via Cult of Mac…
“There’s no other way of saying this:
Camera Camouflage is sneaky. It’s a camera app that goes out of its way to avoid looking like a camera. It disguises itself as an incoming phone call. You can even instruct it to activate your phone’s ringtone, so you can pretend to take the call and hold the phone to your ear. At which point, things get even sneakier. Camera Camouflage is activated by your voice. When you start speaking, it takes a photo. To onlookers, you’re just answering a phone call.
You can keep talking, and keep snapping, for as long as you want.” (more)
…So, the problem of cell phone interception is real, growing and unlikely to be eliminated in the foreseeable future.
For an organization, knowing that phone calls have been intercepted at all is difficult. There is rarely a test that can be done, other than looking at the consequences of a lost deal or secret information in the public domain. In fact, in 2010, the Ponemon Institute found that 80 percent of CIOs admitted they would not find out directly if they had been intercepted.
The problem shows a wide geographical variation, both in the number of instances and in the public perception of risk.
In the United States and mainland Europe, the perception of risk is relatively low. However, travel to Latin America or some parts of Asia, and the perception of an issue has reached the consumer with advertisements on mainstream television for protection equipment.
Yet few executives traveling around the world have taken special measures to secure their cell phone conversations.
Research from ABI shows that 79 percent of companies’ cell phones were routinely used to discuss information that, if intercepted, would lead to material loss to the business.
Yet less than one in five had in place adequate measures to address this risk. (
more)
New book coming soon…
Stay tuned for details.
Phone Creeper V0.9 (BETA) for Windows Mobile Cell Phones – “This is a phone espionage suite.
It can be silently installed by just inserting an SD card with the files below on it. The program does not show up under installed programs or running programs and allows for a useful array or features.
Phones running this software can be remotely controlled by SMS text messages. All commands will be silently received and deleted immediately and results will be issued back to sender. Pre-configured settings can be added to the installer to have your own default password and phone number to receive live updates. By default,
this program will silently reinstall itself even after a hard reset, if the memory card with these files is still in the device.”
(more)
P.S. There is even an Anti-Creeper app. Both are FREE but donations are solicited.
GA – A man was arrested Friday for using his cell phone to take video of a woman in a dressing room.
According to a report released Saturday by the Athens-Clarke County Police Department, Vicente Bautista, 26 of Greensboro, Ga. was in the dressing area of the
Plato’s Closet located at 196 Alps Road shortly before noon. Police said he put his cell phone under the divider to tape a 36-year-old woman as she tried on clothes. (
more)
Attending and presenting at the annual ERI meeting means telling clients we will be unavailable for a few days. They understand once I tell them what goes on behind these closed doors. The information I gather directly benefits them. If you think any of this can help you, give me a call and I will brief you in greater detail.
This is what I heard today…
• Need to make sure the people outside of your room can’t overhear you?
Dynasound to the rescue. As they say, “These are not your father’s white noise generators.” Made to be un-filterable, this white noise is injected directly into construction materials (as opposed to vibrated in with old piezo-electric transducers). The benefit… walls, windows, ceilings and floors transmit the sound outward. People in the room can hardly hear it. Bonus… Need a temporary solution (as in a hotel) or need to move the permanent installation? No problem. The new transducers are easy to move.
• Want to have 24/7 monitoring of an area for certain types of bugging devices?
Global TSCM Group has an answer. Their multi-faceted monitoring system may be monitored anywhere via the Internet. It may not be the total answer, but it helps when securing Boardrooms and creating secure conference rooms.
• Need to control Wi-Fi and cell phone usage in your building?
AirPatrol can do it. Once their system is installed, you will know where every rogue laptop, unauthorized Wi-Fi appearance point and cell phone is… within six feet of its exact location, plotted on a computer map. Also, monitorable via the Internet. (PS – There is a whole lot more their system does. Visit their web site.)
Ok… Lunch break.
• Need portable secure storage for cell phones and tablets when everyone enters the top secret meeting? Hey, you never know whose cell phone is infected with spyware, turning their phone into a bugging device.
Vector Technologies has the answer, and if the answer doesn’t suit you, talk to them. They will
make whatever you need. Bonus… It won’t look like an old pirate’s chest. They make really nice looking stuff with pneumatic lids! Independent testing labs certify effectiveness. Call 540-872-0444.
The rest of the afternoon, ERI members taught what they know…
• “Finds in the Computer World” – Dr. Gordon Mitchell
• “Access Control / Physical Security” – Mark Clayton
• “Building and Using a UV LED Light Source” – Dr. Gordon Mitchell
• “Adventures with Software Defined Radio” – Kevin D. Murray
More tomorrow…
(MJD, DC can be fun. Make the TSCM hajj next year.)