets are real, and work very well — the 'antidote' gadgets used to protect against them, not so well. Save your money. 

Need protection? Find a professional electronic countermeasures specialist. Invest your money with them. Need help finding one? Check here and here. ~Kevin
Read More
Posted in advice, amateur, cautionary tale, eavesdropping, espionage, privacy, product, spycam, tracking, TSCM, wiretapping | No comments

Saturday, 2 February 2013

Spy vs. Spy vs. Judge Leonie

Posted on 08:36 by Unknown
A former CIA officer who pleaded guilty to identifying a covert intelligence officer was sentenced on Friday to 30 months in prison.

John Kiriakou and prosecutors agreed on the term as part of the plea agreement he struck in October.

Kiriakou, 48, declined to make a statement at the Alexandria, Virginia, federal court prior to sentencing by U.S. District Judge Leonie Brinkema. "Alright, perhaps you've already said too much," Brinkema said. (more)
Read More
Posted in CIA, employee, government, lawsuit, leaks | No comments

See What Drones See

Posted on 08:23 by Unknown
These unmanned flying robots–some as large as jumbo jets, others as small as birds–do things straight out of science fiction. 

Much of what it takes to get these robotic airplanes to fly, sense, and kill has remained secret. But now, with rare access to drone engineers and those who fly them for the U.S. military, NOVA reveals the amazing technologies that make drones so powerful as we see how a remotely-piloted drone strike looks and feels from inside the command center.

From cameras that can capture every detail of an entire city at a glance to swarming robots that can make decisions on their own to giant air frames that can stay aloft for days on end, drones are changing our relationship to war, surveillance, and each other. And it's just the beginning. Discover the cutting edge technologies that are propelling us toward a new chapter in aviation history as NOVA gets ready for "Rise of the Drones." 

Sneak preview...

The full program is available on-line. ~Kevin
Read More
Posted in aerial, drone, espionage, FutureWatch, government, movie, optics, spybot, tracking | No comments

Experts warn on wire-tapping of the cloud

Posted on 07:59 by Unknown
Leading privacy expert Caspar Bowden has warned Europeans using US cloud services that their data could be snooped on.

In a report, he highlights how the Foreign Intelligence Surveillance Act Amendment Act (FISAAA) allows US authorities to spy on cloud data.

This includes services such as Amazon Cloud Drive, Apple iCloud and Google Drive.

He told the BBC this heralded a new era of "cloud surveillance". (more)
Read More
Posted in advice, computer, espionage, FutureWatch, government, privacy, wiretapping | No comments

Man held on suspicion of business espionage

Posted on 07:55 by Unknown
UK - A 52-YEAR-OLD man was arrested yesterday in Oxfordshire on suspicion of business espionage. The Metropolitan Police Service made the arrest as part of Operation Tuleta, an investigation into criminal breaches of privacy... The arrest, the 20th in Operation Tuleta, is part of the Kalmyk investigative strand of inquiry relating to computer hacking offenses. (more)
Read More
Posted in business, espionage, lawsuit | No comments

New Report: Drones Could Be Used for Stalking, Voyeurism

Posted on 07:48 by Unknown
The sight of a drone in flight is likely to become a regular occurrence in the United States within the next few years. But the rise of unmanned technology could lead to new crimes like “drone stalking” and “drone trespassing,” lawmakers are being told. 

A Congressional Research Service report published Wednesday, Integration of Drones Into Domestic Airspace: Selected Legal Issues, sets out the many contentious areas around unmanned aircraft. It cautions that in the future, as drones become more easily available to private citizens, we may see the technology used to commit various offenses. This could mean neighbors using drones to infiltrate one another’s gardens as a means of harassment, or a voyeur using one strapped with a camera and microphone to photograph women and listen in on people’s conversations.

“Traditional crimes such as stalking, harassment, voyeurism, and wiretapping may all be committed through the operation of a drone,” the report says. “As drones are further introduced into the national airspace, courts will have to work this new form of technology into their jurisprudence, and legislatures might amend these various statutes to expressly include crimes committed with a drone.”

Of particular note is a section in the report titled “Right To Protect Property From Trespassing Drones.” It outlines that in certain instances, under a section of tort law, “a landowner would not be liable to the owner of a drone for damage necessarily or accidentally resulting from removing it from his property.” This doesn’t necessarily mean that you can “use force”—like shooting the thing down—if someone flies an unmanned aircraft onto your property. But it does mean you could remove a drone from your property without resorting to force, and if it were “accidentally” damaged in that process, you might not be in trouble. (more)
Read More
Posted in aerial, amateur, cautionary tale, drone, eavesdropping, espionage, FutureWatch, government, law, lawsuit, mores, privacy, spybot, surveillance, toy, tracking, voyeurism, X-Ray Vision | No comments

Alerts sent in by our Blue Blaze Irregulars this week...

Posted on 07:26 by Unknown
• "Time to take the glue gun to your USB ports." Data exfiltration using a USB keyboard. 

• "Dust off your information security policy (or start putting one in place…)" Do you have a comprehensive information security program? Many businesses are still operating without one, leaving them open to preventable data breaches.
 
• "Enough already: encrypt those portable devices" The U.S. Federal Trade Commission (FTC) announced it had reached a settlement with a cord blood bank in respect of the loss of nearly 300,000 customers’ personal information. ...The information had been stored on unencrypted backup tapes, an external hard drive and a laptop that were stolen from a backpack left in an employee’s car.

• “This call may be recorded” - Ninth Circuit says disclaimer not always necessary. But it’s still a good idea! 

• "Man cleared of spying on his wife via computer software..." His attorney argued that prosecutors could not prove why Ciccarone used the software.

• "NestlĂ©gate" Court convicts Nestle of "spying" on Swiss activists. (vintage commercial)



Read More
Posted in advice, business, computer, eavesdropping, espionage, Hack, keystroke, lawsuit, privacy, spyware, USB, wiretapping | No comments

Friday, 1 February 2013

From the Business Spy's Toolkit - NoteMark

Posted on 09:06 by Unknown
Unlike other miniature scanners, the NoteMark is equipped with a 5-megapixel sensor with an auto-focus lens that can capture an image instantly. Twisting the top of the pen readies the sensor, while a button on the side activates the shutter.

The sensor is capable of digitizing just about any information put in front of it, from a small blurb in a magazine to an entire whiteboard of notes. Each picture is captured as a sharp 2048 x 1536-resolution JPEG and stored in the pen's 1GB of flash memory, which can hold up to 1,000 images. The pen also features a microphone and can record up to 1,000 one-minute voice clips in WAV format.

It takes one hour to fully charge the scanner through USB, which gives it enough power to take about 300 images. Once the images or audio clips are saved, you can access them by plugging the NoteMark into any Mac or PC and even sync them across computers and mobile devices using software from Evernote.

It's a fairly simple device, but one that could no doubt save a lot of time and hassle for both office workers and James Bond alike. ($124.95)
(more)
Read More
Posted in espionage, product, spybot | No comments
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Popular Posts

  • The Ratters - men who spy on women through their webcams
    The woman is visible from thousands of miles away on a hacker's computer.   The hacker has infected her machine with a remote administr...
  • Google Glass Hacked - Everything You See and Hear Transmitted to Anyone
    Google's Glass wearable computer have been hacked so video and audio can be transmitted online to anyone. Hackers have been able to remo...
  • This Week in Spy News
    The chairman of Stow College in Glasgow has resigned after a row over a recorded conversation on a device branded a "spy-pen". ( m...
  • CONTEST (ENDED) - Who Is This Man?
    We have a winner! Congratulations!! Answer below. Clues... • Born 1897. • Died 1973. • Expert wiretapper.  • Good high speed driver.  • Shar...
  • The US classification system
    (Updated: October 12, 2013) Top Level Telecommunications often involve information that has to be kept secret. To ensure that, governments h...
  • When Paranoids Collide they Blow the Whistle on Tea Kettles
    Customs agents in Russia found tea kettles and irons bugged with tiny Spyware chips that exploit WiFi connections , reports a local news out...
  • "1984" Gets a New Look
    via creativity-online.com ... You can't judge a book by its cover, but there's no denying that a thoughtful, bold packaging can mak...
  • Laser Beam Eavesdropping - In the News Again
    Since the 1970's, stories about laser listeners have periodically popped up in the news. The common thread is their magical ability to e...
  • Watergate's Next Watergate
    A history professor hopes that a federal court's recent order to release long-sealed Watergate documents will shed light on the motivati...
  • Spybusters Tip # 723 - Be Smart - Use a Dumb Phone to Thwart Spyware
    Sometimes you just need a dumb phone that can't spy on you.   inKlien Global's tiny phone 6.5mm Ultra Thin AIEK M3 Cool Card Cell Ph...

Categories

  • advice
  • aerial
  • amateur
  • Android
  • App
  • Apple
  • art
  • biometric
  • BlackBerry
  • blackmail
  • Bluetooth
  • Boeing
  • book
  • business
  • BYOD
  • CALEA
  • cartoon
  • cautionary tale
  • CCTV
  • cell phone
  • CIA
  • Classification
  • Clothing
  • computer
  • contest
  • counterespionage
  • Darwin
  • data
  • detection
  • drone
  • dumb
  • eavesdropping
  • email
  • employee
  • encryption
  • ERII
  • espionage
  • extortionography
  • FBI
  • fiber-optic
  • find
  • food
  • FREE
  • fun
  • FutureWatch
  • General Dynamics
  • Germany
  • Gold Phone
  • government
  • GPS
  • GSM
  • Hack
  • historical
  • Hotline
  • humor
  • IAPSC
  • IMCPB
  • Infrared
  • Internet
  • ISAF
  • Israel
  • IST
  • IT
  • just coincidence?
  • KDM
  • keystroke
  • KGB
  • Kremlin
  • laser
  • law
  • lawsuit
  • leaks
  • malware
  • marketing
  • MI6
  • mind reading
  • miscellaneous
  • mores
  • movie
  • nature
  • Netherlands
  • North Korea
  • NSA
  • Obama
  • optics
  • OSS
  • password
  • PI
  • police
  • political
  • poll
  • POTUS
  • PRISM
  • privacy
  • product
  • quiz
  • quote
  • Ra-parents
  • Ray-Gun
  • recording
  • Red Phone
  • religion
  • RFID
  • Russia
  • sabotage
  • satire
  • scam
  • shredder
  • Situation Room
  • social engineering
  • software
  • sports
  • Spy Museum
  • spy school
  • spybot
  • spycam
  • spyware
  • SpyWarn
  • statistics
  • STE
  • steganography
  • STU-II
  • STU-III
  • surveillance
  • survey
  • telephone
  • TEMPEST
  • Tips
  • toy
  • tracking
  • trade secret
  • TSCM
  • Twitter
  • UMTS
  • USA
  • USB
  • USSR
  • Vatican
  • VoIP
  • voyeurism
  • Watergate
  • weird
  • White House
  • Wi-Fi
  • Wireless
  • wiretapping
  • X-Ray Vision

Blog Archive

  • ▼  2013 (455)
    • ►  November (47)
    • ►  October (53)
    • ►  September (31)
    • ►  August (50)
    • ►  July (50)
    • ►  June (47)
    • ►  May (35)
    • ►  April (40)
    • ►  March (29)
    • ▼  February (33)
      • Papal telephony
      • Security Scrapbook Reader's Question - Spy School
      • Business Espionage - Quote of the Month
      • Spykpe
      • Express Scripts vs. E&Y - Trade Secret Theft Alleg...
      • U.S. Unveils New Strategy to Combat Trade-Secret T...
      • Skype Plebes Petition Redmond Patricians
      • Yet Another Teleconference Eavesdrop (with recomme...
      • Send Employees for Counterespionage Training? Bril...
      • United States Intelligence Community - Virtual Car...
      • Weird Security News of the Week
      • Mechanic Hits Emails at Rival Limo Firm
      • Hobby Drones Under Fire
      • A UAV Alternate POV
      • President Reagan using a STU-II telephone
      • US State Department red phones
      • Two Princesses in a Bug House
      • If the competition isn't bugging you, they are pro...
      • Report Recommends a TSCM Sweep of City Hall
      • Law Proposed to Let Parents Wiretap Kids
      • Groundbreaking Encryption App is a Fed Freaker
      • Authorities... "No probing all the way. Promise."
      • Business Espionage - Sentences Short - Fines Small
      • British Army Unveils New Mini Spy Drone
      • Two sneaky Android apps have been detected...
      • New Wave Of Hidden Cameras Make Spying Easy
      • Spy vs. Spy vs. Judge Leonie
      • See What Drones See
      • Experts warn on wire-tapping of the cloud
      • Man held on suspicion of business espionage
      • New Report: Drones Could Be Used for Stalking, Voy...
      • Alerts sent in by our Blue Blaze Irregulars this w...
      • From the Business Spy's Toolkit - NoteMark
    • ►  January (40)
  • ►  2012 (84)
    • ►  December (33)
    • ►  November (33)
    • ►  October (12)
    • ►  June (2)
    • ►  May (2)
    • ►  February (1)
    • ►  January (1)
Powered by Blogger.

About Me

Unknown
View my complete profile