Posts Taged spies

Are millennials keeping their data safe?

Norton reports one in three millennials use the same password for all accounts; 53 percent have shared passwords with friends or family.

By DECCAN CHRONICLE

While the awareness level in millennials is high about the latest trends in technology and gadgets, it is alarming to see how the knowledge is not being translated well into practice, making them an easy prey for hackers. According to the Norton Cybersecurity Insights Report, one in three millennials use the same password for all accounts; approximately 53 percent of millennials have shared desktop passwords with friends or family members. These trends, witnessed amongst millennials, seem to have put them in a vulnerable position and a common victim of cybercrime.

“Despite a steady stream of cybercrime sprees reported by media, millennials appear to feel invincible and skip taking even basic precautions to protect themselves,” said Ritesh Chopra, Director, Norton business for India.  “This disconnect highlights the need for consumer cyber safety and the urgency for consumers to get back to basics when it comes to doing their part to prevent cybercrime.”

This International Youth Day, Norton would like to share tips on how millennials and consumers can take a few steps towards building a more secure online presence.

Craft a strong, unique password using a phrase that consists of a string of words that are easy for you to memorize, but hard for others to guess. Don’t tie your password to publicly available information as it makes it easier for the bad guys to guess your password. The longer, the better! Additionally, if your account or device enables it, consider two-factor authentication for an extra layer of security. Finally, once you’ve created a strong password, stick with it until you’re notified of a security breach. If you feel overwhelmed, use a password manager to help!
Using unprotected Wi-Fi can leave your personal data vulnerable to eavesdropping by strangers using the same network so avoid anything that involves sharing your personal information when connected to an open Wi-Fi network. If you do use public Wi-Fi, consider using a Virtual Private Network (VPN) to secure your connection and help keep your information private.
Make it a habit to change default passwords on all network-connected devices, like smart thermostats or Wi-Fi routers, during set-up. If you decide not to use Internet features on various devices, such as smart appliances, disable or protect remote access as an extra precaution. Also, protect your wireless connections with strong Wi-Fi encryption so no one can easily view the data traveling between your devices.
Think twice before opening unsolicited messages or attachments, particularly from people you don’t know, or clicking on random links.
Protect your devices with a robust, multi-platform security software solution to help protect against the latest threats.

Camouflaged camera used to spy on neighbours

A man who used a hidden camera to secretly film his neighbours has been convicted of harassment.

by Ryan Nugent

Thomas Kelly (66), of 14 Weirview, Lucan, Dublin, covered a camera in camouflage netting and pointed it to the rear of a neighbour’s house.

Mr Kelly claimed in court he was using the camera for security, to monitor property boundaries, and to catch one of his neighbours “masturbating repeatedly” in the man’s back garden.

Gardaí were alerted to the situation after the neighbour, Paul Lynam, discovered two cameras on a cliff at the back of his home in early 2016.

In his evidence at Blanchardstown District Court, Mr Lynam, of 7 Weirview, said: “I’d a feeling for a long time that I was being watched.”

On foot of the discovery, Mr Lynam, along with two other neighbours, journalist John Mooney and Willie Stapleton – whose homes were also captured by the camera, made an official complaint to gardaí on February 11, 2016.

The following day, gardaí arrived with a search warrant for Kelly’s home along with two other properties he owned, 11 and 12 Wearview.

Upon entering 14 Weirview, now-retired Detective Inspector Richard McDonald said in his evidence there were two large flat screen televisions located in the sitting room. One of the TVs was showing regular programmes, with the other having live feeds to all 16 of Kelly’s CCTV cameras.

Gda Damien Reilly also discovered the camera located on top of the cliff to the rear of the house.

The camera, along with the hard drive of the CCTV system and a number of USB sticks on which footage was stored, was seized by gardaí.

Det Insp McDonald said video footage showed zooming in on the rear of certain homes.

 
A further search by gardaí on July 15, 2016, discovered a replacement camera where the initial one was seized. On this occasion more USB sticks were seized.

On reviewing what had been seized initially, gardaí called Mr Lynam in on May 21, 2016, to review the footage.

One clip appeared to show Mr Lynam to the rear of his own home masturbating. When asked by gardaí if that was the case, Mr Lynam said it was.

In his defence, Kelly claimed in court that he had witnessed Mr Lynam masturbating at the back of 7 Wearview while he was working at the top of the cliff.

He said he had made a complaint to child and family agency Tusla and used the camera to catch Mr Lynam in the act.

Kelly said Mr Lynam was “habitually” naked and was “masturbating repeatedly”.

“My purpose in using those cameras was to capture him doing what we all knew he was doing so I could advance my case,” Kelly said.

He said his grandchildren would be up on top of the cliff and he didn’t want them to witness it.

Kelly also claimed that the 16 cameras were primarily used as a security mechanism and to monitor the boundaries of his land – currently the subject of an ongoing civil dispute.

In their evidence, the victims said they had been “stalked”.

Mr Mooney said: “I have a teenage daughter and a son with a camera pointed at their bedrooms. It terrifies me to think that’s going on.”

He added that he could not allow his daughter to open the blinds at the back of the house for two years, for fears they were being watched.

He said he was alerted to the cameras after Mr Lynam showed images of them to him.

Defence barrister Kitty Perle described the dispute between the neighbours over land as “hotly contested and entrenched warfare”.

Judge David McHugh found the defendant guilty on four counts of harassment. Kelly was remanded on bail until September 27, when victim impact statements will be read out.

 
Irish Independent

Man in Switzerland filmed neighbours’ young daughters with camera hidden in pen

A 52-year-old resident of the northern Swiss town of Lucerne was found guilty of downloading child pornography and filming his neighbours’ young daughters using a camera hidden in a pen.

The Local
news@thelocal.ch
@thelocalswitzer

The father of three had been downloading child pornography between 2011 and 2015, while also running an online forum where such images could be shared. 

The man was apprehended thanks to an Interpol warrant. He was found guilty of secretly filming his neighbour’s young daughters as they used his toilet. He had previously also uploaded images of children from a nudist beach in Austria, reports Swiss news portal 20 Minutes.

Both the young girls were interviewed by investigating authorities, who confirmed that the man had not physically abused them. 

The accused was also found guilty of appropriating a CD of family photos while housesitting his neighbour’s home.

According to an expert who testified in court, the accused had suffered abuse as a child. The court in Lucerne sentenced the man to two years imprisonment, although that sentence was later changed to a course of therapy, and a 34,000 Swiss franc fine. 

While the court judged that the acts were of limited harm, the presiding judge stated that there was a high chance the man could reoffend

Govt to stop wiretap reform – Bonafede

Freezing of case time-outs after 1st ruling being considered

Redazione ANSA

(ANSA) – Rome, July 11 – Justice Minister Alfonso Bonafede said Wednesday that the government will sink a reform of the use of wiretaps in investigations that was approved by the previous centre-left administration. “The wiretap reform will be stopped because the modifications introduced appear a harmful step back on the road to quality and effectiveness in investigations,” Bonafede told the Senate’s justice committee.
    The reform was in response to years of rows over the publication of wiretaps of people not involved in probes, embarrassing them without due cause.
    Bonafede also said he the 5-Star Movement/League government wants to change to Italy’s statute of limitations to prevent people getting off simple because their cases have timed out, saying this was “fundamental priority”.
    He said one option was for the time-out periods to be frozen after a first-instance ruling on a case.
   
 
ALL RIGHTS RESERVED © Copyright ANSA

Surely we can find, and stop, high-tech spies

It’s rumored that the U.S. intelligence community has commissioned The Eagles to rewrite some of their famous lyrics to serve as a deterrent to Russia and China. The hope is that this new song will stop the apparently unabated espionage activities occurring in the National Capital Region, known as the NCR. It’s called “You Can’t Hide Your Spyin’ Eyes.”

BY MORGAN WRIGHT

Concerns about enhanced technical espionage have circulated for a long time. A very provocative technology, currently being used by law enforcement and our military, is a cell-site simulator. Known as an IMSI-catcher, or commercially as a Stingray, it’s a box about the size of an oversized pair of sneakers.

 

IMSI stands for International Mobile Subscriber Identity. This is how the Global System for Mobile Communications (GSM) finds you, regardless of country, and delivers a call to you or allows you to make one to a destination of your choice. Several reports surfaced in 2017 that showed the Department of Homeland Security was worried about IMSI catchers. 

 

In a Nov. 17, 2017, letter, Sen. Ron Wyden (D-Ore.) asked the DHS National Protection and Programs Directorate if there was any evidence of foreign IMSI catchers operating in the National Capital Region. A pilot study had been conducted from January to November of the same year. The short answer was yes. The longer, typical government response was:

“The Department of Homeland Security’s (DHS) National Protection and Programs Directorate (NPPD) has observed anomalous activity in the National Capital Region (NCR) that appears to be consistent with International Mobile Subscriber Identity (IMSI) catchers. NPPD has not validated or attributed such activity to specific entities or devices. This information was reported to our Federal partners at the time it was observed.”

Now that it’s been established that nefarious electronic hijinks abound in the NCR, surely there must be a way to find it and stop it. Right? The short answer is no. The government answer is even more terrifying:

“NPPD is not aware of any current DHS technical capability to detect IMSI catchers. To support such a capability, DHS would require funding to procure, deploy, operate and maintain the capability, which includes the cost of hardware, software, and labor.”

The previous statement might make you think this is a newly discovered problem of which DHS is just becoming aware. But our Canadian neighbors found the same activity near their Parliament in 2017. In 2014, the Harvard Journal of Law and Technology said that “Hostile foreign intelligence services can and, almost certainly, are using the technology in this country for espionage.”

About two weeks ago, the Senate passed a spending bill that included language directing the Pentagon to divulge the use of IMSI catchers near U.S. bases and facilities. It’s not the first time the use of electronics has caused security concerns. A 20-year-old Australian student discovered the location of several military bases overseas by simply looking at the heatmap posted by Strava of running routes that had been shared.

You’d have to go back almost another 20 years to find when the threat of IMSI catchers became a real issue. The notorious hacker Kevin Mitnick was captured in 1996 using the same technology DHS is worried about in 2018. The hacking victim who helped the FBI track Mitnick down — Tsutomu Shimomura — was very well acquainted with the technology.

“Later that night, the FBI radio surveillance team from Quantico, Virginia, arrived at the Sprint cellular telephone switch office. The team talked to me a little about the technology they had toted along in the station wagon, especially something called a cell-site simulator, which was packed in a large travel case. The simulator was a technician’s device normally used for testing cell phones, but it could also be used to page Mitnick’s cell phone without ringing it, as long as he had the phone turned on but not in use. The phone would then act as a transmitter that they could home in on with a Triggerfish cellular radio direction-finding system that they were using.”

This wasn’t Shimomura’s first brush with cell phones. In 1993, in front of a congressional oversight committee, he showed how easy it was to use a software hack to listen in on the calls of nearby cellular phones. The problem isn’t new. In fact, it’s quite old.

If you take DHS’s response at face value, it appears NPPD does not have its own technical capability. If DHS has no organic ability, how did it detect anything in the first place? With a little help from other solutions. Project Overwatch, for example.

According to the RSA presentation, “Project Overwatch has been a multinational effort between USA, Germany, and Australia to create a solution leveraging GSMK’s patented Baseband Firewall technology.” This began six years ago.

In February 2017, at the RSA Security Conference in San Francisco, a demonstration of Project Overwatch showed the detection of rogue IMSI catchers — the same technology DHS used, but did not disclose, in its letter to Sen. Wyden.

The warnings were there. The threat was there. Six years ago, we worked with our allies to develop a solution to counter this growing form of technical espionage. So why is Congress just now worried about this?

It’s inconceivable that this electronic eavesdropping that targeted the White House, Congress, our federal law enforcement and intelligence agencies, and who knows what else, should have gone on for this long without a warning to the relevant oversight committees. And the public.

When it comes to our national security, no one should be allowed to, as The Eagles might say, “Take It Easy.”

Morgan Wright is an expert on cybersecurity strategy, cyberterrorism, identity theft and privacy. Previously Morgan was a senior advisor in the U.S. State Department Antiterrorism Assistance Program and senior law enforcement advisor for the 2012 Republican National Convention. Follow him on Twitter @morganwright_us.

Germany conducts searches against 10 suspected Iranian spies

German authorities searched premises linked to 10 suspected Iranian spies following extensive investigations by the country’s domestic intelligence agency, prosecutors said Tuesday.

A spokesman for the Federal Prosecutors Office said the raids took place early Tuesday at private homes and offices across Germany.

“We believe the suspects spied on institutions and persons in Germany at the behest of an intelligence unit associated with Iran,” spokesman Stefan Biehl told The Associated Press.

He declined to comment on a report by weekly magazine Focus that the suspects were spying on Israelis in Germany.

The investigation was prompted by a tip from Germany’s domestic intelligence service, said Biehl, adding that no arrests had been made yet.

Germany’s Interior Ministry referred questions about the raids to federal prosecutors.

Last month, the German government protested to the Iranian ambassador following the conviction of an Iranian agent for spying. The Pakistani man was convicted in Berlin last year of espionage and sentenced to more than four years in prison. His targets included Reinhold Robbe, who headed the German-Israeli Association.

Germany’s Foreign Ministry said Iranian ambassador Ali Majedi was summoned just before Christmas and told that “spying on people and institutions with a particular relationship to the state of Israel on German soil is a blatant violation of German law.”

By THE ASSOCIATED PRESS
BERLIN — Jan 16, 2018, 6:45 AM ET