Menu
Navigation

Global articles on espionage, spying, bugs, and other interesting topics.

Keep abreast of the espionage threats facing your organisation.

Smithwick hears about bugging investigation

A retired Garda inspector has described investigations into the alleged interception of cross-border telephone calls between the RUC and GardaĂ­ by the IRA, leading to the murder of two senior RUC officers.

Retired inspector Chris Kelly was asked to carry out an investigation in 2009 following an article that appeared in the Phoenix magazine, claiming that the IRA had a bug the organisation used to intercept phone calls between Dundalk garda station and the RUC over secure lines.

Read More


Lawyers to face jail for bugging leaks

Lawyers who are made privy to the identity of police phone bugging and surveillance targets will face up to two years’ jail if they disclose the information, the Victorian government says.

The minister responsible for the establishment of an anti-corruption commission, Andrew McIntosh, has released the legislation setting up public interest monitors (PIMs).

The PIM, and his or her deputies, will attend court and tribunal hearings where police or Office of Police Integrity (OPI) representatives apply for permission to tap someone’s phone or track them using surveillance devices.

They will also appear at warrant applications made by the yet to be established Independent Broadbased Anti-Corruption Commission.

The draft law follows Ombudsman George Brouwer’s finding earlier this month that there was an accountability gap regarding telephone intercepts in Victoria.

He recommended the government develop measures to allow the merit of telecommunication intercepts to be assessed.

Mr McIntosh told the parliament the PIMs would be lawyers who would have to act independently and not be employed by the commonwealth, the state or the Office of Public Prosecutions.

They would attend application hearings in the courts where they would have the right to question warrant applicants and have access to a copy of the application and any affidavit.

If a PIM disclosed the sensitive information to others they would face two years’ jail.

Mr McIntosh said last year alone Victoria Police and the OPI made 424 applications for telecommunications interception warrants and all had been granted.

It was a similar situation with surveillance device warrants.

“Covert investigation and coercive powers, such as surveillance devices (and) telecommunications interceptions … are among the most intrusive powers available to integrity and law enforcement bodies in Victoria,” he said.

“Strong accountability measures should exist for the use of such significant powers.”

The legislation will be debated in the lower house next month.


App Turns iPhone into spiPhone

Used to be if spies wanted to eavesdrop, they planted a bug. These days, it’s much easier. Because we all carry potential bugs in our pockets—smartphones. One team of researchers used an iPhone to track typing on a nearby computer keyboard with up to 80 percent accuracy. They presented the findings at a computer security conference in Chicago. [Philip Marquardt et al., (sp)iPhone: Decoding Vibrations from Nearby Keyboards Using Mobile Phone Accelerometers, 18th ACM Conference on Computer and Communications Security]

The researchers designed a malicious app for the iPhone 4. When you place the phone near a keyboard, it exploits accelerometer and gyroscope data to sense vibrations as the victim types—detecting whether keystrokes come from the left or right side of the keyboard, and how near or far subsequent keys are from each other. Then, using that seismic fingerprint, the app checks a pre-created “vibrational” dictionary for the most likely words—a technique that works reliably on words of three letters or more.

Of course, you’d need to install the app to allow it to spy. But whereas most apps have to ask permission to access location data or the camera, that’s not so for the accelerometer. This kind of attack may offer good reason to limit accelerometer access too—and keep iPhones from becoming “spiPhones.”

—Christopher Intagliata

 


Uncle Sam Wants You — And Your Email

Who’s reading your email, besides you? If you send it from work, it’s probably your boss or some rogue tech admin. If you send it from home, it may be your spouse, your kids, or your nosy neighbors. (I told you not to write your password on a Post-it note and leave your Wi-Fi router open.) From an Internet cafĂ©? Probably some slacker with a goatee, unless you remembered to log out first and/or encrypt your connection.

And if you send or receive email from any of those places, your Uncle may also be reading it — you know, the guy with the top hat, the snowy beard, and the fondness for red-white-and-blue ensembles? Him.

Read More


Nigeria: Security

Plans by Federal Government to push a security related bill that would empower it to eavesdrop on telephone conversations of the general public is generating some controversy. SHUAIB SHUAIB examines the issues, citing related examples from India, Turkey and the USA to throw light on the pitfalls of the idea.

The Federal Government under the ruling People’s Democratic Party has been reported to be working on a bill that will give it powers to eavesdrop on telephone conversations of the general public all in the hope of curbing and detecting crime. As expected, the challenges of foiling terrorist attacks is the main motive for the upcoming bill; which could also come in handy in the array of arsenal available to any sitting government to keep tabs on the activities of opposition politicians, inquisitive journalists, intransigent lawmakers and even judges exhibiting too much independence.

Read More