Categories
Security Uncategorized

How to tap a phone line

Hollywood depicts phone surveillance as the thankless work of sweaty cops hunched over a pair of headphones. In the real world, setting up a wiretap is actually a snap. Regardless of which side of the law you’re on, here are the steps to becoming a landline hacking super sleuth. [via]

Categories
Security Surveillance Uncategorized

Surveillance Unlimited: How We’ve Become the Most Watched People on Earth

Excellent new book has been published about how the UK has become a surveillance society.

SURVEILLANCE UNLIMITED is a gripping examination of the erosion of personal privacy and a disturbing look at the relationship between technology and society in modern daily life.

Nineteen eighty-four’s all-seeing eye is now a reality. Britain is a surveillance society, but in ways that Orwell could never have imagined. Your car is satellite-tracked, your features auto-identified on video, your e-mails, faxes and phone calls monitored. You are secretly followed via transmitters implanted in your clothes, via your switched-off mobile and your credit card transactions. Your character, needs and interests are profiled by surveillance of every website you visit, every newsgroup you scan, every purchase you make. Big Brother is here, quietly adding to your files in the name of government efficiency and the fight against organised crime and terrorism.

A review of the book has been posted on spyblog.org.uk

Categories
Computing Security

Social Engineering 101

Social Engineering 101: Mitnick and other hackers show how it’s done

Categories
Security Uncategorized

The Guardian Series: What liberty means to me

Rachel North: We are each other’s best security

But as any parent knows, it is not always possible to keep those you love safe, and a person who is always safe is a person who never knows freedom and who has no life.

…For no government can keep us safe, even if they watch over us and film us and check our emails and internet use and hold our most intimate data and fill hundreds of prison cells with people who are merely suspected of, but not charged with, any crime.

Rachel has great insight of this issue I think.

Categories
Security Uncategorized

The War on Kids

The War on Kids continues apace with a scared-straight exercise designed by officials of an El Camino High School to dramatize the consequences of drinking and driving. Highway patrol officers were asked to come to the school and announce that several students had been killed over the weekend in car accidents. The students reacted as you might expect they wept and some became hysterical.

Michelle de Gracia, 16, was in physics class when an officer announced that her missing classmate David, a popular basketball player, had died instantly after being rear-ended by a drunken driver. She said she felt nauseated but was too stunned to cry.

However throughout that day news spread that in fact no car accidents had occurred and no one had died, it was merely an exercise to scare the students into not drink driving. Students were understandably shocked and angry upon learning the truth.

“You feel betrayed by your teachers and administrators, these people you trust,” said 15-year-old Carolyn Magos.

I think the only lesson that the kids will learn from this is that authority figures are not to be trusted and that they will lie to you.

ColdChef a commenter at Metafilter describes a similar but I think more effective method to reduce drink driving amongst teenagers.

Every year, around prom time, my family funeral home participates in a “mock accident” that is staged in front of the local high school. The students are called into an assembly, and while they’re in the building, and with the assistance of local government and law enforcement, we arrange crashed cars on the roadway in front of the school. Every effort is made to make the accident as realistic as possible, including fake blood and (admittedly) crappy make up.

When the students come outside, they see the wreck, which is usually peppered with popular students for maximum effect. At first there’s some laughter and gawking at the students they recognize. They are given a moment to take in the scene, and then police and firemen arrive, with lights and sirens, securing the perimeter. An ambulance comes, removes the bodies from the cars, attempts treatment and then pronounces them dead.

Then, it’s my turn. My brother and I drive up in the hearse, solemn and grave-faced–full black suits. Much more serious than we would be at an actual wreck. First, we cover the body with a white blanket. We gently lift the body of the student onto our cot, into a zippered black bag. We slowly zip it up, place the body into the back of the hearse and drive off.

At no point does anyone try to pass this off as reality. It’s a tableau…something to stick in their minds. This past year, they included as part of the scene a hysterical mother, arriving at the scene and going apeshit at the sight of her “dead” daughter. And, just like all of the kids there, I knew it was all fake, but it still affected me. The mother played the part well. She screamed and cried and fought the police officers to get to her child, finally collapsing into a heaving heap on the asphalt.

I’m sure that the imagery of such a tableau along with the reaction of the ‘mother’ is something that would affect teenagers and would stay with them for a long time and thus would be a far more effective deterrent. [via]

Categories
Security Uncategorized

Fake phone call fooled UBC security in museum heist

Thieves bypassed all security systems by simply posing as the security company on the phone. [via]

A classic piece of social engineering.

Categories
Security Uncategorized

Reconceptualizing Security – Talk by Bruce Schneier

Security expert Bruce Schneier gave a talk last month at InfoSecurity Europe in London which was a follow-on to his work on the psychology of security.

The full talk can be viewed online here. (43 mins)

Great talk and very much worth watching if wish to understand the pros and cons of security theatre and how security threats are presented by the media.

Categories
Computing Security

Security Engineering book – 1st edition available to download for free

Ross Anderson, Professor of Security Engineering at the Computer Laboratory of The University of Cambridge has just published the second edition of his book Security Engineering, the preface and six chapters of which is available to download.

Purchase from Amazon.co.uk

To quote Bruce Schneier “This is the best book on the topic there is, and I recommend it to everyone working in this field — and not just because I wrote the foreword.”

Professor Anderson has made the first edition of his fantastic book available to download for free as a 17MB pdf.

Categories
Security Uncategorized

Pupils posing as paedophiles

Pupils posing as paedophiles in cyber-bullying, police warn [via]

Children as young as 10 may be posing as predatory paedophiles on internet networking sites to frighten boys and girls they have fallen out with, police revealed yesterday. Officers have warned parents and children to be vigilant after as many as nine youngsters in Padstow, Cornwall, were targeted through the networking sites Bebo and MSN.

Seems inevitable to me that something like this would happen given the British tabloids obsession with the threat of paedophiles to the nation’s children that kids would pick up on this and use the fear of paedophiles as a way to scare and bully their victims.

Categories
Security Uncategorized

Spam with good security message

Bit of spam that I received that contains a good message about security.

A true story:

This lady has changed her habits after her handbag was
stolen. Her handbag which contained her mobile, credit card,
purse etc was stolen. 20 minutes later when she called her husband,
telling him what had happened, he said ‘I’ve just received your SMS asking
about our Pin number and I’ve replied a little while ago.’

When they rushed down to the bank, the bank staff told them all the
money was already withdrawn.

The pickpocket had actually used the stolen mobile phone to SMS ‘hubby’
in the contact list and get hold of the pin number. Within 20 minutes
he had withdrawn all the money from the bank account.

Moral of the lesson:
Do not disclose the relationship between you and the people in your
contact list. Avoid using names like Home, Honey, Hubby, sweetheart, Dad,
Mum etc, and very importantly, when sensitive info is being asked
through SMS, CONFIRM by calling back.

Vidya

——————————————————————————–
Exclusive Marriage Proposals! Find UR life partner at Shaadi.com Try it!

Very odd but I can’t argue with the content of the message, it is pretty good advice about how to avoid identity theft.