Thursday, September 23, 2010

FBI Spied & Lied, Misled Justice Department on Improper Surveillance of Peace Groups

The Justice Department Inspector General (IG) discovered improper FBI spying investigations were frequently opened based upon “factually weak” justifications.

The FBI classified some investigations relating to nonviolent civil disobedience under its "Acts of Terrorism" classification.

People associated with advocacy groups were generally predicated on suspicion that the individual might potentially commit a crime. more







 
 
 
 
 
 
 
networkworld.com
 
PJL 23rd September 2010

Suspect Arrested After Four Month Investigation Into Internet Threats

The La Quinta Police Department, a contracted department through the Riverside County Sheriff’s Department out of their Indio station arrested a man for threats made through the internet to a female La Quinta High School student. more

examiner.com










Arrested for criminal threats via the internet

Photo by: Riverside County Sheriff's Department
 
PJL 23rd September 2010

TSCM & VoIP Vulnerabilities

There are a lot of businesses we service with our Technical Surveillance Counter-Measure (TSCM) services that could be taking advantage of there IP infrastructure and encrypting VoIP communications to secure VoIP telephone.

It is easy enough to inspect a VoIP telephone and to connect a Time Domain Reflectometer to a data cable to check for taps, bridges or splices along the cable, although to run these tests involves disconnecting any power source from the data cables so the Time Domain Reflectometer can be used to inject a signal into the data cable for further analysis.

It is practical to use an encrypted data transmission pathway for VoIP secure telephone communications.

With encrypted data transmissions, one doesn't need to continually check data cables that need power isolated in a Technical Surveillance Counter-Measures inspection.

There are some problems with VoIP latency and encrypted data transmission makes the latency period slightly longer for data transfer, although this is improving.

Here is an interesting article below relating to hacking IP voice & video in real time which shows you how easily the process is undertaken.

Regular TSCM servicing can't guarantee protection against real time hacking of the IP infrastructure; this is why encrypted data transmissions should be used.

PJL
=============================================

Corporate video conferences can still be easily hacked by insiders using a freeware tool that allows attackers to monitor calls in real-time and record them in files suitable for posting on YouTube. more



















PJL 23rd September 2010