Today, July 24, marks National Private Investigator (PI) Day. National PI Day is a time dedicated to celebrate the contributions of licensed Private Investigators. It also provides an opportunity to demonstrate the value of professional Private Investigators to the public. After all, Private Investigators provide a fundamental and vital role in society today.
The July 24 holiday commemorates the birth year of Eugene Francois Vidocq, the very first Private Investigator who founded the first known detective agency in 1833. Vidocq’s birthday is on July 24. His legendary reputation is credited greatly with shaping the way law enforcement and investigations are carried out today.
More than 80,000 Private Investigator professionals across the United States will observe the holiday. These professional in the United States will also be joined by their international Private Investigator colleagues. Today, we say THANK YOU to all those who have made the commitment to serve as a Private Investigators.
Professional Private Investigators often find themselves working with attorneys, families, law enforcement officials, insurance companies, business owners and others. Their scope of services can vary greatly, but can include conducting background checks, finding missing persons, reuniting families, preventing fraud and abuse, and more. more
Monday, July 24, 2017
Sunday, July 23, 2017
OSS 75th Anniversary - Awarded Congressional Gold Medal
This year marks the 75th anniversary of the Office of Strategic Services, an espionage unit that was crucial in winning World War II. And in time with the occasion, the agency is being awarded one of the nation’s highest civilian honors — Congressional Gold Medal.
Before there was the CIA there was the OSS. The Office of Strategic Services was the predecessor to CIA and U.S. Special Operations Command that includes the Navy SEALs and the Green Berets.
The agency was created after the attack on Pearl Harbor and when it became apparent that Hitler was a threat to the world.
“The actual date is June 13th, 1942 when President Roosevelt signed the executive order 69 that created the OSS and named then Col. Donovan as its director. [Donovan] eventually became a two-star general,” said Charles Pinck, president of the OSS Society. Pinck’s father was part of the OSS who went behind enemy lines in China, which was occupied by the Japanese...
“They were out of the box thinkers. They were daring, they were extraordinary,” said Patrick O’Donnell, author of four books on the OSS and an expert on special operations history. more
Extra Credit - Spy Gadgets of World War II
Before there was the CIA there was the OSS. The Office of Strategic Services was the predecessor to CIA and U.S. Special Operations Command that includes the Navy SEALs and the Green Berets.
The agency was created after the attack on Pearl Harbor and when it became apparent that Hitler was a threat to the world.
“The actual date is June 13th, 1942 when President Roosevelt signed the executive order 69 that created the OSS and named then Col. Donovan as its director. [Donovan] eventually became a two-star general,” said Charles Pinck, president of the OSS Society. Pinck’s father was part of the OSS who went behind enemy lines in China, which was occupied by the Japanese...
“They were out of the box thinkers. They were daring, they were extraordinary,” said Patrick O’Donnell, author of four books on the OSS and an expert on special operations history. more
Extra Credit - Spy Gadgets of World War II
Business Espionage: Half of German Firms Hit by Spying Last Two Years
More than half the companies in Germany have been hit by spying, sabotage or data theft in the last two years, the German IT industry association Bitkom said...
Some 53 per cent of companies in Germany have been victims of industrial espionage, sabotage or data theft in the last two years, Bitkom found – up from 51 per cent in a 2015 study...
Arne Schoenbohm, president of Germany’s BSI federal cyber agency, said many big companies and especially those operating critical infrastructure were generally well-prepared for cyber attacks. But many smaller and medium-sized companies did not take the threat seriously enough, he said...
Some 62 per cent of companies affected found those behind the attacks were either current or former employees. Forty-one per cent blamed competitors, customers, suppliers or service providers for the attacks, Bitkom said...
The BSI urged companies in Europe’s largest economy to make information security a top priority... more
Some 53 per cent of companies in Germany have been victims of industrial espionage, sabotage or data theft in the last two years, Bitkom found – up from 51 per cent in a 2015 study...
Arne Schoenbohm, president of Germany’s BSI federal cyber agency, said many big companies and especially those operating critical infrastructure were generally well-prepared for cyber attacks. But many smaller and medium-sized companies did not take the threat seriously enough, he said...
Some 62 per cent of companies affected found those behind the attacks were either current or former employees. Forty-one per cent blamed competitors, customers, suppliers or service providers for the attacks, Bitkom said...
The BSI urged companies in Europe’s largest economy to make information security a top priority... more
Spy House for Sale
MONTCLAIR, N.J. (AP) — A New Jersey home that has been vacant since the FBI arrested a family of undercover Russian spies living there is heading for sale.
Vladimir and Lydia Guryev lived in the home in Montclair under the names Richard and Cynthia Murphy before they were arrested in 2010 along with eight other spies accused of leading double lives, complete with false passports, secret code words, fake names, invisible ink and encrypted radio.
The parents of two young daughters had pleaded guilty to conspiring to act as an unregistered agent of a foreign country and were deported to Russia in exchange for four people convicted of betraying Moscow to the West being let out of prison there.
Their story partially inspired the FX drama “The Americans,” about two undercover Russian spies that live in the U.S. with two young children. more
Vladimir and Lydia Guryev lived in the home in Montclair under the names Richard and Cynthia Murphy before they were arrested in 2010 along with eight other spies accused of leading double lives, complete with false passports, secret code words, fake names, invisible ink and encrypted radio.
The parents of two young daughters had pleaded guilty to conspiring to act as an unregistered agent of a foreign country and were deported to Russia in exchange for four people convicted of betraying Moscow to the West being let out of prison there.
Their story partially inspired the FX drama “The Americans,” about two undercover Russian spies that live in the U.S. with two young children. more
Friday, July 21, 2017
The Case for Corporate Counterintelligence
Excellent article explaining why corporations need a Counterintelligence Program. Make sure your program is holistic. Round it out by adding in Technical Surveillance Countermeasures (TSCM), and technical information security elements.
Q: I am trying to garner support for creating a corporate counterintelligence (CI) program within our security organization; we are an international company with people and facilities in multiple countries. What does a “good” corporate CI program look like?
A: ...For its lifeblood, does your organization rely on: Patented or copyrighted products? Trade secrets? Proprietary information, technology, services or processes? Are supply chain vendors/subcontractors hired to support any of those areas? Is research and development a core capability? Does your organization provide goods or services not provided by anyone else? Are foreign nationals employed in the organization (domestically or internationally)? Are US citizen employees assigned to facilities outside the US? If you answered yes to any of these, then your organization is a viable candidate for a dedicated CI program... more
A: ...For its lifeblood, does your organization rely on: Patented or copyrighted products? Trade secrets? Proprietary information, technology, services or processes? Are supply chain vendors/subcontractors hired to support any of those areas? Is research and development a core capability? Does your organization provide goods or services not provided by anyone else? Are foreign nationals employed in the organization (domestically or internationally)? Are US citizen employees assigned to facilities outside the US? If you answered yes to any of these, then your organization is a viable candidate for a dedicated CI program... more
Eavesdropping Comes Out of the Closet – Gets Job as Reality Show
There are some people who love to eavesdrop — they can't help themselves. Then there are others who not only love to listen in, but also have a strong case of schadenfreude and take pleasure in the hardship of others. For these special individuals, there's a podcast that will be their newest obsession: Where Should We Begin.
Couples therapist and author Esther Perel hosts this addictive series, and it's better than reality TV, because you know these drama-filled conversations aren't scripted. During each session, strangers can listen in on private therapy sessions with the psychologist from Belgian. Although the names and identifying characteristics are left out, everything else is fair game in the episodes. more
Couples therapist and author Esther Perel hosts this addictive series, and it's better than reality TV, because you know these drama-filled conversations aren't scripted. During each session, strangers can listen in on private therapy sessions with the psychologist from Belgian. Although the names and identifying characteristics are left out, everything else is fair game in the episodes. more
Amazing $1.00 Gadget for Savvy Investigators
I recently came across this gadget on eBay.
It's a Bluetooth wireless remote control for smartphones (iOS & Android). Basically made for the selfie crowd, investigators will find applications for it as well. Not bad for a buck.
It comes with a battery. No instructions needed. Just flip the side switch, and pair it with your phone.
You can now be up to 30 feet away from your phone and snap photos, or take movies.
How can you go wrong for $1.00? Did I mention shipping was FREE! The catch... it will take about a month to arrive. Mine came from Thailand, probably via message in a bottle.
Need one quicker, a California ebay'er has them for $4.20, Free shipping.
It's a Bluetooth wireless remote control for smartphones (iOS & Android). Basically made for the selfie crowd, investigators will find applications for it as well. Not bad for a buck.
It comes with a battery. No instructions needed. Just flip the side switch, and pair it with your phone.
You can now be up to 30 feet away from your phone and snap photos, or take movies.
How can you go wrong for $1.00? Did I mention shipping was FREE! The catch... it will take about a month to arrive. Mine came from Thailand, probably via message in a bottle.
Need one quicker, a California ebay'er has them for $4.20, Free shipping.
Yet Another Caught on Open Microphone
Off-topic comments between OJ Simpson and his lawyer were caught on a hot mic as the parole board returned to tell him their decision.
Among the things discussed were cookies, ice cream, President Donald Trump and former Associated Press Special Correspondent Linda Deutsch, who covered Simpson’s double murder trial.
“My best to my favorite lady, you know who I’m speaking of,” he said. “Tell her I wanted to call her but I don’t call anybody from here other than my family.” more
People are caught on open microphones quite often.
Rule #1 - If you see a microphone assume it is on. Watch what you say.
Rule #2 - If you don't see a microphone, don't assume one is not there and listening. Watch what you say, until you have had the area swept by a competent Technical Surveillance Countermeasures (TSCM) team.
Among the things discussed were cookies, ice cream, President Donald Trump and former Associated Press Special Correspondent Linda Deutsch, who covered Simpson’s double murder trial.
“My best to my favorite lady, you know who I’m speaking of,” he said. “Tell her I wanted to call her but I don’t call anybody from here other than my family.” more
People are caught on open microphones quite often.
Rule #1 - If you see a microphone assume it is on. Watch what you say.
Rule #2 - If you don't see a microphone, don't assume one is not there and listening. Watch what you say, until you have had the area swept by a competent Technical Surveillance Countermeasures (TSCM) team.
Thursday, July 20, 2017
How to Get Away with Spying for the Enemy
If you like real-life, bizarre, spy stories, this may really interest you.
How does someone get away with helping a foreign adversary? We dig into the gonzo story of an American acquitted of spying for the Soviets—even after he confessed to it.
The founder of an investment firm in Hawaii, Rewald lived like a Master of the Universe, traveling the world, driving expensive cars, staying in expensive hotels and throwing expensive parties.
Smith, by contrast, was a Mormon who lived in Utah with his wife and four children. A former case officer in intelligence with the United States Army, he had resigned from his job at the start of the 1980s to spend more time with his family. Smith sought to make a new life for himself as an entrepreneur; when VHS tapes were still cutting-edge, he began a service to make video diaries and testimonials for families to pass down from one generation to the next.
The common thread between Reward and Smith was espionage... more
How does someone get away with helping a foreign adversary? We dig into the gonzo story of an American acquitted of spying for the Soviets—even after he confessed to it.
The founder of an investment firm in Hawaii, Rewald lived like a Master of the Universe, traveling the world, driving expensive cars, staying in expensive hotels and throwing expensive parties.
Smith, by contrast, was a Mormon who lived in Utah with his wife and four children. A former case officer in intelligence with the United States Army, he had resigned from his job at the start of the 1980s to spend more time with his family. Smith sought to make a new life for himself as an entrepreneur; when VHS tapes were still cutting-edge, he began a service to make video diaries and testimonials for families to pass down from one generation to the next.
The common thread between Reward and Smith was espionage... more
Yet Another Caught on Open Microphone
Israel's Benjamin Netanyahu caught on microphone slamming EU in Budapest...
Conference organizers quickly cut his microphone when they realized his closed-door comments were broadcast... Netanyahu was inadvertently picked up by a live microphone on Wednesday calling the European Union "crazy" and admitting to missile strikes in Syria... After a few minutes it became clear that journalists could hear the comments and the sound was cut. more
People are caught on open microphones quite often.
Rule #1 - If you see a microphone assume it is on. Watch what you say.
Rule #2 - If you don't see a microphone, don't assume one is not there and listening. Watch what you say, until you have had the area swept by a competent Technical Surveillance Countermeasures (TSCM) team.
Conference organizers quickly cut his microphone when they realized his closed-door comments were broadcast... Netanyahu was inadvertently picked up by a live microphone on Wednesday calling the European Union "crazy" and admitting to missile strikes in Syria... After a few minutes it became clear that journalists could hear the comments and the sound was cut. more
People are caught on open microphones quite often.
Rule #1 - If you see a microphone assume it is on. Watch what you say.
Rule #2 - If you don't see a microphone, don't assume one is not there and listening. Watch what you say, until you have had the area swept by a competent Technical Surveillance Countermeasures (TSCM) team.
Monday, July 17, 2017
Information Security's Curse - The Ostrich Effect
A new study by OneLogin has revealed that a large proportion of businesses fail to adequately protect their networks from the potential threat posed by ex-employees.
The firm surveyed more than 600 IT decision-makers in the UK and found respondents were aware that over half (58%) of former employees are still able to access corporate networks even after they’ve left a company...
“Our study suggests that many businesses are burying their heads in the sand when it comes to this basic, but significant, threat to valuable data, revenue and brand image,” said Alvaro Hoyos, chief information security officer at OneLogin. more
The firm surveyed more than 600 IT decision-makers in the UK and found respondents were aware that over half (58%) of former employees are still able to access corporate networks even after they’ve left a company...
“Our study suggests that many businesses are burying their heads in the sand when it comes to this basic, but significant, threat to valuable data, revenue and brand image,” said Alvaro Hoyos, chief information security officer at OneLogin. more
Shark Tanked
UK - A former champion boxer has been jailed after bugging his ex-girlfriend's phone during a campaign to 'control' her.
Ronnie 'The Shark' Clark installed spyware on a phone he bought former partner Rebecca Graham and sent her menacing messages, a court heard.
The 32-year-old was jailed for nine months at Teesside Crown Court after he was convicted of the new offence of 'controlling or coercive behaviour'...
He used the phone software to monitor who she was exchanging messages with and threatened to kill a man she was in touch with, The Dundee Courier reported.
A family member of Clark's also messaged Miss Graham telling her 'you know what he's capable of' and 'he's not scared of killing people'. more
Ronnie 'The Shark' Clark installed spyware on a phone he bought former partner Rebecca Graham and sent her menacing messages, a court heard.
The 32-year-old was jailed for nine months at Teesside Crown Court after he was convicted of the new offence of 'controlling or coercive behaviour'...
He used the phone software to monitor who she was exchanging messages with and threatened to kill a man she was in touch with, The Dundee Courier reported.
A family member of Clark's also messaged Miss Graham telling her 'you know what he's capable of' and 'he's not scared of killing people'. more
Business Espionage: Hotel Wars
When it comes to appealing to Millennials — of which there are now 75.4 million in the United States alone — hotel companies are doing all they can to launch wallet-friendly, yet still-stylish accommodations that emphasize such features as co-working spaces, communal stadium seating, artisanal goods, and craft beers.
...now, one U.S. hotel company is suing another in an effort to either protect its intellectual property rights...
On July 12, Red Lion Hotels filed a lawsuit against Hard Rock International for “trade dress infringement, injury to business reputation, and unfair competition.”
Red Lion alleges that Hard Rock’s newest hotel brand, Reverb, is a carbon copy of its own Hotel RL brand, which it launched in October 2014 and currently has seven properties throughout the United States...
Red Lion, however, alleges that these similarities aren’t just the result of a shared effort to appeal to Millennials; it’s the fact that Red Lion and Hard Rock hired the same hotel consulting group to develop their respective brands...
This isn’t the first time a hotel company has accused a competitor of intellectual property theft. Starwood Hotels & Resorts sued Hilton in 2009, alleging that two of its former executives who joined Hilton had conspired to steal secrets from W Hotels to help Hilton create its own version of W, to be called Denizen.
Hilton later paid Starwood $75 million to settle civil charges of corporate espionage, and agreed not to launch or acquire a lifestyle brand like Denizen for two years. more
...now, one U.S. hotel company is suing another in an effort to either protect its intellectual property rights...
On July 12, Red Lion Hotels filed a lawsuit against Hard Rock International for “trade dress infringement, injury to business reputation, and unfair competition.”
Red Lion alleges that Hard Rock’s newest hotel brand, Reverb, is a carbon copy of its own Hotel RL brand, which it launched in October 2014 and currently has seven properties throughout the United States...
Red Lion, however, alleges that these similarities aren’t just the result of a shared effort to appeal to Millennials; it’s the fact that Red Lion and Hard Rock hired the same hotel consulting group to develop their respective brands...
This isn’t the first time a hotel company has accused a competitor of intellectual property theft. Starwood Hotels & Resorts sued Hilton in 2009, alleging that two of its former executives who joined Hilton had conspired to steal secrets from W Hotels to help Hilton create its own version of W, to be called Denizen.
Hilton later paid Starwood $75 million to settle civil charges of corporate espionage, and agreed not to launch or acquire a lifestyle brand like Denizen for two years. more
Friday, July 14, 2017
This week in SpyCam News: A Spy Watch Case Within a Case, and more...
VA - That case involves the 20 charges of filming a nude person without their consent, seven charges of entering a home under false pretenses, and two charges of possessing marijuana that are pending against former Windor Hills maintenance worker John David Mills, 34, of Montgomery County. Prosecutors say Mills went to women’s apartments, told them their bathroom needed repair, and left behind a spy watch equipped with a hidden video camera. He then returned to collect the watch, amassing a collection of surreptitious videos of residents in their bathrooms. At a hearing in May, Assistant Commonwealth’s Attorney Patrick Jensen said that Mills told investigators that the videos had become an addiction and that he had secretly filmed more than 20 people. more
---
FL - The Citrus County Sheriff's Office says a church employee has been arrested on several charges including video voyeurism. In a press release, deputies say the man was an employee of Seven Rivers Presbyterian Church. He is identified as 36-year-old Chad Robison from Hernando. He worked as a worship director from 2011 to 2017... After investigating, Internet Crimes Against Children Central Florida Task Force found more than 3,000 videos and 350,000 pictures on his laptop featuring young girls performing sex acts with Robison. The laptop also contained videos of young girls using his restroom when they visited his home. more
---
UK - A trusted school caretaker hid a camera in staff toilets and made secret recordings for his own sexual gratification. Pervert Malcolm Banks had worked at Gosforth Academy, in Newcastle, for over 30 years before he decided to set-up the device and upload the subsequent footage on to his computer... The camera was eventually spotted by two teachers and it was handed to the headteacher before Banks was confronted. more
---
Canada - Police are seeking a suspect after a woman reported an unknown male allegedly filmed her in the change room of an Oakville community centre July 11. The woman was getting ready to swim at the Iroquois Ridge Community Centre on Glenashton Drive at 7:45 p.m. when the alleged incident occurred, Halton police say. more
---
AR - A woman told police she caught a man taking video or pictures of her while she was nude in a local gym's tanning booth. Eric Shane Couch, 30, of Hot Springs, has been charged with video voyeurism, a felony... The female victim told police that as she was getting out of a tanning bed and getting dressed, she noticed a cell phone being held over the partitioning wall that separated two tanning booths. more
---
LA - Bossier City police are investigating a complaint received Monday about an alleged incident of video voyeurism at an Old Navy clothing store. ...according to the complaint, an unidentified man is accused of sliding a mobile phone under a dressing room stall door in an apparent attempt to take photos or video of the 17-year-old girl inside. more
---
(Sometimes, spycams are good.)
UK - A Bupa carer was caught on a family’s spy cam verbally abusing a dementia patient before twice spraying an aerosol in her MOUTH, a court heard... Betty Boylan’s relatives hid the device inside a television after they found unexplained bruising on the retired nurse when they visited her at the £1,000-a-month care home. Within days they uncovered disturbing footage of carer Bina Begum, 49, lifting the great-gran by her head before throwing her back into her chair. more
---
Idiocracy is closer than you think... SOLD OUT
---
FL - The Citrus County Sheriff's Office says a church employee has been arrested on several charges including video voyeurism. In a press release, deputies say the man was an employee of Seven Rivers Presbyterian Church. He is identified as 36-year-old Chad Robison from Hernando. He worked as a worship director from 2011 to 2017... After investigating, Internet Crimes Against Children Central Florida Task Force found more than 3,000 videos and 350,000 pictures on his laptop featuring young girls performing sex acts with Robison. The laptop also contained videos of young girls using his restroom when they visited his home. more
---
UK - A trusted school caretaker hid a camera in staff toilets and made secret recordings for his own sexual gratification. Pervert Malcolm Banks had worked at Gosforth Academy, in Newcastle, for over 30 years before he decided to set-up the device and upload the subsequent footage on to his computer... The camera was eventually spotted by two teachers and it was handed to the headteacher before Banks was confronted. more
---
Canada - Police are seeking a suspect after a woman reported an unknown male allegedly filmed her in the change room of an Oakville community centre July 11. The woman was getting ready to swim at the Iroquois Ridge Community Centre on Glenashton Drive at 7:45 p.m. when the alleged incident occurred, Halton police say. more
---
AR - A woman told police she caught a man taking video or pictures of her while she was nude in a local gym's tanning booth. Eric Shane Couch, 30, of Hot Springs, has been charged with video voyeurism, a felony... The female victim told police that as she was getting out of a tanning bed and getting dressed, she noticed a cell phone being held over the partitioning wall that separated two tanning booths. more
---
LA - Bossier City police are investigating a complaint received Monday about an alleged incident of video voyeurism at an Old Navy clothing store. ...according to the complaint, an unidentified man is accused of sliding a mobile phone under a dressing room stall door in an apparent attempt to take photos or video of the 17-year-old girl inside. more
---
(Sometimes, spycams are good.)
UK - A Bupa carer was caught on a family’s spy cam verbally abusing a dementia patient before twice spraying an aerosol in her MOUTH, a court heard... Betty Boylan’s relatives hid the device inside a television after they found unexplained bruising on the retired nurse when they visited her at the £1,000-a-month care home. Within days they uncovered disturbing footage of carer Bina Begum, 49, lifting the great-gran by her head before throwing her back into her chair. more
---
Idiocracy is closer than you think... SOLD OUT
Wednesday, July 12, 2017
Shops Using Spy Techniques to Monitor Customers' Facial Expressions
New technology being installed by retailers in Europe and the US, and being trialed in the UK, can spot if a customer cannot find a product, read their reaction to an outfit or spot thieves in a bid to keep up with online retailers.
Shops are using new spy techniques to monitor customers' facial expressions, heart rate and even pupil dilation while they browse the aisles.
Technology installed by one French bookseller is able to detect shoppers' movements and facial expressions and alert staff that they may require assistance.
The technology could save retailers thousands of pounds by ditching the laborious marketing method of interviewing shoppers and focus groups. more
Shops are using new spy techniques to monitor customers' facial expressions, heart rate and even pupil dilation while they browse the aisles.
Technology installed by one French bookseller is able to detect shoppers' movements and facial expressions and alert staff that they may require assistance.
The technology could save retailers thousands of pounds by ditching the laborious marketing method of interviewing shoppers and focus groups. more
How the Dutch Bugged the Soviet Embassy -- Updated with Excellent Graphics
Our friend in The Netherlands, Dr. Cees Wiebes, has alerted us to some updates on the cryptomuseum.com website.
Backgrounds: Dr. Wiebes is the author of Intelligence and the War in Bosnia: 1992-1995 (Studies in Intelligence History). In researching this book he was granted full access to the top-secret archives of the Dutch services and
the still classified UN archives. Foreign intelligence services gave
him confidential briefings, and he spoke with more than 100
intelligence officials from various countries.
The Crypto Museum, curated by Paul Reuvers and Marc Simons, is the absolute best virtual site I've seen for information on government eavesdropping and information security countermeasures. Both are self-employed engineers from Eindhoven, a lovely small (but very high-tech) city which I've been to multiple times. Their dedication to preserving this history is only rivaled by the photography and graphics they have been able to obtain for the website. Enjoy...
An update of the Dutch bugging of the Soviet embassy in The Hague: http://www.cryptomuseum.com/covert/cases/nl/ra1958.htm
The various types of Dutch bugs that were used.
http://www.cryptomuseum.com/covert/bugs/ec/ec1/index.htm
http://www.cryptomuseum.com/covert/bugs/ec/ec2/index.htm
http://www.cryptomuseum.com/covert/bugs/ec/ec3/index.htm
http://www.cryptomuseum.com/covert/bugs/ec/ec4/index.htm
http://www.cryptomuseum.com/covert/bugs/ec/ec5/index.htm
New information as regards the Moscow bug:
http://www.cryptomuseum.com/covert/bugs/ec/cavity/index.htm
An interesting overview of all Easy Chair- related affairs:
http://www.cryptomuseum.com/covert/bugs/ec/index.htm
Click to enlarge. |
The Crypto Museum, curated by Paul Reuvers and Marc Simons, is the absolute best virtual site I've seen for information on government eavesdropping and information security countermeasures. Both are self-employed engineers from Eindhoven, a lovely small (but very high-tech) city which I've been to multiple times. Their dedication to preserving this history is only rivaled by the photography and graphics they have been able to obtain for the website. Enjoy...
An update of the Dutch bugging of the Soviet embassy in The Hague: http://www.cryptomuseum.com/covert/cases/nl/ra1958.htm
The various types of Dutch bugs that were used.
http://www.cryptomuseum.com/covert/bugs/ec/ec1/index.htm
http://www.cryptomuseum.com/covert/bugs/ec/ec2/index.htm
http://www.cryptomuseum.com/covert/bugs/ec/ec3/index.htm
http://www.cryptomuseum.com/covert/bugs/ec/ec4/index.htm
http://www.cryptomuseum.com/covert/bugs/ec/ec5/index.htm
New information as regards the Moscow bug:
http://www.cryptomuseum.com/covert/bugs/ec/cavity/index.htm
An interesting overview of all Easy Chair- related affairs:
http://www.cryptomuseum.com/covert/bugs/ec/index.htm
Tuesday, July 11, 2017
Spycam News: Former NASCAR Driver Sued for Spying on Ex's
Former NASCAR driver Greg Biffle and Roush Fenway Racing have been sued by Biffle's ex-wife and her mother for allegedly spying on them inside his home in Mooresville, North Carolina, with hidden cameras.
According to WSOC-TV's Allison Latos, Biffle is alleged to have hidden cameras "inside the house, including in the master bedroom, bathroom and in the guest bedroom where Biffle's former mother-in-law stayed."
The suit reportedly alleges Biffle, 47, spied on his ex-wife and ex-mother-in-law with the hidden cameras and showed the tape around. more
According to WSOC-TV's Allison Latos, Biffle is alleged to have hidden cameras "inside the house, including in the master bedroom, bathroom and in the guest bedroom where Biffle's former mother-in-law stayed."
The suit reportedly alleges Biffle, 47, spied on his ex-wife and ex-mother-in-law with the hidden cameras and showed the tape around. more
Android Malware Steals Data From 40 Apps
A newly uncovered form of Android malware aims to steal data from over 40 popular apps including Facebook, WhatsApp, Skype and Firefox - and the trojan has been actively engaging in in this illicit activity for almost two years.
Dubbed SpyDealer by the Palo Alto Networks researchers who discovered it, the malware harvests vast accounts of personal information about compromised users, including phone numbers, messages, contacts, call history, connected wi-fi information and even the location of the device.
The espionage capabilities of the trojan also enable it to record phone calls and videos, along with surrounding audio and video, take photos with both front and rear cameras, take screenshots of sensitive information and monitor the devices location at all times. more
Dubbed SpyDealer by the Palo Alto Networks researchers who discovered it, the malware harvests vast accounts of personal information about compromised users, including phone numbers, messages, contacts, call history, connected wi-fi information and even the location of the device.
The espionage capabilities of the trojan also enable it to record phone calls and videos, along with surrounding audio and video, take photos with both front and rear cameras, take screenshots of sensitive information and monitor the devices location at all times. more
Goodluck Jonathan's Wife - Claims Repeated Phone Bugging
Nigeria - Mrs. Patience Jonathan, wife of former President Goodluck Jonathan, has accused the Economic and Financial Crimes Commission of sending assassins after her.
Patience also accused the anti-graft agency of bugging her telephone lines, adding that agents of the commission had been sending threatening text messages to her.
The former President’s wife said, “The EFCC and its agents have repeatedly bugged the personal telephones of our client and her relations through its many operatives and has inundated her with numerous threatening calls and text messages.” more
Patience also accused the anti-graft agency of bugging her telephone lines, adding that agents of the commission had been sending threatening text messages to her.
The former President’s wife said, “The EFCC and its agents have repeatedly bugged the personal telephones of our client and her relations through its many operatives and has inundated her with numerous threatening calls and text messages.” more
The Great Seal Redux - Former Minister Admits to Installing a Video / Audio Bug
Ghana - The former Minister of Lands and Natural Resources, Alhaji Inusah Fuseini, has said that he installed the spying device retrieved from the office of the current Minister, John Peter Amewu...
According to him, the hue and cry over the incident was not necessary as the device was not even fully installed... (it appears fully installed)
The device was planted in the huge Coat of Arms plaque hanging in the far left corner of the Minister’s office.
The device included a camera, a storage unit and another device suspected to be a transmitter. It was neatly housed in a black metal box and used batteries.* more
* This description is not totally accurate, based on what's seen in the photo.
For more on the original Great Seal Bug click here.
UPDATE #1
It has emerged that, the secret audiovisual recording device planted at the Lands and Natural Resource Minister’s office was discovered by an Israeli national and not National Security operatives as widely speculated.
According to the Public Relations Officer of the Lands Ministry, Abraham Otabil, the Israeli national [name withheld], who had called on the minister to discuss some private matters when he surprisingly detected the ‘spying’ gadget...
He added that, the detective and his team discovered the bugged device after a brief inspection was carried out at the office. Though the said Israeli national, could not tell the minister how long the device had been planted, National Security operatives were alerted to pick up the matter for further investigations. more
UPDATE #2
Following the bugging of the office of the Minister of Lands and Natural Resources by a former minister under the out-gone National Democratic Congress (NDC) administration – Inusah Fuseini, the Majority Leader in Parliament, Osei Kyei-Mensah-Bonsu, has suggested to all ministers and deputy ministers in the current regime to have their offices screened and swept by the Bureau of National Investigations (BNI).
He said personally, he was going to ask the security agencies to also screen and sweep his office. more
UPDATE #3
The Member of Parliament for Kumbungu, Ras Mubarak, has admitted bugging the office and vehicle of the current acting Chief Executive of the National Youth Authority, Mr Emmanuel Asigiri. more
According to him, the hue and cry over the incident was not necessary as the device was not even fully installed... (it appears fully installed)
The device was planted in the huge Coat of Arms plaque hanging in the far left corner of the Minister’s office.
The device included a camera, a storage unit and another device suspected to be a transmitter. It was neatly housed in a black metal box and used batteries.* more
* This description is not totally accurate, based on what's seen in the photo.
For more on the original Great Seal Bug click here.
UPDATE #1
It has emerged that, the secret audiovisual recording device planted at the Lands and Natural Resource Minister’s office was discovered by an Israeli national and not National Security operatives as widely speculated.
According to the Public Relations Officer of the Lands Ministry, Abraham Otabil, the Israeli national [name withheld], who had called on the minister to discuss some private matters when he surprisingly detected the ‘spying’ gadget...
He added that, the detective and his team discovered the bugged device after a brief inspection was carried out at the office. Though the said Israeli national, could not tell the minister how long the device had been planted, National Security operatives were alerted to pick up the matter for further investigations. more
UPDATE #2
Following the bugging of the office of the Minister of Lands and Natural Resources by a former minister under the out-gone National Democratic Congress (NDC) administration – Inusah Fuseini, the Majority Leader in Parliament, Osei Kyei-Mensah-Bonsu, has suggested to all ministers and deputy ministers in the current regime to have their offices screened and swept by the Bureau of National Investigations (BNI).
He said personally, he was going to ask the security agencies to also screen and sweep his office. more
UPDATE #3
The Member of Parliament for Kumbungu, Ras Mubarak, has admitted bugging the office and vehicle of the current acting Chief Executive of the National Youth Authority, Mr Emmanuel Asigiri. more
Saturday, July 8, 2017
Thursday, July 6, 2017
Security Director Alert: Satellite Phone Encryption Cracked
Chinese researchers have discovered a way to rapidly decrypt satellite phone communications -- within a fraction of a second in some cases.
The paper, published this week, expands on previous research by German academics in 2012 by rapidly speeding up the attack and showing that the encryption used in popular Inmarsat satellite phones can be cracked in "real time."
Using their proposed inversion attack thousands of time on a 3.3GHz satellite stream, the researchers were able to reduce the search space for the 64-bit encryption key, effectively making the decryption key easier to find.
The end result was that encrypted data could be cracked in a fraction of a second. more
The paper, published this week, expands on previous research by German academics in 2012 by rapidly speeding up the attack and showing that the encryption used in popular Inmarsat satellite phones can be cracked in "real time."
Using their proposed inversion attack thousands of time on a 3.3GHz satellite stream, the researchers were able to reduce the search space for the 64-bit encryption key, effectively making the decryption key easier to find.
The end result was that encrypted data could be cracked in a fraction of a second. more
Surveillance Robots Share and Interpret Images
A new system that allows a team of robots to share and interpret information as they move around could enable these same robots to relieve humans of dangerous jobs such as disposing of landmines, cleaning up after a nuclear meltdown or surveying the damage after a flood or hurricane.
Seeing the same area from many points of view could be confusing to a human, but a computer can manage it and combine all the information to build a "model" of the scene and track objects and people from place to place.
Researchers from Cornell University have developed the system, which would allow robots to conduct surveillance as a single entity with many eyes.
"Once you have robots that cooperate, you can do all sorts of things," said Kilian Weinberger, associate professor of computer science...
The researchers plan to test their system on the Cornell campus, using research robots to "surveil" crowded areas while drawing on an overview from existing webcams. Their work might lead to incorporating the new technology into campus security. more
Things to Come...
Seeing the same area from many points of view could be confusing to a human, but a computer can manage it and combine all the information to build a "model" of the scene and track objects and people from place to place.
Researchers from Cornell University have developed the system, which would allow robots to conduct surveillance as a single entity with many eyes.
"Once you have robots that cooperate, you can do all sorts of things," said Kilian Weinberger, associate professor of computer science...
The researchers plan to test their system on the Cornell campus, using research robots to "surveil" crowded areas while drawing on an overview from existing webcams. Their work might lead to incorporating the new technology into campus security. more
Things to Come...
The Espionage What Goes Around...
China fears cyberattacks because it is creating cutting-edge technology that others will want to steal, says its envoy to Canada (Lu Shaye), a rebuttal of the widely held view that the country is a leader in internet espionage.
Canada and China recently agreed to stop state-sponsored hacking of each other’s trade secrets and business information, but experts say the deal is unverifiable and potentially meaningless...
“China is technically advanced now and we are afraid that our things will be stolen by others,” Lu said through a translator in an interview with The Canadian Press.
China’s innovators are making great strides in quantum communications, supercomputing, and other information technology, he continued.
Last year, China launched a large satellite to support quantum communications, which New Scientist magazine describes as “a form of secure communication in which the laws of quantum mechanics prevent eavesdroppers from snooping in.” more
Canada and China recently agreed to stop state-sponsored hacking of each other’s trade secrets and business information, but experts say the deal is unverifiable and potentially meaningless...
“China is technically advanced now and we are afraid that our things will be stolen by others,” Lu said through a translator in an interview with The Canadian Press.
China’s innovators are making great strides in quantum communications, supercomputing, and other information technology, he continued.
Last year, China launched a large satellite to support quantum communications, which New Scientist magazine describes as “a form of secure communication in which the laws of quantum mechanics prevent eavesdroppers from snooping in.” more
Wednesday, July 5, 2017
The Bootlegger, the Wiretap, and the Beginning of Privacy
By Karen Abbott
Nearly a century before a U.S. President accused his predecessor of ordering a “tapp” on his private telephone line, and before he tweeted a warning to the head of the F.B.I. that he had “better hope that there are no ‘tapes’ of our conversations,” a professional spy, armed with a pack of cigarettes and an earpiece, hid in the basement of the Henry Building, in downtown Seattle, catching crackling bits of words being spoken miles away.
Richard Fryant had worked as a wiretapper for the New York Telephone Company, tasked with eavesdropping on his own colleagues, and now took freelance assignments in the Queen City.
On this occasion, he was seeking dirt on Seattle’s corrupt mayor—who was suspected of having ties to Roy Olmstead, a local bootlegger—for a political rival. At the behest of his client, Fryant rigged micro-wires to a certain exchange, ELliott-6785, and began to listen.
The men speaking on ELliott-6785 hung up, but the conversation had only
just begun... more
Roy Olmstead kicked off a long, twisted, legal trail of litigation, decisions and laws regarding electronic surveillance. It's a trail that hasn't ended yet.
Nearly a century before a U.S. President accused his predecessor of ordering a “tapp” on his private telephone line, and before he tweeted a warning to the head of the F.B.I. that he had “better hope that there are no ‘tapes’ of our conversations,” a professional spy, armed with a pack of cigarettes and an earpiece, hid in the basement of the Henry Building, in downtown Seattle, catching crackling bits of words being spoken miles away.
Richard Fryant had worked as a wiretapper for the New York Telephone Company, tasked with eavesdropping on his own colleagues, and now took freelance assignments in the Queen City.
On this occasion, he was seeking dirt on Seattle’s corrupt mayor—who was suspected of having ties to Roy Olmstead, a local bootlegger—for a political rival. At the behest of his client, Fryant rigged micro-wires to a certain exchange, ELliott-6785, and began to listen.
“They got that load,” one man said, breathing heavily.
“The hell they did—who?” asked another.
“The federals.”
Roy Olmstead kicked off a long, twisted, legal trail of litigation, decisions and laws regarding electronic surveillance. It's a trail that hasn't ended yet.
Quote of the Week
"There are no hackers; there are only spies," ~ Eric O'Neill
Tuesday, July 4, 2017
Without Spies There May Have Been No 'Fourth of July'
By Nina Strochlic, for National Geographic magazine.
John Jay, later the first Chief Justice of the Supreme Court, had been running counterintelligence as head of the New York State Committee and Commission for Detecting and Defeating Conspiracies. One of Jay’s operatives, a merchant named Nathaniel Sackett, had experience in secret writing and codes.
In February 1777, Washington wrote a letter to Sackett in which he offered him $50 a month—out of his own pocket—to establish the first formal apparatus for the “advantage of obtaining the earliest and best Intelligence of the designs of the Enemy.” “Without the organization that Sackett set up, it would have been very difficult for us to win the war,” says Houghton. “We had a ragtag army and [the British] had the greatest army, greatest navy, and greatest economy in the world. We had no real business winning this war.”
But America’s spy service got off to an inglorious start. Most of Sackett’s agents failed at their jobs—including Sackett himself, who was fired after just six months.
Fortunately for the infant nation, Sackett’s replacement, 26-year-old Benjamin Tallmadge, created what is considered one of America’s greatest espionage operations: the Culper Spy Ring. Comprised of childhood friends from Long Island, the group included a shop owner inside New York City who gathered information, a traveling trader who smuggled it out of the city, and a whale boat captain who delivered it to Washington’s camp.
Employing the tools and tricks of the 18th-century spy trade—hiding secret messages in hollow feather quills, using “dead drops” to transport letters—the Culper operatives unmasked enemy spies, busted a money counterfeiting plan, and stopped the British from sabotaging a French aid mission to the colonies.
After important letters were lost during an enemy raid, Tallmadge invented a “numerical dictionary” code that matched 763 cities, names, and words to numbers. (Washington’s code name was Agent 711.) Washington also asked physician James Jay (brother to John) to invent an invisible ink that could be revealed only with another chemical and would “relieve the fears of such persons as may be entrusted in its conveyance.”
Washington’s espionage experiment paid off. In 1781 the British surrendered, thanks in part to the intelligence gathered by the Culper Ring and their networks. “Washington didn’t really out-fight the British. He simply out-spied us,” a British intelligence officer allegedly said after the war.
None of the Culper spies were ever caught, and even Washington himself never learned exactly who was in the group. The ring’s very existence wasn’t discovered until the 1900s, and to this day no one knows for certain how many members it had.
After the war Washington asked Congress to reimburse him $17,000—nearly half a million dollars today—for his espionage expenses. The lawmakers obliged.
In 1777, the American colonies were badly losing their fight for
independence from Great Britain. The British Army had captured New York
City’s crucial port. Expecting further advances, the Continental
Congress was evacuated from Philadelphia. It seemed that the war was
lost.
Then George Washington, then Commander-in-Chief of the Continental Army, wrote a letter that changed the course of the war.
Washington was desperate to discover what was happening inside New York, but military scouts couldn’t get close enough. The general needed someone to penetrate enemy lines, but when he asked for volunteers, few of his troops raised their hands.
“Spying wasn’t seen as gentlemanly,” says Vince Houghton, resident historian at the International Spy Museum in Washington, D.C.
Finally, a young army captain named Nathan Hale volunteered for the dangerous assignment. He was caught a week later and hanged, the first known American spy to be executed on the job. (He’s memorialized with a statue outside CIA headquarters.)
Washington realized that the mission was too big for untrained volunteers, so he set about building an espionage organization.
Washington was desperate to discover what was happening inside New York, but military scouts couldn’t get close enough. The general needed someone to penetrate enemy lines, but when he asked for volunteers, few of his troops raised their hands.
“Spying wasn’t seen as gentlemanly,” says Vince Houghton, resident historian at the International Spy Museum in Washington, D.C.
Finally, a young army captain named Nathan Hale volunteered for the dangerous assignment. He was caught a week later and hanged, the first known American spy to be executed on the job. (He’s memorialized with a statue outside CIA headquarters.)
Washington realized that the mission was too big for untrained volunteers, so he set about building an espionage organization.
John Jay, later the first Chief Justice of the Supreme Court, had been running counterintelligence as head of the New York State Committee and Commission for Detecting and Defeating Conspiracies. One of Jay’s operatives, a merchant named Nathaniel Sackett, had experience in secret writing and codes.
In February 1777, Washington wrote a letter to Sackett in which he offered him $50 a month—out of his own pocket—to establish the first formal apparatus for the “advantage of obtaining the earliest and best Intelligence of the designs of the Enemy.” “Without the organization that Sackett set up, it would have been very difficult for us to win the war,” says Houghton. “We had a ragtag army and [the British] had the greatest army, greatest navy, and greatest economy in the world. We had no real business winning this war.”
But America’s spy service got off to an inglorious start. Most of Sackett’s agents failed at their jobs—including Sackett himself, who was fired after just six months.
Fortunately for the infant nation, Sackett’s replacement, 26-year-old Benjamin Tallmadge, created what is considered one of America’s greatest espionage operations: the Culper Spy Ring. Comprised of childhood friends from Long Island, the group included a shop owner inside New York City who gathered information, a traveling trader who smuggled it out of the city, and a whale boat captain who delivered it to Washington’s camp.
Employing the tools and tricks of the 18th-century spy trade—hiding secret messages in hollow feather quills, using “dead drops” to transport letters—the Culper operatives unmasked enemy spies, busted a money counterfeiting plan, and stopped the British from sabotaging a French aid mission to the colonies.
After important letters were lost during an enemy raid, Tallmadge invented a “numerical dictionary” code that matched 763 cities, names, and words to numbers. (Washington’s code name was Agent 711.) Washington also asked physician James Jay (brother to John) to invent an invisible ink that could be revealed only with another chemical and would “relieve the fears of such persons as may be entrusted in its conveyance.”
Washington’s espionage experiment paid off. In 1781 the British surrendered, thanks in part to the intelligence gathered by the Culper Ring and their networks. “Washington didn’t really out-fight the British. He simply out-spied us,” a British intelligence officer allegedly said after the war.
None of the Culper spies were ever caught, and even Washington himself never learned exactly who was in the group. The ring’s very existence wasn’t discovered until the 1900s, and to this day no one knows for certain how many members it had.
After the war Washington asked Congress to reimburse him $17,000—nearly half a million dollars today—for his espionage expenses. The lawmakers obliged.
Monday, July 3, 2017
Weiwei - All Leave Hansel & Gretel Digital Breadcrumbs
The Chinese artist-activist Ai Weiwei is nothing if not connected. All through the introductory remarks at the press preview for Hansel & Gretel, the giant art installation about electronic surveillance at the Park Avenue Armory in New York (open through August 6), Ai was busy on his phone...
Hansel & Gretel—the latest in the Armory’s series of huge Drill Hall extravaganzas, whose title indicates that we all leave breadcrumb trails, whether we want to or not—is another collaboration among Mr. Ai and Mssrs. Herzog and de Meuron...
Part 1 of this technology-rich dystopian spectacle occupies the whole of the darkened 55,000-square-foot Drill Hall, which the audience enters not from the Armory’s grand, staircased main entrance, but through an inconspicuous rear door on Lexington Avenue.
Once inside, visitors make their way through almost pitchblack corridors to a ramp that takes them up a few feet to the main attraction: a floor on which are projected their surveilled overhead images, which follow them around like digital puppy dogs.
The images come from dozens of overhead cameras, not the tethered drones buzzing around overhead. The phenomenon undoubtedly inspires awe in a few... The Drill Hall gizmopalooza gives everyone a visceral experience of what it’s like to be watched by unseen forces... more
Hansel & Gretel—the latest in the Armory’s series of huge Drill Hall extravaganzas, whose title indicates that we all leave breadcrumb trails, whether we want to or not—is another collaboration among Mr. Ai and Mssrs. Herzog and de Meuron...
Part 1 of this technology-rich dystopian spectacle occupies the whole of the darkened 55,000-square-foot Drill Hall, which the audience enters not from the Armory’s grand, staircased main entrance, but through an inconspicuous rear door on Lexington Avenue.
Once inside, visitors make their way through almost pitchblack corridors to a ramp that takes them up a few feet to the main attraction: a floor on which are projected their surveilled overhead images, which follow them around like digital puppy dogs.
The images come from dozens of overhead cameras, not the tethered drones buzzing around overhead. The phenomenon undoubtedly inspires awe in a few... The Drill Hall gizmopalooza gives everyone a visceral experience of what it’s like to be watched by unseen forces... more
Spycam News: Docs Know What's Up
The National Healthcare Professionals Association of South Africa has filed papers in the Pretoria High Court
accusing 19 medical aid schemes of spying on doctors and sneaking hidden cameras into their consulting rooms...
The lawsuit specifically named Discovery, stating that the scheme has sent spies and private investigators with concealed video cameras and recording equipment into private consultation rooms without consent. more
accusing 19 medical aid schemes of spying on doctors and sneaking hidden cameras into their consulting rooms...
The lawsuit specifically named Discovery, stating that the scheme has sent spies and private investigators with concealed video cameras and recording equipment into private consultation rooms without consent. more
Saturday, July 1, 2017
Where Smartphones Became Spyware PiƱatas
A spying scandal in Mexico widened after it was confirmed by experts that several of the country’s top opposition leaders — along with journalists and human rights advocates — were targeted by high-tech spyware exclusively sold to governments.
The Internet watchdog group Citizen Lab exposed the scandal (in June) in a report that showed that spyware known as Pegasus had been used in recent years to infiltrate the cellphones of 12 prominent journalists and rights activists, all of whom had been critical of the Mexican government...
The victims received messages with links to the malware, which, when activated, allows outsiders to remotely access a phone’s data as well as activate its camera and microphone. more
The Internet watchdog group Citizen Lab exposed the scandal (in June) in a report that showed that spyware known as Pegasus had been used in recent years to infiltrate the cellphones of 12 prominent journalists and rights activists, all of whom had been critical of the Mexican government...
The victims received messages with links to the malware, which, when activated, allows outsiders to remotely access a phone’s data as well as activate its camera and microphone. more
Business Espionage Cautionary Tale - Bugs, Taps and Now... Drones
Australia - An international drug syndicate used drones to conduct counter-surveillance on police...
"During the investigation phase, this syndicate has used aerial drones to conduct counter-surveillance on police activity," Commander Beveridge said.
"The syndicate was using a drone when they were holding their meetings, to conduct counter-surveillance, to see if anyone, like law enforcement, was watching...
"It did cause the surveillance staff to initiate procedures and methodologies to defeat it. "These syndicates are getting a lot more sophisticated, and so are we. We've just got to be awake to it." more
Murray Associates Industrial Espionage Takeaway Points:
• Even with an upper floor office you are no longer immune to optical surveillance.
• If you have window blinds, use them.
• Make sure computer screens and whiteboards don't face windows.
• Institute a clear desk policy.
• If you see a drone, don't assume it's some hobbyist playing. Take a photo or movie for evidence.
• Be alert. A drone in your parking lot can grab all license plate numbers in a minute. (One of the first warning signs of an espionage attack.)
"During the investigation phase, this syndicate has used aerial drones to conduct counter-surveillance on police activity," Commander Beveridge said.
"The syndicate was using a drone when they were holding their meetings, to conduct counter-surveillance, to see if anyone, like law enforcement, was watching...
"It did cause the surveillance staff to initiate procedures and methodologies to defeat it. "These syndicates are getting a lot more sophisticated, and so are we. We've just got to be awake to it." more
Murray Associates Industrial Espionage Takeaway Points:
• Even with an upper floor office you are no longer immune to optical surveillance.
• If you have window blinds, use them.
• Make sure computer screens and whiteboards don't face windows.
• Institute a clear desk policy.
• If you see a drone, don't assume it's some hobbyist playing. Take a photo or movie for evidence.
• Be alert. A drone in your parking lot can grab all license plate numbers in a minute. (One of the first warning signs of an espionage attack.)
Labels:
#espionage,
#spycam,
advice,
business,
cautionary tale,
drone,
optics
Subscribe to:
Posts (Atom)