Digital Device Security and Forensics
https://www.iacsp.com
Digital Device Security and Forensics FeedHidden Pinhole Cameras, Microphones, and Digital Video Recorders
https://www.iacsp.com/digdev_sec.php?mnid=15
There are neckties that cost less than thirty five dollars and contain a pin hole camera, microphone, and digital video recorder. Such a device could be used to record a family event such as a wedding or a family reunion. The device could also be used in a lawful investigation to collect evidence. Unfortunately, the device could also be misused by someone who is doing a survey of an area where they plan to do a terrorist act. In the past, law enforcement and intelligence personnel were aware of people using a camcorder to film bridges and critical infrastructure. It is important to remember that video cameras are now small enough that they can be hidden in car keyfobs, ties, and baseball hats. These devices hold the video in a microSD card. Other pinhole camera systems may transmit wirelessly to another location where someone may be looking at the video or recording it. Someone may choose that option rather than risking a search and having a microSD card that contains surveillance video. It may seem hopeless to try to catch someone who is conducting a covert surveillance on a possible target.Wed, 10 Jun 2015 13:34:00 +0000It is Important to Examine Cell Phones Carefully
https://www.iacsp.com/digdev_sec.php?mnid=14
The security professional and sworn law enforcement officers need to be careful that they examine cell phones to make sure that they are really working phones. This can be done by X-ray and careful examination. What appears to be a normal cell phone could be a stun gun. There are examples of such stun gun cell phones on eBay for as little as twenty dollars plus shipping and handling [1]. There are also cell phone cases that hold both a phone and a cylindrical pepper spray gun [2]. There are also four shot zip guns that are concealed in what appears to be a cell phone. Here is a video that demonstrates it [3]. There are so many good people that follow the rules and comply with security, that it is possible to become complacent about X-raying electronic devices and asking people to see their cell phones. However; it is very important to see that a cell phone could be a four shot zip gun, a stun gun, or have a place to hold a pepper spray gun. There are also many toy cell phones that sell for a dollar online and can be given to children so that they don't take their parents' cell phone. These could be opened up and used to hide narcotics.Sun, 02 Feb 2014 20:40:00 +0000Wardriving
https://www.iacsp.com/digdev_sec.php?mnid=13
You may see someone driving slowly around your home, office building, or public parks with a small netbook or IPAD computer and a directional antenna. The directional antenna may look like a coffee can or tennis ball can with a wire to the IPAD, laptop, or netbook. The purpose of this activity is to find open networks that they can use to view websites or exchange files. The problem is if they exchange child pornography which is illegal and is traced back to your home, business, or organization's router.Thu, 29 Dec 2011 10:58:00 +0000We Need to Be Prepared that Handheld Devices Can Be Used Innovatively By Terrorists
https://www.iacsp.com/digdev_sec.php?mnid=12
Imagine Utilizing People Assigned to Watch a Bit of The Sky From their Window By Eamon P. Doherty Andrew Krepinevich wrote an excellent article called, "Get Ready for The Democratization of Destruction," that discusses the problems associated with technology that was once only in the hands of the military, now within reach of terrorists [1]. In the past, the small rockets and munitions that were fired at Israel were random and inaccurate, but as recently as 2006, some had guided systems [1]. Let's look at an example of a possible problem and a countermeasure. In 2011, PDAs have excellent high resolution and wireless capability. There are also radio controlled airplanes that can be easily bought by consumers and controlled from the ground. These airplanes can also be fitted with special wireless cameras that may transmit video to distances of one to two miles [2]. A control station for the airplane could also send the video wirelessly to people in the field with PDAs who could give orders to the remote pilot. This system which is used by radio controlled aircraft hobbyists could also be used for a poor man's unmanned aerial vehicle. Such systems could be used for surveillance or to deliver a payload.Wed, 31 Aug 2011 12:05:00 +0000GIS and Hand Held Devices
https://www.iacsp.com/digdev_sec.php?mnid=11
By Dr. Eamon P. Doherty Geographic Information Systems (GIS) include a set of tools that allow people to map and annotate the locations of previous terrorist events or potential vulnerabilities to guard against. The maps can be distributed to intelligence agents and law enforcement personnel for viewing on hand held devices such as PDAs or smart phones. If an organization wants to learn about using GIS and does not want to invest in GIS software, they may purchase a book called Getting to Know ArcGis by Tim Ormsby et al. The book comes with step by step instruction on how to use GIS as well as a trial version of ArcGIS Desktop which is good for up to 180 days. GIS maps can be simple or elaborate with as much data as is needed by their intended audience. I once spoke with a security professional at one of my monthly ASIS International meetings.Sat, 04 Jun 2011 11:21:00 +0000