espionage

Latest

  • Band Pro seeking damages against ARRI and Michael Bravin, expects to get its data back

    by 
    Sean Buckley
    Sean Buckley
    04.15.2012

    Should you ever get the itch to illegally peek at a former employer's servers, take a lesson from Michael Bravin: don't. The former ARRI executive's adventures in corporate espionage have landed him nothing but trouble. Although Bravin's previous plea agreement required him to pay back Band Pro for damages and legal fees, the outfit is now seeking punitive damages against both ARRI and Bravin himself. "Band Pro is informed and believes, and thereupon alleges that Glenn Kennel and Bill Russel, executives of ARRI, had firsthand knowledge of Bravin's hacking activities," asserts the recently filed complaint. In addition to damages, Band Pro is seeking orders requiring ARRI to return all information acquired from the said hacking and the destruction of "all business plans and strategies developed in reliance" of that information. Check out the PDF yourself for Band Pro's full list of demands and a detailed outline of its thirteen accusations against ARRI -- we'll let you know how things go down if the trial pans out.

  • Huawei hardware won't be part of National Broadband Network, says Australia

    by 
    Sean Buckley
    Sean Buckley
    03.26.2012

    Huawei just can't catch a break -- first the US blocks it from being a part of its first responder wireless network, and now, Australia is following suit. According to the Australian Financial Review, the Shenzhen-based outfit has been barred from tendering contracts for the country's A$43 billion National Broadband Network on the advice of the Australian Security Intelligence Organization. Alexander Downer, of Huawei's Australian board directors, called the situation "ridiculous," postulating that "the whole concept of Huawei being involved in cyber-warfare is based on the company being Chinese." This isn't the first time Huawei has had to combat suspicions of espionage, last year the outfit assured the US government that a "thorough investigation will prove that Huawei is a normal commercial institution and nothing more." Cheer up, Huawei, the smartphone market still loves you.

  • WikiLeaks' Spy Files shed light on the corporate side of government surveillance

    by 
    Amar Toor
    Amar Toor
    12.02.2011

    WikiLeaks' latest batch of documents hit the web this week, providing the world with a scarily thorough breakdown of a thoroughly scary industry -- government surveillance. The organization's trove, known as the Spy Files, includes a total of 287 files on surveillance products from 160 companies, as well as secret brochures and presentations that these firms use to market their technologies to government agencies. As Ars Technica reports, many of these products are designed to get around standard privacy guards installed in consumer devices, while some even act like malware. DigiTask, for example, is a German company that produces and markets software capable of circumventing a device's SSL encryption and transmitting all instant messages, emails and recorded web activity to clients (i.e., law enforcement agencies). This "remote forensic software" also sports keystroke logging capabilities, and can capture screenshots, as well. Included among DigiTask's other products is the WifiCatcher -- a portable device capable of culling data from users linked up to a public WiFi network. US-based SS8, Italy's Hacking Team and France's Vupen produce similar Trojan-like malware capable of documenting a phone or computer's "every use, movement, and even the sights and sounds of the room it is in," according to the publication. Speaking at City University in London yesterday, WikiLeaks founder Julian Assange said his organization decided to unleash the Spy Files as "a mass attack on the mass surveillance industry," adding that the technologies described could easily transform participating governments into a "totalitarian surveillance state." The documents, released on the heels of the Wall Street Journal's corroborative "Surveillance Catalog" report, were published alongside a preface from WikiLeaks, justifying its imperative to excavate such an "unregulated" industry. "Intelligence agencies, military forces, and police authorities are able to silently, and on mass, and [sic] secretly intercept calls and take over computers without the help or knowledge of the telecommunication providers," wrote Wikileaks in its report. "In the last ten years systems for indiscriminate, mass surveillance have become the norm." The organization says this initial document dump is only the first in a larger series of related files, scheduled for future release. You can comb through them for yourself, at the source link below.

  • Man on vacation confused for a Russian spy, almost restarts cold war

    by 
    James Trew
    James Trew
    12.01.2011

    Threats of Russian espionage can come from the unlikeliest of sources, as Jim Mimlitz, owner of Navionics Research, a small integrator firm, knows only too well. Curran Gardner Public Water District, just outside of Springfield, Illinois, employed Mimlitz's firm to set up its Supervisory Control and Data Acquisition system (SCADA), and the spy games began when Mimlitz went on vacation in Russia. While there, he logged into the SCADA system to check some data, then logged off and went back to enjoying Red Square and the finest vodka mother Russia has to offer. However, five months later a Curran Gardner water pump fails, and an IT contractor eyeballing the logs spots the Russian-based IP address. Fearing stolen credentials, he passes the info up the chain of command to the Environmental Protection Agency (as it governs the water district) without bothering to contact Mimlitz, whose name was in the logs next to the IP address. The EPA then passed along the paranoia to a joint state and federal terrorism intelligence center, which issued a report stating that SCADA had been hacked. Oh boy. A media frenzy followed bringing all the brouhaha to Mimlitz's attention. After speaking with the FBI, the massive oversight was identified, papers were shuffled, and everyone went about their day. So, next time you delete all your company's e-mail, or restart the wrong server, remember: at least you didn't almost start World War III. Tap the source link for the full story. [Image courtesy Northackton]

  • Huawei blocked from first responder network contract, US cites 'national security concerns'

    by 
    Zach Honig
    Zach Honig
    10.14.2011

    The inability to win US government approval isn't exactly an unfamiliar issue for Huawei, which by now must be conditioned not to expect a nod from major US telecom companies. But now, The Daily Beast reports that the U.S. Commerce Department has made it very clear that the Chinese company won't have a role in building the country's new dedicated first responder wireless network. A spokesman wasn't shy about the reason, either, explaining that Huawei "will not be taking part in the building of America's interoperable wireless emergency network for first responders due to U.S. government national security concerns." And what about those national security concerns? Well, Huawei president Ren Zhengfei's former role as a People's Liberation Army technologist may have something to do with it, considering it wouldn't be unreasonable to suspect that he still has some fairly close ties to Chinese government officials. We haven't heard a peep from the feds regarding Huawei's invitation for US officials to investigate the company earlier this year, but it's safe to assume that the investigation either didn't go very well, or more likely that it hasn't happened at all. We imagine that whole corporate espionage debacle probably didn't help the company, either.

  • This giant military spy blimp is really hard to miss

    by 
    Amar Toor
    Amar Toor
    10.10.2011

    What's this spy blimp doing next to an 18-wheeler? We're not entirely sure, but it's certainly not being subtle about it. This jumbo-sized floater, codenamed "Blue Devil Block 2," measures some 370 feet in length and comprises a whopping 1.4 million cubic feet. Originally inflated in September, the definitely-not-blue Blue Devil took flight for the first time last week in North Carolina and, if all goes to plan, should head to Afghanistan by the middle of next year. The Air Force says the blimp will hover above the country for five days at a time, collecting surveillance data from 20,000 feet above the ground and transmitting its findings to US intelligence officers on the ground, via laser. When that's taken care of, it'll be used to make the biggest omelette ever.

  • Former ARRI exec pleads guilty to hacking into rival CEO's e-mail account, faces jail time

    by 
    Amar Toor
    Amar Toor
    09.23.2011

    There's some Oscar-worthy drama brewing in California, where ARRI executive Michael Bravin has pleaded guilty to hacking into a high-level e-mail account at rival camera maker Band Pro Film and Digital. In a plea agreement filed yesterday with a US District Court, Bravin admitted to intentionally accessing a corporate e-mail account belonging to Amnon Band -- Band Pro's President and CEO. More details after the break, including a potential connection to RED's Jim Jannard.

  • Automated shoulder surfing makes it easier to steal passwords, isn't very tubular, brah (video)

    by 
    Amar Toor
    Amar Toor
    07.15.2011

    Here's something mildly terrifying to chew on: researchers in Italy have developed a way to automatically harvest anything you type on your smartphone's touchscreen, using only a camera placed over your shoulder. The software, created by Federico Maggi and his team from the Politecnico di Milano, takes advantage of the magnified touchscreen keys you'll find on most iOS, Android and BlackBerry devices. Because these magnifications often pop up in predictable positions, the spying system can recognize and record them with relative ease, with the help of a camera aimed at a targeted display. And it's not like bobbing and weaving around will help evade its watchful eye, since the apparatus can instantly detect sudden movements and adjust its gaze accordingly. Researchers say their tool is capable of accurately recognizing up to 97 percent of all keystrokes and is fast enough to transmit copied passwords in "quasi real-time," which must be music to a lazy criminal's ears. Tiptoe past the break to see the beast in action and spend the rest of your life in an everlasting state of fear.

  • Biscuit tins: your greatest defense against industrial espionage?

    by 
    Brian Heater
    Brian Heater
    06.28.2011

    We don't know what your daily grind is like, but we're constantly warding off the ever-present threat of industrial espionage. For whatever reason, here's something we've yet to try: the ordinary household biscuit tin. Word has is that the thin, metal baked goods holder is great for keeping the eyes of potential saboteurs away from your secret-storing mobile devices. AFP is reporting that executives at a German chemical company have begun carrying their phones around in the boxes to protect them from the sorts of electromagnetic radiation used to steal valuable information from the handsets. No word on how many of the devices involved are running Gingerbread or similar pastry-based operating systems.

  • Beleaguered Huawei encourages US government to investigate it, quotes two presidents in the process

    by 
    Chris Ziegler
    Chris Ziegler
    02.28.2011

    When you're the second-largest supplier of communications infrastructure in the world and your president is an ex-member of the Chinese military, suspicions of espionage -- warranted or not -- are pretty much a foregone conclusion. Indeed, Huawei has suffered a couple of high-profile business setbacks in the past year over vague concerns that the company could be some sort of Trojan horse for Chinese intelligence, and they're fed up: after being pressured into shelving a planned acquisition of server virtualization firm 3Leaf Systems' intellectual property by the Committee on Foreign Investment in the US, they've published a lengthy open letter that implores the government to fully vet the company to put to rest any concerns or fears it has. The gist of the letter is that Huawei is owned by its employees, not the Chinese government, its loans are commercial, its products are continually audited by third-party companies for security, and the tax breaks it gets from the government are consistent with what private corporations in other countries receive. Huawei also manages to quote both Obama and Lincoln in the letter -- just to make sure it has both Democrats and Republicans covered, we suppose -- and concludes by saying it believes that "any thorough government investigation will prove that Huawei is a normal commercial institution and nothing more." Sounds like a challenge to us.

  • WikiLeaks: Chinese Politburo responsible for Google hacking

    by 
    Vlad Savov
    Vlad Savov
    11.29.2010

    You had to know something interesting would come out of the quarter million diplomatic cables that WikiLeaks just, well, leaked late on Sunday, and the New York Times has picked out a doozie for us. As it turns out, that big brouhaha in China surrounding the hacking of Gmail accounts was actually a state-authorized attack. Such was the report from a Chinese informant working for the US embassy, and the disclosure goes on to say that it was part of a "coordinated campaign of computer sabotage," reaching a wide net of targets, including American government machines, American private businesses, and... the Dalai Lama. Hey, China's hardly the first country to ever engage in state-sponsored cyber espionage (ahem, Stuxnet), but we can't say we're not disappointed. Let's keep it classy from here on out, alright guys?

  • Canon copiers read your docs, stop jobs based on keywords

    by 
    Joseph L. Flatley
    Joseph L. Flatley
    10.14.2010

    Putting an end to those despicable whistleblowers might seem nigh on impossible in the age of Wikileaks, but you can bet your bubby that stopping would-be Daniel Ellsbergs is something that companies are taking very, very seriously. Canon has just announced that copiers running version 5 of its Uniflow networking platform can use their OCR capabilities to keep an eye out for certain keywords (say, "planned robot invasion" or "time machine") and prevent the documents they appear in from being copied altogether. Wild, huh? Just so long as the machine isn't also saving the info to use against you at a later time.

  • Thanko's Spy Button video camera becomes slightly less ridiculous with high-def video mode

    by 
    Sean Hollister
    Sean Hollister
    08.03.2010

    It still won't fool your mark if you pin it to a stained T-shirt, but if you're rocking the plaid button-down look you'll be happy to know Thanko's Spy Camera has received an incremental update. For ¥4,980 (about $58), the third revision of the button-hole camera will shoot 8 megapixel stills and record in 1280 x 960 HD for up to 50 minutes on a charge, which sets the household espionage device just this side of crapgadget territory. Bring your own dignity... and microSD card.

  • Immigration deports Alexey Karetnikov: Microsoft engineer, alleged Russian spy, loyal Facebook user

    by 
    Joseph L. Flatley
    Joseph L. Flatley
    07.14.2010

    The curious case of the Russian spies grows, well, curiouser, as the Washington Post reports that a Microsoft Software Design Engineer named Alexey Karetnikov has recently been ordered out of the country for "immigration violations." According to a government source, Karetnikov had "just set up shop," (spy shop, that is) and the immigration charges were technicalities used to get him out of the country quickly (and without an annoying trial). We just hope that Alexey followed our advice for managing Facebook privacy settings -- it would be terribly ironic if he was exposed to the world through his naive use of the social networking sites.

  • E-ON Magazine issue 19 hits the shelves

    by 
    Brendan Drain
    Brendan Drain
    04.10.2010

    In Autumn 2005, EVE Online became one of the only MMOs out there with its own dedicated print magazine. Under contract from CCP Games, MMM Publishing has worked tirelessly ever since to produce EVE's official magazine "E-ON." Four times per year, we're blessed with a dose of the latest and greatest things from New Eden in a comfortingly solid format. The magazine covers everything from strategy guides and ship fitting advice to sneak peaks at upcoming expansions, interviews with CCP staff and incredible fiction set in the EVE universe. E-ON differs from other game magazines in that they don't any make money from advertising. In an effort to keep the magazine all about EVE, they've taken the unusual but apparently successful route of publishing full-page adverts from in-game corporations and organisations. Advertisers buy space in the magazine with ISK, the in-game currency, and adverts must be for strictly in-game purposes. The ISK is then used to pay volunteer writers, who create most of the magazine's content and produce important things like guides from a true player's perspective. There's even a scheme in the works to reward advertisers with discount coupon codes for the magazine to gift their corpmates. Now nearing their fifth year of publishing, E-ON issue 19 has recently been released. As usual, this issue is absolutely packed full of everything we've come to expect from the mag. Skip past the cut for a run-down of what you can expect in issue 19 of E-ON Magazine.

  • Samsung, Hynix, Applied Materials in corporate espionage shocker!

    by 
    Joseph L. Flatley
    Joseph L. Flatley
    02.04.2010

    In the cut-throat world of high tech manufacturing, "going rogue" is an ever-present temptation -- and no one, from AMD to LG, is immune from scandal. For the latest bit of corporate shenanigans, look no further than Applied Materials, who installs and maintains Samsung's chip manufacturing equipment -- prosecutors in South Korea have accused the company of stealing the latter's semiconductor technology and leaking it to Hynix Semiconductor (who ranks third in the world in the manufacture of NAND flash, behind Samsung and Toshiba). According to the AP, eighteen people have been indicted in the case so far, including the vice president of Applied Materials Korea. We just hope they didn't get the idea from us! That is definitely not the message we're trying to impart with this site.

  • EVE Online spymaster The Mittani to present at GDC 2010

    by 
    James Egan
    James Egan
    01.25.2010

    EVE Online developer CCP Games typically has a presence at major industry events like the upcoming Game Developers Conference, but the session that's caught our attention so far isn't a presentation from the devs -- it's actually from a member of the EVE community. That GDC 2010 speaker is Alexander Gianturco -- better known to most EVE Online players as Goonswarm's spymaster, The Mittani. Others may know the infamous player as the "Sins of the Solar Spymaster" EVE columnist at Ten Ton Hammer. Gianturco will give a lecture at GDC 2010 titled "Uniquely Ruthless: The Espionage Metagame of EVE Online" that will give an insider's perspective on the political machinations possible in the game's sandbox of New Eden. His talk will hit on topics like the disbanding of the Band of Brothers alliance, how the espionage metagame has changed over time, and of course the myriad aspects of EVE's sandbox that allow players to even engage in such pursuits. The session description for Uniquely Ruthless: The Espionage Metagame of EVE Online states that Gianturco's presentation should be of general interest to anyone with a love of spies and their stories.

  • The challenges and rewards of espionage in EVE Online

    by 
    James Egan
    James Egan
    11.20.2009

    Goonswarm spymaster The Mittani took a different approach with his latest EVE Online column at Ten Ton Hammer, and conducted an interview with a corporate saboteur titled "The Most Dangerous Agent". While it should be stated that most players in EVE do not engage in espionage, it's a career path of sorts that any player could potentially engage in, provided they have the combination of intelligence, social skills, and dedication needed to succeed. It's that aspect of dedication which often goes unmentioned -- the challenge of maintaining long-term duplicity. The Mittani's interview with a player anonymously referred to as "Darwin's Accelerator" explains how a player with destructive aims greater than simply engaging a few enemy ships at a time can use intel to devastating effect, wiping out entire fleets. Maintaining a persona that fits in with the target organization and thus won't arouse suspicion, however, can be difficult if the infiltrator genuinely dislikes the members that comprise the corporation or alliance.

  • Major EVE Online alliance CVA disbanded: espionage or hack?

    by 
    James Egan
    James Egan
    10.28.2009

    Major EVE Online roleplaying alliance Curatores Veritatis Alliance (CVA) disbanded today, possibly the result of a traitor within their ranks, leaving a power vacuum in the Providence region they once held. It's possible for high-level directors of an alliance to disband the organization, and this is exactly what happened today to Curatores Veritatis Alliance. CVA was an alliance loyal to the game's NPC faction the Amarr Empire and had a long history of enforcing rule in lawless space and resisting rival player organizations of Minmatar freedom fighters -- notably Ushra'Khan -- who they branded as terrorists. In short, CVA has played a significant role in the player-driven setting of EVE Online. At this point, speculation as to how CVA was disbanded is rampant. The concept of a mole using high-level access to destroy an alliance from within is not unprecedented in the game, although some players are asserting an account hack took place. EVE pilot "BULLETPROOF 50CENT" of the corporation Traceless Representatives of Anonymous Players (TRAP) has claimed credit for the disintegration of CVA. He stated: "I am known as bullet, just a small, relatively unknown member of a covert organization, created by and dedicated to the taking down of what we saw as the single largest evil in EVE -- CVA."

  • Earthrise developers seeking community input on alts

    by 
    James Egan
    James Egan
    10.19.2009

    Earthrise is an indy-developed science fiction MMO on the way from Masthead Studios in Bulgaria. The developers have stated that Earthrise will be a sandbox game, with a large part of the player experience based on what guilds try to accomplish in the post-apocalyptic setting of Enterra. Given this emphasis on player-driven content, Masthead Studios has been running a Community Consensus over the past few weeks where the devs seek input from Earthrise fans on various aspects of the game's design. Today Masthead Studios wants to hear what the community thinks about alts. In most MMOs having extra character slots is expected, but alt play in a sandbox game where players will engage in espionage could get out of hand. Would the ability to easily for any player to create a cell of spy alts unbalance the game, or should there be a tight limit on character slots per account?