Posts Taged technology

Man in Switzerland filmed neighbours’ young daughters with camera hidden in pen

A 52-year-old resident of the northern Swiss town of Lucerne was found guilty of downloading child pornography and filming his neighbours’ young daughters using a camera hidden in a pen.

The Local
news@thelocal.ch
@thelocalswitzer

The father of three had been downloading child pornography between 2011 and 2015, while also running an online forum where such images could be shared. 

The man was apprehended thanks to an Interpol warrant. He was found guilty of secretly filming his neighbour’s young daughters as they used his toilet. He had previously also uploaded images of children from a nudist beach in Austria, reports Swiss news portal 20 Minutes.

Both the young girls were interviewed by investigating authorities, who confirmed that the man had not physically abused them. 

The accused was also found guilty of appropriating a CD of family photos while housesitting his neighbour’s home.

According to an expert who testified in court, the accused had suffered abuse as a child. The court in Lucerne sentenced the man to two years imprisonment, although that sentence was later changed to a course of therapy, and a 34,000 Swiss franc fine. 

While the court judged that the acts were of limited harm, the presiding judge stated that there was a high chance the man could reoffend

Surely we can find, and stop, high-tech spies

It’s rumored that the U.S. intelligence community has commissioned The Eagles to rewrite some of their famous lyrics to serve as a deterrent to Russia and China. The hope is that this new song will stop the apparently unabated espionage activities occurring in the National Capital Region, known as the NCR. It’s called “You Can’t Hide Your Spyin’ Eyes.”

BY MORGAN WRIGHT

Concerns about enhanced technical espionage have circulated for a long time. A very provocative technology, currently being used by law enforcement and our military, is a cell-site simulator. Known as an IMSI-catcher, or commercially as a Stingray, it’s a box about the size of an oversized pair of sneakers.

 

IMSI stands for International Mobile Subscriber Identity. This is how the Global System for Mobile Communications (GSM) finds you, regardless of country, and delivers a call to you or allows you to make one to a destination of your choice. Several reports surfaced in 2017 that showed the Department of Homeland Security was worried about IMSI catchers. 

 

In a Nov. 17, 2017, letter, Sen. Ron Wyden (D-Ore.) asked the DHS National Protection and Programs Directorate if there was any evidence of foreign IMSI catchers operating in the National Capital Region. A pilot study had been conducted from January to November of the same year. The short answer was yes. The longer, typical government response was:

“The Department of Homeland Security’s (DHS) National Protection and Programs Directorate (NPPD) has observed anomalous activity in the National Capital Region (NCR) that appears to be consistent with International Mobile Subscriber Identity (IMSI) catchers. NPPD has not validated or attributed such activity to specific entities or devices. This information was reported to our Federal partners at the time it was observed.”

Now that it’s been established that nefarious electronic hijinks abound in the NCR, surely there must be a way to find it and stop it. Right? The short answer is no. The government answer is even more terrifying:

“NPPD is not aware of any current DHS technical capability to detect IMSI catchers. To support such a capability, DHS would require funding to procure, deploy, operate and maintain the capability, which includes the cost of hardware, software, and labor.”

The previous statement might make you think this is a newly discovered problem of which DHS is just becoming aware. But our Canadian neighbors found the same activity near their Parliament in 2017. In 2014, the Harvard Journal of Law and Technology said that “Hostile foreign intelligence services can and, almost certainly, are using the technology in this country for espionage.”

About two weeks ago, the Senate passed a spending bill that included language directing the Pentagon to divulge the use of IMSI catchers near U.S. bases and facilities. It’s not the first time the use of electronics has caused security concerns. A 20-year-old Australian student discovered the location of several military bases overseas by simply looking at the heatmap posted by Strava of running routes that had been shared.

You’d have to go back almost another 20 years to find when the threat of IMSI catchers became a real issue. The notorious hacker Kevin Mitnick was captured in 1996 using the same technology DHS is worried about in 2018. The hacking victim who helped the FBI track Mitnick down — Tsutomu Shimomura — was very well acquainted with the technology.

“Later that night, the FBI radio surveillance team from Quantico, Virginia, arrived at the Sprint cellular telephone switch office. The team talked to me a little about the technology they had toted along in the station wagon, especially something called a cell-site simulator, which was packed in a large travel case. The simulator was a technician’s device normally used for testing cell phones, but it could also be used to page Mitnick’s cell phone without ringing it, as long as he had the phone turned on but not in use. The phone would then act as a transmitter that they could home in on with a Triggerfish cellular radio direction-finding system that they were using.”

This wasn’t Shimomura’s first brush with cell phones. In 1993, in front of a congressional oversight committee, he showed how easy it was to use a software hack to listen in on the calls of nearby cellular phones. The problem isn’t new. In fact, it’s quite old.

If you take DHS’s response at face value, it appears NPPD does not have its own technical capability. If DHS has no organic ability, how did it detect anything in the first place? With a little help from other solutions. Project Overwatch, for example.

According to the RSA presentation, “Project Overwatch has been a multinational effort between USA, Germany, and Australia to create a solution leveraging GSMK’s patented Baseband Firewall technology.” This began six years ago.

In February 2017, at the RSA Security Conference in San Francisco, a demonstration of Project Overwatch showed the detection of rogue IMSI catchers — the same technology DHS used, but did not disclose, in its letter to Sen. Wyden.

The warnings were there. The threat was there. Six years ago, we worked with our allies to develop a solution to counter this growing form of technical espionage. So why is Congress just now worried about this?

It’s inconceivable that this electronic eavesdropping that targeted the White House, Congress, our federal law enforcement and intelligence agencies, and who knows what else, should have gone on for this long without a warning to the relevant oversight committees. And the public.

When it comes to our national security, no one should be allowed to, as The Eagles might say, “Take It Easy.”

Morgan Wright is an expert on cybersecurity strategy, cyberterrorism, identity theft and privacy. Previously Morgan was a senior advisor in the U.S. State Department Antiterrorism Assistance Program and senior law enforcement advisor for the 2012 Republican National Convention. Follow him on Twitter @morganwright_us.

South Korean women protest in Seoul over hidden sex cameras

Tens of thousands of women gathered in Seoul on Saturday calling for a crackdown on spy cam pornography, in one of the country’s biggest ever female-only protests.

Perpetrators film or photograph women with hidden cameras in public spaces.

Although distributing pornography is illegal in South Korea, the videos and pictures are shared widely online.

Organisers say women live in constant fear of being photographed or filmed without their knowledge.

Carrying placards and banners with messages like “My life is not your porn”, the women were mostly teenagers or in their 20s – seen as the main victims of the hidden cameras.

“Those men who film such videos! Those who upload them! Those who watch them! All of them should be punished sternly!” they chanted.

The women covered their faces with masks, hats and sunglasses as instructed by the organisers.

Demonstrators said around 55,000 women took part, although police put the figure at around 20,000.

The recent protests began after police arrested a 25-year-old woman in May for secretly photographing a male colleague who posed nude for university art students. She then shared the picture online.

Demonstrators believe police only acted so swiftly because it was a female perpetrator, and pointed to instances of police closing cases with female victims because they could not find the photographers or track them online, because they posted on foreign servers.

While the law mandates a maximum five-year prison term or 10 million won ($8,970; £6,770) fine for creating sexual images, and a maximum seven year sentence and 30 million won ($26,900; £20,200) fine for distributing them for profit, protesters say many receive far lighter punishments.

The recent protests began after police arrested a 25-year-old woman in May for secretly photographing a male colleague who posed nude for university art students. She then shared the picture online.

Demonstrators believe police only acted so swiftly because it was a female perpetrator, and pointed to instances of police closing cases with female victims because they could not find the photographers or track them online, because they posted on foreign servers.

While the law mandates a maximum five-year prison term or 10 million won ($8,970; £6,770) fine for creating sexual images, and a maximum seven year sentence and 30 million won ($26,900; £20,200) fine for distributing them for profit, protesters say many receive far lighter punishments.

By BBC

Chinese peeping Tom installed secret cameras to film couples in love hotels and sell footage online

Man accused of selling footage through popular social media platform

by Nectar Gan

A man has been arrested in southwest China on suspicion of installing webcams in hotels to film couples having sex and then selling the footage online, according to local media reports.

When the couple went to bed they looked up and saw a hole in the ceiling, which they examined and found a camera had been hidden inside pointing directly at the bed.

The two immediately called the police, who soon arrived and took out the camera.

Police found no memory cards inside so concluded it was a real-time webcam that sent footage to another platform.

“My whole body just froze up,” said the woman, who then decided to spend the night sleeping in the car with her husband.

The next day, the couple went to the hotel to demand an explanation, but the hotel said it was not aware the camera was there.

After further investigation, a second webcam was found in a room on the same floor.

Hotel staff told police they remembered that a man had booked two rooms at the hotel in March and checked in on his own. The two rooms he had booked turned out to be the ones that had the cameras installed.

A month later, police seized the suspect in his flat, and found two hard drives totalling 3 terrabtyes of memory containing the sex tapes he had recorded.

The man was reported to have told police he came up with the idea because he was broke and wanted to earn some quick money by selling the clandestine footage.

He first installed cameras in hotels in his home county about 100km (60 miles) away from Chengdu, but the people who checked in to the hotels were “not ideal”, he said.

Following suggestions from his customers, he decided to install cameras in more expensive hotels in the provincial capital, and bought a fake identity card online.

Through mobile apps, he located love hotels popular among young couples. But the first camera he installed in January was soon discovered by a hotel staff member and thrown away.

Not ready to give up, he tried again in March.

The two cameras he is accused of installing then had been connected to the power strip in the ceiling and could be automatically turned on when the customers plugged in the room key.

The report said footage was directly sent to the man’s phone and then uploaded to a computer.

Police believe the man created a chat group on QQ, a popular social media platform, and started to absorb “members” who would pay a monthly fee for unlimited access to the footage.

In just a few months, the monthly fee rose from 400 yuan (US$60) per month to 2,000 yuan. He had about 10 “members” in total and made 15,000 yuan, he said.

The man has now been officially arrested on the charge of spreading obscene articles. There was no word on whether police would seek to take action against his subscribers.

CABBIE CAM Lanarkshire taxi driver installed hidden camera in his cab to upskirt female passengers

Police discovered his pervy cam after they raided his home in connection with sick images of children

By David Meikle

A TAXI driver who installed a hidden camera to film under the clothing of unsuspecting passengers is facing jail.

David Whitehead, 53, set up the covert device in a twisted bid to record members of the public as they travelled in his vehicle.

His seedy spying operation saw him capture footage of a passenger but it only came to light when police raided his home in connection with sick images of children.

Officers launched a dawn raid at the property in Cumbernauld, Lanarkshire, after a tip off and discovered extreme clips and pictures.

The disturbing haul of 2503 photos and 1529 videos included horrific footage of abuse.

Whitehead appeared at Airdrie Sheriff Court and admitted taking or permitting indecent images of children between August 2005 and August 2017

He also admitted having the hidden camera in his car between August and September 2013.

The court was told Whitehead was stripped of his taxi licence soon after his arrest last year.

 

Depute fiscal Agnes Meek said: “Information was received by the National Child Abuse Prevention that a device associated with the locus was connected to the internet and had indecent images of children available for sharing.

“Officers sought and were granted a warrant and police attended to execute the warrant.

“A systematic search was carried out and a number of devices were seized.

“The accused while standing in his kitchen in front of officers, stated ‘it is all me, nothing to do with my boy’.

“He was detained and after provided a no comment interview.”

Miss Meek added: “One moving image is 29 minutes long and features several clips put together of child sexual exploitation.”

Sheriff Derek O’Carroll deferred sentence and continued Whitehead’s bail for reports but warned him to expect to be sent to prison.

He added: “Given the nature of the offences you should understand that a custodial sentence is very much at the forefront of this court’s mind.

“I will continue your bail but you should not draw any conclusions from that regarding the ultimate final disposal of this case.”

Whitehead was placed on the sex offenders register.

North Lanarkshire Council confirmed they revoked Whitehead’s taxi licence last year.

His not guilty pleas to possessing indecent photos, possessing extreme bestiality images and possessing cannabis were accepted by prosecutors.

Dad arrested for recording teen daughter, friend in bathroom

A Michigan father spied on his teen daughter and her friend for nearly two years — and even set up a hidden camera in his own bathroom to record the girls, authorities said.

By Joshua Rhett Miller

Gary Lloyd Miller, of Norton Shores, was arrested after his wife found the secret camera, which was disguised as a phone charger in the couple’s bathroom, MLive.com reports.

Miller, 60, is accused of surreptitiously recording his 18-year-old daughter and one of her friends from October 2016 through June, according to Muskegon County Chief Assistant Prosecutor Timothy Maat.

Miller — who surrendered to authorities on May 31 — was arraigned on June 14 on four charges, including two counts each of capturing an image of an unclothed person and surveilling an unclothed person. If convicted of both felonies, he faces up to seven years in prison.

Miller posted $50,000 bond on the day of his arrest and was never formally taken into custody at the Muskegon County Jail as part of an abbreviated booking process that did not include a mugshot, Maat said.

After waiving his preliminary hearing, Miller was ordered to stand trial in Muskegon County Circuit Court, MLive.com reports.

‘HE’S EVIL’ Horrified newlywed turns husband in to cops after discovering he secretly filmed kids in KFC toilets

Heartbroken Mollie Clarke, 21, made the shocking discovery after checking Richard Cooper’s phone as it lay charging on the kitchen table.

By Jacob Dirnhuber

 

A YOUNG mum was forced to turn in her newlywed husband to the police after discovering that he had used hidden cameras to film kids in a KFC toilet.

Heartbroken Mollie Clarke, 21, made the shocking discovery after checking Richard Cooper’s phone as it lay charging on the kitchen table.

 

She had suspicions he was cheating on her – but instead of finding racy texts from another woman, she came across a trove of women and children using the fast food outlet’s bathroom.

Cancer survivor Mollie immediately turned him into the cops – and told his mum within minutes of the shocking discovery.

When he pleaded guilty in court, she discovered he’d made a video of her using the toilet at home as a “dry run”.

She said: “I realise now the man I thought I was married to didn’t exist. I didn’t know him.

 

“He put his phone on the charger, told me to not look through it before walking out.

“It had a pass lock on it but I managed to guess it.

“I still don’t know why but I went straight to his videos. Anyone else would have went for messages, but something told me check there.

“The first video I saw was of a child going to the toilet. I just threw the phone down in shock.”

“Within about 20 minutes I was in the car with my sister and going to the police station with his phone in my hand.

But Cooper, of Ballymoney, Co Antrim, walked free from court after a judge handed him a two-year probation order.

Mollie added: “I feel like he’s got away with it to be honest.

“He walked free. The sentence in my eyes was far too lenient.

“He had disgusting videos of a child on his phone. That worries me.

“He’s evil, there is no other word to describe him and in my eyes he should have been jailed.’

“We’d been together about three years when I moved in with him when I was 17.”

Student filmed female housemates in the shower with hidden sponge camera

Imagine jumping into your shower at home, not knowing your naked self was being filmed by a hidden camera by someone you trusted. 

University of Wollongong student Rico Auliputra concealed a camera inside a household sponge in his bathroom, hoping to record his three female house mates. 

Today, the Indonesian national narrowly escaped jail time at Wollongong Local Court after pleading guilty to the offence. 

The 26-year-old covered his face with a hoodie and satchel to avoid a waiting media scrum outside, as he ran to a getaway car. 

Auliputra was living in a share-unit in Wollongong’s CBD, when his three female housemates discovered a green flashing light coming from a slit in a yellow sponge on the floor of their shower on October 28 last year. 

On further inspection they found a cord from the set-up to a battery power pack, which was hidden in the vanity. 

Auliputra confessed to the crime after being confronted by the group, who called Wollongong Police. But when officers arrived on scene, the SD card inside the camera had disappeared. 

The defence lawyer today revealed that when the camera was discovered Auliputra threw the card from the seventh floor of his balcony, later returning to recover the card but was unsuccessful. 

The IT student showed some remorse, telling his lawyer, “I regret what I did because I betrayed my friends. It’s hard now to be trusted because of the mistake I did.” 

The Crown argued he should do time behind bars saying, “It is a serious offence and serious breach of trust.” 

However, Magistrate Follent took into consideration his good character and guilty plea, sentencing him to 250 hours of community service. 

In her closing statements to Auliputra she said, “What you did was reprehensible, abusing the significant trust of your friends. It was calculative and exploitative for your own gratification.” 

Auliputra is to remain a student at the University of Wollongong for another year. Management has refused to comment on the incident today.

Source: 9NEWS

‘My life is not your porn’: 30,000 South Korean women protest spy cams

korea hidden camera

In the biggest women’s rights march in the country’s history, thousands of female activists swarmed the streets of Seoul, venting their anger at a ‘hidden cam’ porn industry and police bias in investigating sex crimes by men.


Some 30,000 women, many of them wearing masks for fear of exposure, marched from Hyehwa Station in South Korean capital of Seoul, to protest what they say is a lackluster response of law enforcement to men spying on unsuspecting female victims in public bathrooms, on crowded trains, buses and in other public places with hidden cameras.

Saturday’s rally is the second time in two months that women have hit the streets to protest the impunity of the perpetrators of such crimes, who are predominantly male. On May 19, a similar rally drew in at least 12,000 women. Just like on Saturday, the demonstrators were covering their faces with masks and printed camera images.

“No case ever received as much media attention as the Hongik University incident,” an organizer of the May 19 protest, who, like her fellow demonstrators, preferred to stay anonymous out of fear of revenge, said at the time, as cited by Yonhap.

“Although females are victimized by hidden cameras even in public places, it is hard for us to see news of the men who film and leak such images being punished,” she added.

Police have rejected allegations of bias, insisting that they treat all victims the same. Critics of the protest movement argue that the woman was promptly detained for no other reason than clear evidence pointing at her.

According to police statistics, suspects in ‘molka’ cases are overwhelmingly male. In 2017, some 96 percent of suspects caught by police in 5,437 such cases were male. Of them, 119 were charged and faced punishment. Out of the 283 female suspects apprehended, none of them faced charges.

On a larger scale, only 2.6 percent of male suspects were arrested between 2012 and 2017, around 540 people out of over 20,900 suspected perpetrators.

While the issue is not new, the current wave of protests was sparked by an incident in early May, when a woman was arrested for filming and spreading the image of a nude male model posing for an art class at Hongik University. Police acted swiftly and not only brought the suspect to justice, but also paraded her in front of the media, albeit, with her face covered. The case became the last straw for many women, who saw gender bias in the police’s zealousness.

Source: RT   

South Korean women demand equal justice for internet sex crimes amid ‘spy-cam porn epidemic’

Thousands of women took to the streets of Seoul over the weekend to demand that the police fairly investigate digital sex crimes involving hidden cameras.

Demonstrators among the 12,000-strong gathering claimed that the police would “speed up” their investigations if the victims of privacy intrusions of a sexual nature were men, while allegedly dragging their feet over abuse cases involving women, including ubiquitous “spy-cam” or “revenge porn.”

The event on Saturday was one of the largest female protests in recent South Korean history. Many wore red as a symbol of their anger, while chanting “women are also citizens of Korea,” reported the Korea Times.  

The protest was sparked by the arrest of a female model, 25, for allegedly photographing a male colleague naked without his knowledge while he was posing for university fine art students, and uploading the picture online. 

The young man was reportedly distraught after his picture went viral and he was ridiculed. 

Women were surprised, however, by how quickly the police rushed to solve the case – taking under a week to do so. Over 400,000 people have now signed a petition to the presidential Blue House, demanding “equal justice” and claiming that the female suspect has been unfairly treated.
 
“Just because the victim is a man and the suspect is a woman this time, the country is investigating the case differently,” wrote one petitioner, according to the JoongAng daily. 

“Remember the cases of women who were victims of hidden camera crimes and went to the police for help?” wrote another. “They would be told, ‘Well you had it coming to you, because you didn’t dress modestly’ or ‘We can’t catch the culprit. It’s too hard’.”

For years, South Korean women have been victims of what was described by the Korea Expose website as a “spy-cam porn epidemic”. They have been secretly filmed in public bathrooms, changing rooms, or a camera has been pointed up their skirt on an escalator, and the footage is then posted online. 

In 2016, the police closed down Soranet, one of the most notorious websites for hidden camera footage of female body parts, and which had over one million users. It reportedly took the authorities ten years to do so.

According to police data, almost 5,200 sexual harassment cases involving spy-cam footage were reported in 2016. Over 80 percent of the victims were women. The same year, more than 7,300 requests were made to remove revenge porn, which had often been illegally uploaded. 
 
Petitioners to the Blue House also mentioned the case of five male swimmers who were charged for installing spy cameras in the female swimmers’ locker room. They were pronounced innocent last year by a local court, citing lack of evidence. 

The presidential office has proposed regulating hidden camera sales, imposing stronger penalties and providing a stronger support system for victims. 

Source: The Telegraph