U.S. military contractor accused of trying to spy for China charged with espionage in Germany
CBS News
An American man who worked at a U.S. military facility in Germany has been indicted for allegedly offering to supply sensitive information to ...
Australia expels Iranian ambassador after spy agency finds Iran directed antisemitic attacks on its soil
CNN
Australia is expelling the Iranian ambassador to Canberra after the country's intelligence agency found that Iran was behind at least two ...
Schools' safety tools are spying on kids — even at home - Fox News
Fox News
Schools' safety tools are spying on kids — even at home. UC San Diego study finds early one-third of school safety companies rate students based on ...
Popular free VPN caught spying on users | Information Age | ACS
Information Age | ACS
A popular free VPN has been accused of spying on its userbase after security researchers observed it taking non-consenting screenshots of user ...
YouTuber appears in Hisar court in spying case - The Tribune
The Tribune
YouTuber Jyoti Malhotra, who is facing allegations of spying for Pakistan, appeared in person before a Hisar court on Monday after spending 95 ...
Tuesday, August 26, 2025
Corporate Leaders Targeted by Android Spyware Masquerading as Security Apps
Security experts at Doctor Web have uncovered the spread of a sophisticated Android spyware campaign aimed at Russian business leaders...
Distributed through APK files disguised as security programs, the spyware is most commonly presented as an application called GuardCB, complete with an icon that mimics the emblem of the Central Bank of the
Other versions carry names such as “SECURITY_FSB” or simply “FSB,” in an attempt to masquerade as software from law enforcement or regulatory bodies.
With an interface available only in Russian, the malicious application is clearly designed for a narrow target audience rather than the global user base. more
Guess who might be behind this.
Corporate Espionage: Apple vs Oppo Legal Battle
Apple and Oppo are embroiled in a major corporate espionage battle that has raised questions about the theft of trade secrets in the global tech industry.
Apple has just lodged a federal lawsuit against Oppo, claiming the Chinese tech titan purloined vital trade secrets. The allegations are grave, and Apple had delivered a compelling evidence in support of the allegations.
According to Apple, Chen Shi, former Apple employee, moved the sensitive files to a USB drive one day before he parted ways with the company. Apple said Shi had viewed sensitive content in the middle of the night days before he left. The case itself is known as Oppo corporate espionage, and the phrase has started to pop up amongst the hot tech news outlets of today. more
According to Apple, Chen Shi, former Apple employee, moved the sensitive files to a USB drive one day before he parted ways with the company. Apple said Shi had viewed sensitive content in the middle of the night days before he left. The case itself is known as Oppo corporate espionage, and the phrase has started to pop up amongst the hot tech news outlets of today. more
Of Taiwan’s Inspected Hotels 50% use Measures to Detect Hidden Cameras
(In the other half you could be an Only Fans free trial.)
Taiwan - The Consumer Protection Committee on Thursday announced the results of a May inspection of 21 hotels across seven cities and counties, finding that 11 had adopted measures to detect hidden cameras.Of the hotels inspected, nine carried out hidden-camera detection on a regular schedule and two did so irregularly. Two others claimed to provide such services, but only one met its stated standards.
Inspectors ordered the removal of related signage at hotels that failed to meet their claims. more
Message to Innkeepers: Click here.
UNDERCOVER VIBES (The TSCM Song)
This is my experiment to show the developing power of artificial intelligence.
Lyrics, music and vocal were all created in 2 minutes, by asking AI, ” Create a song about TSCM inspections.”
AI also suggested the following in order to make the song into a radio play hit: English, Upbeat Pop/Dance-Pop, energetic and accessible, with memorable hooks and singable melodies. Classic verse-chorus-verse-chorus-bridge-chorus structure. Production: polished vocals, punchy drums, bright synths, catchy bass lines.
You can listen to two versions of the song here.
AI also suggested the following in order to make the song into a radio play hit: English, Upbeat Pop/Dance-Pop, energetic and accessible, with memorable hooks and singable melodies. Classic verse-chorus-verse-chorus-bridge-chorus structure. Production: polished vocals, punchy drums, bright synths, catchy bass lines.
You can listen to two versions of the song here.
The Arduino Bug - Want to make one?
In this project, we are going to build an audio bug using Arduino and NRF24L01.
This audio spy bug is highly customizable and can be easily integrated with other devices and systems. The NRF24L01 module allows transmission over specific channel, ensuring that our transmissions remain private up to a level.
This device is perfect for monitoring a baby room, keeping an eye on a pet, or even for professional surveillance. With its small size and easy portability, this audio spy bug is a must-have for anyone in need of discreet and reliable audio recording. more video
Our variation on the theme... more
Thursday, August 21, 2025
The Irishman Caught in 'Biggest Corporate Espionage Case of the Century'
Secret messages, codewords and a phone smashed with an axe...
The story of Dublin man Keith O’Brien made international headlines when his employer, a major US HR services firm, set a “trap” to identify how confidential information was being leaked – and the saga is not over yet. His 13-page confession was read to the High Court, where he told how he spied on his multinational employer for a rival for a fee of over €5,000 a month. That is, until he was caught.
In an affidavit filed with the High Court, Keith O’Brien, who was global payroll compliance manager of Rippling, said he was induced into spying and passing sensitive company information to the CEO of rival US firm Deel Inc.
The admission was disclosed during an application to join Deel, its French chief executive Alex Bouaziz and two solicitors working for Deel – Italian national Andrea David Mieli and UK-based Asif Malik – as co-defendants in corporate espionage proceedings taken by Rippling against Mr O’Brien last month. more
The story of Dublin man Keith O’Brien made international headlines when his employer, a major US HR services firm, set a “trap” to identify how confidential information was being leaked – and the saga is not over yet. His 13-page confession was read to the High Court, where he told how he spied on his multinational employer for a rival for a fee of over €5,000 a month. That is, until he was caught.
In an affidavit filed with the High Court, Keith O’Brien, who was global payroll compliance manager of Rippling, said he was induced into spying and passing sensitive company information to the CEO of rival US firm Deel Inc.
The admission was disclosed during an application to join Deel, its French chief executive Alex Bouaziz and two solicitors working for Deel – Italian national Andrea David Mieli and UK-based Asif Malik – as co-defendants in corporate espionage proceedings taken by Rippling against Mr O’Brien last month. more
NYC woman found a phone buried in her lawn...
— and police say it’s a new tactic thieves use to spy on homeowners.
Scientists use Vibration Detection to Eavesdrop on Smartphones
An emerging form of surveillance, “wireless-tapping,” explores the possibility of remotely deciphering conversations from the tiny vibrations produced by a cellphone’s earpiece.
With the goal of protecting users’ privacy from potential bad actors, a team of computer science researchers at Penn State demonstrated that transcriptions of phone calls can be generated from radar measurements taken up to three meters, or about 10 feet, from a phone.
While accuracy remains limited — around 60% for a vocabulary of up to 10,000 — the findings raise important questions about future privacy risks. more
Ian Fleming and His Spy Scheme Inspired a Broadway Show
The James Bond spy novels dreamed up by Ian Fleming were rooted in his World War II experiences as a British intelligence officer.
In one instance, Fleming had an idea that was so wild it’s still hard to believe it actually worked. To misdirect the Nazis, he suggested outfitting a corpse with fake military plans and strategically placing it off the coast of Spain.
Because truth can be stranger than fiction, that scheme is now the subject of the rollicking Broadway musical “Operation Mincemeat.”
Because truth can be stranger than fiction, that scheme is now the subject of the rollicking Broadway musical “Operation Mincemeat.”
The show, a hit in England before arriving in New York last spring, gets big laughs from this absurd tale of deception. In a rousing number, “God That’s Brilliant,” the conspiring spies sing rapturously as they plot to kill Hitler. (Fleming paints a picture of a martini-drinking, tuxedo-wearing assassin who “kills the guards, snogs the girl and says something cool.”) more
Security Advice of the Week
Luke Bencie advises...
To protect yourself, aka think like a spy, you can use the following checklist to stay alert and avoid getting pulled under by scammers:
To protect yourself, aka think like a spy, you can use the following checklist to stay alert and avoid getting pulled under by scammers:
- Pause before acting on urgent claims.
- Question the logic—does it make sense, or is it just dramatic?
- Verify facts across multiple reliable sources.
- Ask who benefits if you act right now.
Security / IT Director Alert: Browser-Based AI Agents
Browser-Based AI Agents: The Silent Security Threat Unfolding
Some of the most revolutionary advances in artificial intelligence include browser-based AI agents, which are self-sustaining software tools integrated into web browsers that act on behalf of individuals. Because these agents have access to email, calendars, file drives, and business applications, they have the potential to turbocharge productivity. From scheduling meetings to processing emails and surfing sites, they are transforming how we interact with the internet.
Some of the most revolutionary advances in artificial intelligence include browser-based AI agents, which are self-sustaining software tools integrated into web browsers that act on behalf of individuals. Because these agents have access to email, calendars, file drives, and business applications, they have the potential to turbocharge productivity. From scheduling meetings to processing emails and surfing sites, they are transforming how we interact with the internet.
But while their abilities increase, so does the risk: threats to browser-based AI agents is not hypothetical; it already exists.
Cybercriminals are increasingly using AI agents to stage highly advanced attacks that are intelligent, adaptive, and capable of attacking systems at scale. Programmed to simulate human decision-making, AI agents can be manipulated to execute malicious functions without the user’s awareness. more
Priyom: An International Short Wave Spy Numbers Organization You Can Join
Priyom.org is an international organization intending to research and bring to light the mysterious reality of intelligence, military and diplomatic communication via shortwave radio: number stations.
Cartoon from 1973 about government spies. So, grab your short wave radio and track back!
Sunday, August 10, 2025
Looks Like a Smoke Detector - Hackers Say Audio Bug - Brilliant for Building Security
A pair of hackers found that a vape detector often found in high school bathrooms contained microphones—and security weaknesses that could allow someone to turn it into a secret listening device...
...the Halo 3C goes beyond detecting smoke and vaping—including a distinct feature for discerning THC vaping in particular. It also has a microphone for listening out for “aggression,” gunshots, and keywords such as someone calling for help...
Now, after months of reverse engineering and security testing, Vasquez-Garcia and a fellow hacker he’s partnered with who goes by the pseudonym “Nyx,” have shown that it’s possible to hack one of those Halo 3C gadgets—which they’ve taken to calling by the nickname “snitch puck”—and take full control of it...
...the Halo 3C goes beyond detecting smoke and vaping—including a distinct feature for discerning THC vaping in particular. It also has a microphone for listening out for “aggression,” gunshots, and keywords such as someone calling for help...
Now, after months of reverse engineering and security testing, Vasquez-Garcia and a fellow hacker he’s partnered with who goes by the pseudonym “Nyx,” have shown that it’s possible to hack one of those Halo 3C gadgets—which they’ve taken to calling by the nickname “snitch puck”—and take full control of it...
At the Defcon hacker conference today, they plan to show that by exploiting just a few relatively simple security vulnerabilities, any hacker on the same network could have hijacked a Halo 3C to turn it into a real-time audio eavesdropping bug, disabled its detection capabilities, created fake alerts for vaping or gunshots, or even played whatever sound or audio they chose out of the device’s speaker.
Motorola said it has since developed a firmware update to address those security flaws that will automatically push to cloud-connected devices by Friday...
“To the credit of the company, the microphones sound great,” says Nyx. “From up on the ceiling, you could totally listen to what somebody was saying, and we’ve made this happen.”
Motorola said it has since developed a firmware update to address those security flaws that will automatically push to cloud-connected devices by Friday...
“To the credit of the company, the microphones sound great,” says Nyx. “From up on the ceiling, you could totally listen to what somebody was saying, and we’ve made this happen.”
Motorola told the hackers in an email that it has worked on a new firmware update that should fix the vulnerabilities. But the hackers argue that doesn’t, and can’t, address the underlying concern: that a gadget loaded with hidden microphones is installed in schools around the country. Motorola also advertises its Halo sensors for use in public housing—including inside residents’ homes—according to marketing material. more
Hacking issues aside, this is a brilliant device to enhance building security. Here is a video showing one feature. Many additional videos are on YouTube.com.
Hackers Love These 7 Smart Home Devices
Although everyone wants a convenient home, there’s little that’s less convenient than a hacked smart home appliance. When it comes to the best smart home devices, the hard and fast rule is: if it’s connected to Wi-Fi you’re going to need to make sure it's secured because there’s going to be a way to hack it.
The good news is that once you've figured out how to lock down one, it's pretty easy to repeat the process for the rest of them. Here's a list of seven of the most vulnerable smart devices in your home, and the steps you can take to make sure they're more secure than they are right now...
- Wi-Fi Routers
- Security Cameras
- Baby Monitors
- Smart Speakers
- Video Doorbells
- Smart Thermostats
- Smart Appliances
Counterespionage recommendations from the article are here.
And, do not forget about robot vacuums, refrigerators, washing machines, and anything that can automatically order from Amazon.
Subscribe to:
Posts (Atom)