RFID tech turned into spy chips for clandestine surveillance

 hitachi_rfid1.jpg

An employee looking to steal confidential information from his employer sneaks into what should be a secure back room after hours. He pulls charts and files from a top-level financial meeting and slides them into his briefcase before heading back out.What the insider doesn’t know is that his shoes picked up hundreds of tiny radio frequency identification (RFID) chips that had been scattered across the floor. As he passes by an RFID reader near the front door of his office building, security will be alerted that he had accessed a secure area. The evidence is all over the soles of his shoes.

Sound a little like a scene from a James Bond movie? It’s not.

Nox Defense, an arm of SimplyRFID Inc., said it has created an invisible perimeter-defense system designed to track things and people in real time — all without their knowledge. The system that is made up of several technological pieces — RFID chips the size of grains of sand and an RFID and video camera surveillance system.

Read moreRFID tech turned into spy chips for clandestine surveillance

Do Americans Care About Big Brother?

 survailance_0316.jpg

The National Counterterrorism Center (NCTC) in Virginia. the NCTC has elements of the FBI and CIA where terrorism-related information is
shared on a real-time basis.

Christopher Morris / VII for TIME

 

Pity America’s poor civil libertarians. In recent weeks, the papers have been full of stories about the warehousing of information on Americans by the National Security Agency, the interception of financial information by the CIA, the stripping of authority from a civilian intelligence oversight board by the White House, and the compilation of suspicious activity reports from banks by the Treasury Department. On Thursday, Justice Department Inspector General Glenn Fine released a report documenting continuing misuse of Patriot Act powers by the FBI. And to judge from the reaction in the country, nobody cares.

Read moreDo Americans Care About Big Brother?

The FBI Deputizes Business

Today, more than 23,000 representatives of private industry are working quietly with the FBI and the Department of Homeland Security. The members of this rapidly growing group, called InfraGard, receive secret warnings of terrorist threats before the public does-and, at least on one occasion, before elected officials. In return, they provide information to the government, which alarms the ACLU. But there may be more to it than that. One business executive, who showed me his InfraGard card, told me they have permission to “shoot to kill” in the event of martial law.
InfraGard is “a child of the FBI,” says Michael Hershman, the chairman of the advisory board of the InfraGard National Members Alliance and CEO of the Fairfax Group, an international consulting firm.

infragard.jpg

Read moreThe FBI Deputizes Business

Feds Stage Cyberstorm to Prep for Attack

Government Concerned About Rising Number of Sophisticated Cyber Attacks.

The Department of Homeland Security has begun to conduct a multination cybersecurity drill to learn how to respond to the increasing number of cyberattacks that have been launched against U.S. computer infrastructure and financial networks worldwide.

dhs_cyberattacks_080312_ms.jpg

Read moreFeds Stage Cyberstorm to Prep for Attack

NSA shifts to e-mail, Web, data-mining dragnet

The National Security Agency was once known for its skill in eavesdropping on the world’s telephone calls through radio dishes in out-of-the-way places like England’s Menwith Hill, Australia’s Pine Gap, and Washington state’s Yakima Training Center.

Today those massive installations, which listened in on phone conversations beamed over microwave links, are becoming something akin to relics of the Cold War. As more communications traffic travels through fiber links, and as e-mail and text messaging supplant phone calls, the spy agency that once intercepted telegrams is adapting yet again.

Read moreNSA shifts to e-mail, Web, data-mining dragnet

Right now, feds might be looking into your finances

Banks tip off government to possible money laundering, fraud

WASHINGTON – Each year, federal agents peek at the financial transactions of millions of Americans – without their knowledge.

The same type of information that raised suspicions about New York Gov. Eliot Spitzer is reviewed every day by authorities to find traces of money laundering, check fraud, identity theft or any crime that may involve a financial institution.

As concerns about fraud and terrorist financing grow, an increasing number of suspicious deposits, withdrawals and money transfers are being reported by banks and others to the federal government. Banks and credit unions as well as currency dealers and stores that cash checks reported a record 17.6 million transactions to the Financial Crimes Enforcement Network in 2006, according to a report from the network, a bureau of the U.S. Treasury Department.

“I don’t think Americans understand that their financial transactions are being reported and routinely examined,” said Barry Steinhardt of the American Civil Liberties Union.

Read moreRight now, feds might be looking into your finances

70 Reasons To Doubt The Offical Story of 9/11

70 reasons to doubt…
DISTURBING FACTS ABOUT THE 9/11 ATTACKS
John Doraemi

Read more70 Reasons To Doubt The Offical Story of 9/11

Chinese Cyberattacks Target US Think Tanks

Washington DC (UPI) Mar 07, 2008
Defense-related think tanks and contractors, as well as the Pentagon and other U.S. agencies, were the target of repeated computer network intrusions last year apparently originating in China, the Department of Defense said this week.

In its annual report to lawmakers on China’s military power, the department said the intrusions “appeared to originate in” China but added, “It is unclear if these intrusions were conducted by, or with the endorsement of” the Chinese government or military.

Read moreChinese Cyberattacks Target US Think Tanks

National Dragnet Is a Click Away

Authorities to Gain Fast and Expansive Access to Records
Several thousand law enforcement agencies are creating the foundation of a domestic intelligence system through computer networks that analyze vast amounts of police information to fight crime and root out terror plots.

As federal authorities struggled to meet information-sharing mandates after the Sept. 11, 2001, terrorist attacks, police agencies from Alaska and California to the Washington region poured millions of criminal and investigative records into shared digital repositories called data warehouses, giving investigators and analysts new power to discern links among people, patterns of behavior and other hidden clues.

Those network efforts will begin expanding further this month, as some local and state agencies connect to a fledgling Justice Department system called the National Data Exchange, or N-DEx. Federal authorities hope N-DEx will become what one called a “one-stop shop” enabling federal law enforcement, counterterrorism and intelligence analysts to automatically examine the enormous caches of local and state records for the first time.

Read moreNational Dragnet Is a Click Away

FBI Taps Cell Phone Microphone As Surveillance Tool

fbi

The FBI appears to have begun using a novel form of electronic surveillance in criminal investigations: remotely activating a mobile phone’s microphone and using it to eavesdrop on nearby conversations.

The technique is called a “roving bug,” and was approved by top U.S. Department of Justice officials for use against members of a New York organized crime family who were wary of conventional surveillance techniques such as tailing a suspect or wiretapping him.

Nextel cell phones owned by two alleged mobsters, John Ardito and his attorney Peter Peluso, were used by the FBI to listen in on nearby conversations. The FBI views Ardito as one of the most powerful men in the Genovese family, a major part of the national Mafia.

The surveillance technique came to light in an opinion published this week by U.S. District Judge Lewis Kaplan. He ruled that the “roving bug” was legal because federal wiretapping law is broad enough to permit eavesdropping even of conversations that take place near a suspect’s cell phone.

Kaplan’s opinion said that the eavesdropping technique “functioned whether the phone was powered on or off.” Some handsets can’t be fully powered down without removing the battery; for instance, some Nokia models will wake up when turned off if an alarm is set.

While the Genovese crime family prosecution appears to be the first time a remote-eavesdropping mechanism has been used in a criminal case, the technique has been discussed in security circles for years.

The U.S. Commerce Department’s security office warns that “a cellular telephone can be turned into a microphone and transmitter for the purpose of listening to conversations in the vicinity of the phone.” An article in the Financial Times last year said mobile providers can “remotely install a piece of software on to any handset, without the owner’s knowledge, which will activate the microphone even when its owner is not making a call.”

Nextel and Samsung handsets and the Motorola Razr are especially vulnerable to software downloads that activate their microphones, said James Atkinson, a counter-surveillance consultant who has worked closely with government agencies. “They can be remotely accessed and made to transmit room audio all the time,” he said. “You can do that without having physical access to the phone.”

Read moreFBI Taps Cell Phone Microphone As Surveillance Tool