RE: [TSCM-L] Fwd: [ISN] Canadian coins bugged, U.S. security agency says

From: Greer, Benjamin <Gre..._at_Pragmatics.com>
Date: Thu, 11 Jan 2007 10:06:29 -0500

>From - Sat Mar 02 00:57:24 2024
Received: by 10.36.47.14 with SMTP id u14mr548559nzu.1168540960915;
        Thu, 11 Jan 2007 10:42:40 -0800 (PST)
Return-Path: <edit..._at_yahoo.com>
Received: from web35405.mail.mud.yahoo.com (web35405.mail.mud.yahoo.com [66.163.179.114])
        by mx.google.com with SMTP id 20si225726nzu.2007.01.11.10.42.10;
        Thu, 11 Jan 2007 10:42:40 -0800 (PST)
Received-SPF: pass (google.com: domain of edit..._at_yahoo.com designates 66.163.179.114 as permitted sender)
DomainKey-Status: good (test mode)
Received: (qmail 7708 invoked by uid 60001); 11 Jan 2007 18:42:09 -0000
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws;
  s=s1024; d=yahoo.com;
  h=X-YMail-OSG:Received:Date:From:Subject:To:In-Reply-To:MIME-Version:Content-Type:Content-Transfer-Encoding:Message-ID;
  b=6YTDw4nVy6wa2Uu0VN7pE2EUh24qmClBJRtVYhPumlvX6lERoPRqrIIuRdvVvvDkZGhHmTIlk1+dWltqyXmr72N4ugM+S/OWW5HW+n/CL/iRiea+gZlxBUONGGJ98V3ihJMcZICVizTL6ZG3nmTQidgd4sT3XJoOQHkhD4DDLcE=;
X-YMail-OSG: jeCR9msVM1lfODideyJ0BarlVUg_F_wwIzudxMAtko.Mcxb9HZ1NFjMquVK1DWbsv.jOvfbt7huZ7tHQvRJRnZXFyFZbIHbYazO44Yef9CEIKAppob8_Fw2jH_HvMwsh5JhJPsPauxN8hEyI5igah4keyFN1bv6gaEM-
Received: from [24.7.40.3] by web35405.mail.mud.yahoo.com via HTTP; Thu, 11 Jan 2007 10:42:09 PST
Date: Thu, 11 Jan 2007 10:42:09 -0800 (PST)
From: Edith Dinn <edit..._at_yahoo.com>
Subject: Re: [TSCM-L] Re: Fwd: [ISN] Canadian coins bugged, U.S. security agency says
To: TSCM-L2006_at_googlegroups.com
In-Reply-To: <B6FAB065458D5740A7EF6E6A467E32A0205097_at_pragmail2.pragmatics.com>
Mime-Version: 1.0
Content-Type: multipart/alternative;
        boundary="0-1199054267-1168540929=:6168"
Message-ID: <654165.6168.qm_at_web35405.mail.mud.yahoo.com>

--0-1199054267-1168540929=:6168
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: 8bit

Ben: Thanks for the updated version. Edith

"Greer, Benjamin" <Gre..._at_Pragmatics.com> wrote: The article cited a report from the Defense Security Service (cleared for public release) entitled: Technology collection trends in the U.S. Defence Industry and is located here if interested:
http://www.fas.org/irp/threat/2006trends.pdf

________________________________

From: TSCM-..._at_googlegroups.com on behalf of kondrak
Sent: Thu 1/11/2007 2:47 AM
To: TSCM-..._at_googlegroups.com
Subject: [TSCM-L] Fwd: [ISN] Canadian coins bugged, U.S. security agency says


A follow up I found on ISN:





 http://www.cbc.ca/technology/story/2007/01/10/rfid-defence.html
 
 The Canadian Press
 January 10, 2007
 
 They say money talks, and a new report suggests Canadian currency is
 indeed chatting, at least electronically, on behalf of shadowy spies.
 
 Canadian coins containing tiny transmitters have mysteriously turned up
 in the pockets of at least three American contractors who visited
 Canada, says a branch of the U.S. Department of Defence.
 
 Security experts believe the miniature devices could be used to track
 the movements of defence industry personnel dealing in sensitive
 military technology.
 
 "You might want to know where the individual is going, what meetings the
 individual might be having and, above all, with whom," said David
 Harris, a former CSIS officer who consults on security matters.
 
 "The more covert or clandestine the activity in which somebody might be
 involved, the more significant this kind of information could be."
 
 The counter-intelligence office of the U.S. Defence Security Service
 cites the currency caper as an example of the methods international
 spies have recently tried to illicitly acquire military technology.
 
 
 Nearly 1,000 'suspicious' contacts
 
 The service's report, Technology Collection Trends in the U.S. Defence
 Industry, says foreign-hosted conventions, seminars and exhibits are
 popular venues for pilfering secrets.
 
 The report is based on an analysis of 971 "suspicious contact reports"
 submitted in fiscal 2005 by security-cleared defence contractors and
 various official personnel.
 
 "On at least three separate occasions between October 2005 and January
 2006, cleared defence contractors' employees travelling through Canada
 have discovered radio frequency transmitters embedded in Canadian coins
 placed on their persons," the report says.
 
 The report did not indicate what kinds of coins were involved. A service
 spokeswoman said details of the incidents were classified.
 
 As a result, the type of transmitter in play and its ultimate purpose
 remain a mystery.
 
 However, tiny tracking tags, known as RFIDs, are commonly placed in
 everything from clothing to key chains to help retailers track
 inventory.
 
 Each tag contains a miniature antenna that beams a unique ID code to an
 electronic reader. The information can then be transferred by the reader
 into a computerized database.
 
 
 Makes no sense
 
 The likely need for such a reading device means the doctored coins could
 be used to track people only in a controlled setting, not over long
 distances, said Chris Mathers, a security consultant and former
 undercover RCMP officer.
 
 "From a technology perspective, it makes no sense," he said. "To me it's
 very strange."
 
 Then there's the obvious problem: what if the coin holder plunks the
 device into a pop machine?
 
 "You give the guy something with a transmitter that he's going to spend
 I mean, he might have it for an hour," Mathers said with a chuckle.
 
 Harris speculates recent leaps in miniaturization could allow for a
 sophisticated transmitter capable of monitoring a target's extensive
 travels.
 
 "I think we can be pretty darn confident that the technology is there
 for the sorts of micro-units that would be required to embed these
 things in a coin," he said.
 
 "It's a brave new world, and greatly concerning on so many levels."
 
 Passing the coin to an unwitting contractor, particularly in strife-torn
 countries, could mark the person for kidnapping or assassination, Harris
 said.
 
 "You could almost, by handing a coin to somebody, achieve the equivalent
 of the Mafiosi's last kiss on the cheek."
 
 The Defence Security Service report says employees of U.S. contractors
 reported suspicious contacts from individuals, firms or governments of
 more than 100 countries during the year.
 
 Technologies that generated the most interest were information systems,
 lasers and optics, aeronautics and sensors.
 
 A foreign approach often meant a simple request for information from the
 contractor.
 
 
 Can contain built-in scanners
 
 But the report also underscores clandestine means of acquiring secrets
 from U.S. employees, particularly those travelling abroad.
 
 "It is important to recognize copiers and shredders can contain built-in
 scanners to copy the data."
 
 Other common methods include placing listening devices in rooms,
 searching hotel rooms, inspecting electronic equipment and eavesdropping
 on conversations.
 
 The report, which first came to light in a U.S. newspaper, has since
 been posted on the website of the Federation of American Scientists, an
 organization that tracks the intelligence world and promotes government
 openness.
 
 The Canadian Press, 2006
 








 
---------------------------------
Everyone is raving about the all-new Yahoo! Mail beta.
--0-1199054267-1168540929=:6168
Content-Type: text/html; charset=iso-8859-1
Content-Transfer-Encoding: 8bit

Ben: Thanks for the updated version. Edith<br><br><b><i>"Greer, Benjamin" &lt;G..._at_Pragmatics.com&gt;</i></b> wrote:<blockquote class="replbq" style="border-left: 2px solid rgb(16, 16, 255); margin-left: 5px; padding-left: 5px;"> The article cited a report from the Defense Security Service (cleared for public release) entitled: Technology collection trends in the U.S. Defence Industry and is located here if interested:<br>http://www.fas.org/irp/threat/2006trends.pdf<br><br>________________________________<br><br>From: TSCM-..._at_googlegroups.com on behalf of kondrak<br>Sent: Thu 1/11/2007 2:47 AM<br>To: TSCM-...@googlegroups.com<br>Subject: [TSCM-L] Fwd: [ISN] Canadian coins bugged, U.S. security agency says<br><br><br>A follow up I found on ISN:<br><br><br><br><br><br> http://www.cbc.ca/technology/story/2007/01/10/rfid-defence.html<br> <br> The Canadian Press <br> January 10, 2007<br> <br> They say money talks, and a new report suggests Canadian currency is <br> indeed
 chatting, at least electronically, on behalf of shadowy spies.<br> <br> Canadian coins containing tiny transmitters have mysteriously turned up <br> in the pockets of at least three American contractors who visited <br> Canada, says a branch of the U.S. Department of Defence.<br> <br> Security experts believe the miniature devices could be used to track <br> the movements of defence industry personnel dealing in sensitive <br> military technology.<br> <br> "You might want to know where the individual is going, what meetings the <br> individual might be having and, above all, with whom," said David <br> Harris, a former CSIS officer who consults on security matters.<br> <br> "The more covert or clandestine the activity in which somebody might be <br> involved, the more significant this kind of information could be."<br> <br> The counter-intelligence office of the U.S. Defence Security Service <br> cites the currency caper as an example of the methods international <br>
 spies have recently tried to illicitly acquire military technology.<br> <br> <br> Nearly 1,000 'suspicious' contacts<br> <br> The service's report, Technology Collection Trends in the U.S. Defence <br> Industry, says foreign-hosted conventions, seminars and exhibits are <br> popular venues for pilfering secrets.<br> <br> The report is based on an analysis of 971 "suspicious contact reports" <br> submitted in fiscal 2005 by security-cleared defence contractors and <br> various official personnel.<br> <br> "On at least three separate occasions between October 2005 and January <br> 2006, cleared defence contractors' employees travelling through Canada <br> have discovered radio frequency transmitters embedded in Canadian coins <br> placed on their persons," the report says.<br> <br> The report did not indicate what kinds of coins were involved. A service <br> spokeswoman said details of the incidents were classified.<br> <br> As a result, the type of transmitter in play and
 its ultimate purpose <br> remain a mystery.<br> <br> However, tiny tracking tags, known as RFIDs, are commonly placed in <br> everything from clothing to key chains to help retailers track <br> inventory.<br> <br> Each tag contains a miniature antenna that beams a unique ID code to an <br> electronic reader. The information can then be transferred by the reader <br> into a computerized database.<br> <br> <br> Makes no sense<br> <br> The likely need for such a reading device means the doctored coins could <br> be used to track people only in a controlled setting, not over long <br> distances, said Chris Mathers, a security consultant and former <br> undercover RCMP officer.<br> <br> "From a technology perspective, it makes no sense," he said. "To me it's <br> very strange."<br> <br> Then there's the obvious problem: what if the coin holder plunks the <br> device into a pop machine?<br> <br> "You give the guy something with a transmitter that he's going to spend <br> I mean,
 he might have it for an hour," Mathers said with a chuckle.<br> <br> Harris speculates recent leaps in miniaturization could allow for a <br> sophisticated transmitter capable of monitoring a target's extensive <br> travels.<br> <br> "I think we can be pretty darn confident that the technology is there <br> for the sorts of micro-units that would be required to embed these <br> things in a coin," he said.<br> <br> "It's a brave new world, and greatly concerning on so many levels."<br> <br> Passing the coin to an unwitting contractor, particularly in strife-torn <br> countries, could mark the person for kidnapping or assassination, Harris <br> said.<br> <br> "You could almost, by handing a coin to somebody, achieve the equivalent <br> of the Mafiosi's last kiss on the cheek."<br> <br> The Defence Security Service report says employees of U.S. contractors <br> reported suspicious contacts from individuals, firms or governments of <br> more than 100 countries during the
 year.<br> <br> Technologies that generated the most interest were information systems, <br> lasers and optics, aeronautics and sensors.<br> <br> A foreign approach often meant a simple request for information from the <br> contractor.<br> <br> <br> Can contain built-in scanners<br> <br> But the report also underscores clandestine means of acquiring secrets <br> from U.S. employees, particularly those travelling abroad.<br> <br> "It is important to recognize copiers and shredders can contain built-in <br> scanners to copy the data."<br> <br> Other common methods include placing listening devices in rooms, <br> searching hotel rooms, inspecting electronic equipment and eavesdropping <br> on conversations.<br> <br> The report, which first came to light in a U.S. newspaper, has since <br> been posted on the website of the Federation of American Scientists, an <br> organization that tracks the intelligence world and promotes government <br> openness.<br> <br> The Canadian
 Press, 2006<br> <br><br><br><br><br><br><br>
<hr size=1>Everyone is raving about <a href="http://us.rd.yahoo.com/evt=45083/*http://advision.webevents.yahoo.com/mailbeta">the all-new Yahoo! Mail beta.</a>
--0-1199054267-1168540929=:6168--
Received on Sat Mar 02 2024 - 00:57:24 CST

This archive was generated by hypermail 2.3.0 : Sat Mar 02 2024 - 01:11:45 CST