Hacker: traçage Wind phone. Data Extraction to bypass password Michigan. Satelite encryption cracked. Privacy boss slams German police's mobile ta. US AT&T surveillance. Vulnerability known in 2005 T-Mob. Zuckerberg: Anonymity Online. Greg Miskiw to fly to UK for police talks. Life under digits. Update 20/03/2012 This could be titled ‘when reality catch up with science fiction’. How to beleive that your refrigeratoris telling on you to the CIA and your flat screen TV is watching you? Well, it’s all true, read by yourself. - ‘CIA: We’ll spy on you through your refrigerator‘ - ‘Is Your New HDTV Watching You?
Drones proliferation, there cheap fabrications and tentative of regulation regularly on the news. I have been collecting many articles on the subjects of surveillance, tracking, spying, and drones on my Pearltrees for anyone interested to make its own opinion. I am reading today a very well analysed essay by Ian Brown, Oxford Universitty Institute of Internet, on Drones surveillance and identity, titled ‘Privacy, surveillance and technologies impact on identity.’ To watch absolutely if you needed to understand what Drones are capable of producing: ‘Like a Swarm of Lethal Bugs: The Most Terrifying Drone Video Yet’ To read: ‘Why American Say No To Drones‘. ‘Are Drones Watching Your Town?’ Update 01/03/2011: CCTVs in schools even in the changing rooms I am told !! Update 08/11/2011 ‘Met Police request for Oyster data scrutiny ‘rises” ‘You gotta remember, @jeffjarvis was suggesting after 9/11 that we fly naked.‘ ‘Nude model or groping victim?
Hacker shows how he can intercept cell phone calls with $1,500 device (video) A security researcher showed in a live demo today how he can intercept cell phone calls on 80 percent of the world’s phones with just about $1,500 worth of equipment. Chris Paget, who also showed yesterday how he can hack into radio frequency identification tags (RFID) from a distance, created a fake cell phone tower, or Global System for Mobile communications (GSM) base station. GSM is the protocol for 80 percent of the world’s phones and is used by T-Mobile and AT&T in the U.S. The demo was not, Paget said, a malicious attack in any way. Military and intelligence agencies can intercept cell phone calls with their wiretapping technology.
“There’s a good chance you won’t even know about it when it happens,” Paget said during a talk at the Defcon security conference in Las Vegas. Paget’s system disables the encryption in the system, and the GSM network complies and never sends a warning message. In the demo, he turned on his interceptor and immediately had 15 people on his network. SourceWatch. Koch Spy Agency Led by Voter Fraud Huckster The Kochs have been complaining about a "lack of civility in politics" as they seek to boost their public image--but one of their top operatives helped propel perhaps the most egregious case of race-baiting voter fraud hucksterism in recent years. At the same time that the Kochs have been on a PR blitz, publicly spinning an image of themselves as well-intentioned patriots trying to make the world a better place and decrying "character assassination," they've been quietly ramping up a clandestine surveillance and intelligence gathering operation focused on their perceived political enemies, Ken Vogel reports at Politico.
At the helm of this "competitive intelligence" operation is a man named Mike Roman, Vice President of Research for Kochs' Freedom Partners and who was paid $265,000 last year, according to Freedom Partners' recent tax filing. Read the rest of this item here. Wisconsinites Reject the "Eric O'Keefe Session" of the Legislature Rep. Privacy lawyer challenges police view of intercept law | Pinsent Masons LLP. The Met's Assistant Commissioner John Yates told MPs that the police force's legal advice was that it was not against the law to hack into messages that someone has already received. Data protection law expert Rosemary Jay has challenged this interpretation of the law. Yates was responding to MPs' questions about the Met's investigation into the reportedly large number of people whose mobile phone messages may have been listened to by News of the World journalists or private detectives working for the paper.
Yates told The Commons Home Affairs Select Committee that though the Regulation of Investigatory Powers Act (RIPA) made it illegal to intercept any private message sent over a telecoms network, the Met's advice had been that this actually only applied to as-yet unreceived messages. "Hacking is defined in a very prescriptive way by the Regulation of Investigatory Powers Act and it’s very, very prescriptive and it’s very difficult to prove," he told the Committee. Phone hacking report: see how the select committee voted on each amendment | News. The phone hacking report by the Commons culture, media and sport select committee is out today and it is pretty critical of both Rupert and James Murdoch, as well as many of the other players in the story so far.
Writing today, Dan Sabbagh and Josh Haliday say that The Commons culture, media and sport select committee also concluded that James Murdoch showed "wilful ignorance" of the extent of phone hacking during 2009 and 2010 – in a highly charged document that saw MPs split on party lines as regards the two Murdochs The MPs voted on 16 separate amendments to the report, many of which changed the text of large chunks of it. So, how did they split? We went through the original report, and categorised each amendment as either: • Votes for more critical amendments• Votes for less critical amendments Under our categorisation, there were 9 amendments which effectively made the report more critical of the Murdoch's and News International, and six made it less critical.
Voting summary. US senator invokes website-hacking trial in call for Murdoch inquiry | Media. In July 1999, two brothers called George and Richard Rebh, the founders of a small start-up company called Floorgraphics, were invited to lunch with the dominant firm in their new area of business. The brothers were excited: they had invented a new product that involved sticking giant adverts on the floors of supermarkets, and were keen to show it off to the market leaders and talk about possible joint promotions. They met the two top executives from the big firm, News America Marketing, in a Cantonese restaurant called A Dish of Salt in midtown Manhattan.
Over hors d'oeuvre, News America's chief executive Paul Carlucci said: "So, I understand you're here to sell your company? " According to transcripts of a trial that took place 10 years after the lunch, the Rebh brothers were astonished. The 2009 trial of Floorgraphics versus News Corp was invoked on Wednesday by Frank Lautenberg, a New Jersey senator who has called for an official inquiry into News Corporation behaviour in the US.
Data que les operateurs telephoniques peuvent transmettre. LulzSec hack: News International removes remote access | Technology. News International took its remote access and webmail systems offline for 12 hours, and is resetting the passwords for all users after the company's systems were breached by members of the hacking group LulzSec. The hackers appear to have gained access to the database with email and password details, some of which were published online last night on the Twitter accounts of some of LulzSec's members. Taking webmail and remote access offline was the only way that News International could be sure that nobody from the group who might have access to the details can log in and steal emails belonging to staff. In a note sent out to all News International staff at 11.05pm on Tuesday night, soon after LulzSec hacked a server in the company's systems to redirect people visiting the Sun's main web page to a faked story suggesting Rupert Murdoch had been found dead, the company said there has been a "security breach".
Soundminer, un malware espionne et vole les données des smartphones Android. Des chercheurs ont mis au point un cheval de Troie « low profile » actif couplé à un spyware sous l'OS Android de Google et capable de voler des données d'une façon probablement indétectable par l'utilisateur ou un logiciel antivirus. Le spyware a été conçu pour requérir le minimum d'autorisations pour éviter d'être repéré. Par exemple, le virus peut être autorisé à accéder uniquement au micro du téléphone, mais pas un accès élargi pour transmettre des données, intercepter des appels téléphoniques sortants ou entrer dans les listes de contacts, des opérations qui pourraient susciter des soupçons. Une variante très efficace et discrète C'est pourquoi, dans une autre version de l'attaque, les chercheurs ont associé Soundminer avec un Trojan indépendant, du nom de Deliverer, qui prend en charge l'envoi des informations recueillies par le spyware.