Menu
Navigation

Global articles on espionage, spying, bugs, and other interesting topics.

Keep abreast of the espionage threats facing your organisation.

Hamas warns against buying cars imported from Israel

The Hamas government in the Gaza Strip is warning local politicians, government officials and faction leaders against buying cars imported from Israel for fear they may contain eavesdropping equipment or even remote-activated bombs planted by Israeli security agencies. (more)
Test your car…
If you own a late model General Motors car with OnStar, try this test. Tune your radio to 770 AM, turn up the volume and tap on the OnStar microphone near the rear view mirror. Do you hear yourself coming through the radio? No? Maybe they only bugged my car. ~Kevin

Google Bans SMS Spy App Tap

A controversial mobile phone application, which helps a cell phone user read the text messages of others secretly, has been removed from sale by Internet search engine Google.
Google said the application, called SMS Secret Replicator, violated its terms.

Once installed on a mobile phone, the Android phone application automatically creates carbon copies of incoming text messages and forwards them to a selected number – prompting fears it could be used by jealous lovers and even work colleagues to snoop on private messages. (more) (video)

Google may have dropped it from their marketplace, but doesn’t mean this $9.99 app is not available elsewhere. (more
Coming soon, a way you can detect if your phone is infected with spyware. (more)

Electronic Bugs and Hidden Cameras Found In Councillors’ Homes

Earlier this year after a suspicious break-in, a leading Sydney Councillor accidentally discovered a listening device concealed under his house. It was alleged that the same councillor had located another device some weeks earlier that was apparently logging computer activity, via a crude attachment at the back of his PC. The councillor felt that the installation must be politically motivated, as little was stolen during the initial break-in. Furthermore, there was an election looming and various suspicious [political] incidents occurred during the lead-up.

As a result, management within the local government he represents requested that a series of sweeps be undertaken of other councillor’s homes.

It begs the question of who would be bugging a local councillor and for what benefit? We have undertaken technical surveillance countermeasure inspections for numerous governments (local, state and federal) over the years, generally as a precautionary measure. Interestingly, we’ve found definitive evidence of listening devices having been placed at a number of locations and have provided practical security advice accordingly. In most cases, however, we’ve believed that these placements have been in relation to various inquiries undertaken by law enforcement agencies – an area we do not want to interfere with.

Read More


Security Alert: iCracked

A security flaw in the iPhone allows strangers to bypass the handset’s lock screen with a few button presses.

…the quick method to circumvent an iPhone’s passcode-protected lock screen:
• tap the “Emergency Call” button,
• then enter three pound signs,
• hit the green Call button
• and immediately press the Lock button.
That simple procedure gives a snoop full access to the Phone app on the iPhone, which contains the address book, voicemail and call history. (more)

Apple:

“We’re aware of this issue and we will deliver a fix to customers as part of the iOS 4.2 software update in November.” 

“Why is this important?”
Not having password protection on a smart phone leaves you open to information theft, jail-breaking and injection of spyware.

“Why does this trick exist?”
• It is a software loophole.
• It is a programmer’s shortcut they forgot to patch.
• It is a programmer’s Easter egg.
• It is a law enforcement backdoor never meant to become public knowledge.
Interesting question. You decide.

FutureWatch: The ability to create passwords longer than four measly digits… which is only a pool of only 10,000 passwords. ~Kevin


Firesheep Makes Stealing Your Wi-Fi Secrets Easy

via Steven J. Vaughan-Nichols
From all the yammering, you’d actually think there was something new about Firesheep, the Firefox extension that lets you grab login IDs, passwords, and other important information. What a joke. I, and any hacker or network administrator worth his salt, have been able to do this kind of stuff for years.
The only thing “new” about Firesheep is that how it easy makes it to do. I’m unimpressed. Anyone who was serious about grabbing your personal information has already been doing it for years. Trust me, if someone really wanted your data and you’ve been using open Wi-Fi networks, they already grabbed it.
No, the real worry isn’t about some jerk grabbing your Twitter password in a coffee house. The real worry has always been that your office Wi-Fi is easy to compromise and then someone can use a packet-sniffer to get something that really matters like your your Accounts Payable password. (more)
Need a Wi-Fi Security Audit and Compliance Inspection? (you do) Please call me. (more)

11/4/10 – UPDATE:  IBM researchers are proposing an approach to WiFi security they call Secure Open Wireless in light of the release of the Firesheep tool. (more)

11/5/10 – UPDATE: 10 Ways to Protect Yourself from Firesheep Attacks (more)