The Justice Department Inspector General (IG) discovered improper FBI spying investigations were frequently opened based upon “factually weak” justifications.
The FBI classified some investigations relating to nonviolent civil disobedience under its "Acts of Terrorism" classification.
People associated with advocacy groups were generally predicated on suspicion that the individual might potentially commit a crime. more
networkworld.com
PJL 23rd September 2010
Thursday, September 23, 2010
Suspect Arrested After Four Month Investigation Into Internet Threats
The La Quinta Police Department, a contracted department through the Riverside County Sheriff’s Department out of their Indio station arrested a man for threats made through the internet to a female La Quinta High School student. more
examiner.com
Arrested for criminal threats via the internet
Photo by: Riverside County Sheriff's Department
PJL 23rd September 2010
examiner.com
Arrested for criminal threats via the internet
Photo by: Riverside County Sheriff's Department
PJL 23rd September 2010
TSCM & VoIP Vulnerabilities
There are a lot of businesses we service with our Technical Surveillance Counter-Measure (TSCM) services that could be taking advantage of there IP infrastructure and encrypting VoIP communications to secure VoIP telephone.
It is easy enough to inspect a VoIP telephone and to connect a Time Domain Reflectometer to a data cable to check for taps, bridges or splices along the cable, although to run these tests involves disconnecting any power source from the data cables so the Time Domain Reflectometer can be used to inject a signal into the data cable for further analysis.
It is practical to use an encrypted data transmission pathway for VoIP secure telephone communications.
With encrypted data transmissions, one doesn't need to continually check data cables that need power isolated in a Technical Surveillance Counter-Measures inspection.
There are some problems with VoIP latency and encrypted data transmission makes the latency period slightly longer for data transfer, although this is improving.
Here is an interesting article below relating to hacking IP voice & video in real time which shows you how easily the process is undertaken.
Regular TSCM servicing can't guarantee protection against real time hacking of the IP infrastructure; this is why encrypted data transmissions should be used.
PJL
=============================================
Corporate video conferences can still be easily hacked by insiders using a freeware tool that allows attackers to monitor calls in real-time and record them in files suitable for posting on YouTube. more
PJL 23rd September 2010
It is easy enough to inspect a VoIP telephone and to connect a Time Domain Reflectometer to a data cable to check for taps, bridges or splices along the cable, although to run these tests involves disconnecting any power source from the data cables so the Time Domain Reflectometer can be used to inject a signal into the data cable for further analysis.
It is practical to use an encrypted data transmission pathway for VoIP secure telephone communications.
With encrypted data transmissions, one doesn't need to continually check data cables that need power isolated in a Technical Surveillance Counter-Measures inspection.
There are some problems with VoIP latency and encrypted data transmission makes the latency period slightly longer for data transfer, although this is improving.
Here is an interesting article below relating to hacking IP voice & video in real time which shows you how easily the process is undertaken.
Regular TSCM servicing can't guarantee protection against real time hacking of the IP infrastructure; this is why encrypted data transmissions should be used.
PJL
=============================================
Corporate video conferences can still be easily hacked by insiders using a freeware tool that allows attackers to monitor calls in real-time and record them in files suitable for posting on YouTube. more
PJL 23rd September 2010
Subscribe to:
Posts (Atom)