David Sherborne, who was representing Ms Hurley said in the written submission that she was left feeling “shocked and mortified” by the alleged targeting. He said a private investigator, acting on behalf of the Mail on Sunday, hacked their phones, tapped landlines, placed “a sticky window mini-microphone on the exterior of her home window” and bugged Mr (Hugh) Grant’s car to obtain “private communications with Mr Grant, her financial details, her travel arrangements and medicals during her pregnancy and birth of her son”. more
Thursday, March 30, 2023
Liz Hurley Left 'Mortified' After Media Bugged Devices, Court Heard
David Sherborne, who was representing Ms Hurley said in the written submission that she was left feeling “shocked and mortified” by the alleged targeting. He said a private investigator, acting on behalf of the Mail on Sunday, hacked their phones, tapped landlines, placed “a sticky window mini-microphone on the exterior of her home window” and bugged Mr (Hugh) Grant’s car to obtain “private communications with Mr Grant, her financial details, her travel arrangements and medicals during her pregnancy and birth of her son”. more
Arizona Bill to Make Drone Spying a Crime Moves Forward
In a party-line vote on Wednesday, members of the House Commerce Committee approved legislation that would make it a criminal offense to intentionally photograph, tape or otherwise observe someone else in a private place where that person has a “reasonable expectation of privacy.”
The only thing is that there hasn’t been a consensus as to when exactly someone crosses that line. more
Prosecutors: Veteran Deputy was Listening in on Jury Deliberations
According to Assistant District Attorney Kelly Wolford, the jury was deliberating a felony case when Broadwell listened in on the conversation. The eavesdropping charges brought against Broadwell relate to his use of a device to enhance the sound of people talking in his area.
Inaudible Ultrasound Attack Can Control Phones and Smart Speakers
“Is this a bug?” (updated)
Usually the answer is, “I understand why you are asking is this a bug. Some bugs do look similar to this. But, here is what you actually found.”
Real electronic eavesdropping devices are getting smaller. So are lots of other little electronic bits which are part of our everyday lives. Distinguishing between the two can be tricky. If the object you found makes you think, is this a bug, keep reading. You stand a good chance of finding your answer here.
Weekend Project - Two-Tube Spy Transmitter
Saturday, March 25, 2023
Bad Bunny - Not Your Recording - Bad Bunny
Journalist Plugs in Unknown USB Drive Mailed to Him
In case you missed our memo...
USB Memory Security Recommendations
- Block ports with a mechanical port block lock.
- Place security tape over that.
- Create a “no USB sticks unless pre-approved” rule.
- Warn employees that a gift USB stick could be a Trojan Horse gift.
- Warn employees that one easy espionage tactic involves leaving a few USB sticks scattered in the company parking lot. The opposition knows that someone will pick one up and plug it in. The infection begins the second they plug it in.
- Don’t let visitors stick you. Extend the “no USB sticks unless pre-approved” rule to them as well. Their sticks may be infected.
Trending… IBM Takes The USB Memory Security Lead
“IBM has allegedly issued a worldwide ban against the the use of removable drives, including Flash, USB, and SD cards, to transfer data.
This new policy is being instituted to prevent confidential and sensitive information from being leaked due to misplaced or unsecured storage devices.
According to a report by The Register, IBM’s global chief Information security officer Shamla Naidoo issued an advisory stating that the company “is expanding the practice of prohibiting data transfer to all removable portable storage devices (eg: USB, SD card, flash drive).” This advisory further stated that this policy is already in effect for some departments, but will be further enforced throughout the entire company.” more
Spy Headlines this Week
• Facing spying claims, Mexico recorded phone call of prominent activist more
• The Spy Law That Big Tech Wants to Limit more
• Your refrigerator could be spying on you! Senate committee clamps down on smart devices more
• Greek intelligence allegedly uses Predator spyware to wiretap Facebook Security Manager more
• Spying, cocaine, money-laundering, historic losses: The sordid tale of the fall of Credit Suisse more
• Fox News producer was forced to spy on Maria Bartiromo, who execs called 'crazy,' more
• ESPIONAGE BOOK RECOMMENDATIONS FROM A FORMER CIA SPY more
Friday, March 17, 2023
Getting Clocked Can Disable Your Wi-Fi Cameras
Watch Functions
- Deauther Attack: Disconnect 2.4G WiFi
- Deauther Beacon: Create fake networks
- Deauther Probe: Confuse Wi-Fi trackers
- Packet Monitor: Display Wi-Fi traffic
- Kicks devices off a WiFi network- Spam beacon frames
- Spam probe requests
Additional background information about deauthentication attacks via Atlas VPN...
A deauth or deauthentication attack (DoS) disrupts connections between users and Wi-Fi access points. The attackers force devices to lose access and then reconnect to a network they control. Then, perpetrators can track connections, capture login details, or trick users into installing rogue programs... this attack does not need unique skills or elaborate equipment. Deauth attacks could also knock devices offline, like home security software.
How it it Used?
• Forcing hidden cameras to go offline. Over the years, frequent disputes forced Airbnb to forbid the use of cameras in rented apartments or rooms. Yet, more cunning homeowners can conceal cameras from their guests.
• Hotels that push paid Wi-Fi. There have been incidents when hotels employed deauthentication attacks to promote their Wi-Fi services. In fact, the Federal Communications Commission (FCC) issued documents stating that blocking or interfering with Wi-Fi hotspots is illegal. One of the first offenders was the Marriott hotel, with financial motives for disrupting visitors’ access points. However, charging perpetrators with deauthentication attacks is a rare sight. Usually, victims might blame the interruptions on unstable Wi-Fi.
• Susceptible smart devices. Criminals could push connected devices offline for several reasons. One danger is that attackers might disable security systems. Thus, such interruption halts monitoring of the home, office, or another area. In worst-case scenarios, such deauth attacks could facilitate burglars entering buildings. Another example comes from a vulnerability in Ring Video Doorbell Pro (now fixed). The exploited flaw means using a Wi-FI deauthentication attack to force the device to re-enter the configuration mode. Then, eavesdroppers can capture Wi-Fi credentials orchestrated to travel in an unencrypted HTTP.
• Forcing users to join evil twins. Spoofed deauthentication frames force targeted devices to drop their connection. It could be a way to break the legitimate connection and trick users into joining fake hotspots. Deauth attacks could flood the access point so that devices cannot join for a period of time.
Our Tips: How to Make Sure They Don't Disable Your WiFi Cameras
Tip 1. Don't go wireless, use Cat6a shielded cable.
Tip 2. Use Power over Ethernet (PoE). Make sure it is properly grounded.
Tip 3. Make sure the power supply to the network is backed-up (UPS). Power failures do happen.
Tip 4. Hide the cables to deter sabotage.
Tip 5. If you absolutely, positively need a wireless video solution consider using a 4G cellular camera, or a dedicated video link.
WiFi Camera Attack Prevention
The prevention of deauthentication attacks does not offer many options. But there are effective strategies for mitigating their impact. Ensure that your network applies WPA2 encryption. If you use a pre-shared key, it must be complex and lengthy to withstand threats like brute-force attacks. Another improvement might be 802.11w, which validates deauthentication frames and discards spoofed ones. Older hardware and IoT might not support it, raising issues for some Wi-Fi clients.
Furthermore, remember you have minimal control over free public Wi-Fi and its security.
A VPN can assist if deauthentication attacks force clients to connect to evil twins. Atlas VPN creates a secure path between users and access points. Encrypted traffic will prevent attackers from capturing any meaningful communications or data. more
Wednesday, March 15, 2023
Researchers Shrink Camera to the Size of a Salt Grain
Spy History: Evolution of Aerial Spying Over the Past 200 Years
The Pentagon said it was there gathering intelligence. China said it was doing civilian research. Regardless, it was nothing new.
Governments have been spying on each other for hundreds of years...Here's how surveillance from the sky has developed over the years...
The first record of aerial surveillance happened toward the end of the 18th century. During the Revolutionary War, the French successfully used hot air balloons to monitor combat during the Battle of Fleurus against Britain, Germany, and Holland. more
From Phone Bugging to Kidnapping...
...these are the biggest security concerns of the super-rich...Armed burglaries, kidnapping, offshore bank account hacking - when it comes to security risks of the super-rich, nothing is off the cards.
‘UHNWs often have unique security concerns due to their wealth and high profile’, says David Webb, Managing Director at Valkyrie, a specialist security consultancy firm. ‘These issues are not just specific to them but can also involve their families and close friends...
KamiKakaBot: Corporate Espionage & Eavesdropping Tool
Dark Pink's main goals were to conduct corporate espionage, steal documents, capture sound from microphones of infected devices, and exfiltrate messaging data, according to research by cybersecurity firm Group-IB. more
UK: No More Mr. Nice Guy, Spy
According to the report, a new department of national security will be established within MI-5. Its goal will be to advise companies, research organizations, and universities that may be victims of industrial espionage. In addition, private and public entities will be able to contact the new body for advice on how to interact with partners from China and or how to safely use Chinese-made equipment...
Spy Coffee and You're In
On Monday, the Tarpon Springs Police Department said a customer was using the men’s restroom at the “We Spy Coffee & More” shop, located at 505 Dodecanese Blvd., when they noticed they were being recorded by a camera placed underneath the sink.
“it was an iPhone that was propped underneath the sink and it was upside down. He picked the phone up and he looked at it and he saw that it was actually actively making a video recording,” said Detective John Melton.
Friday, March 10, 2023
From Those Wonderful Folks Who Brought You Spy Balloons & Trojan Horse Cranes...
Months before a Chinese spy balloon drifted across Alaska and Canada, the Canadian military discovered and retrieved Chinese spy buoys in the Arctic, a region of long interest to Beijing. The Chinese buoys were monitoring U.S. submarines and the melting of ice sheets. Retired Canadian Armed Forces (CAF) Lieutenant-General Michael Day said the buoys would likely have been used to monitor U.S. nuclear submarine traffic in the Arctic, and for mapping seabeds and ice thickness. more
How to Spot a Chinese Spy on Social Media
There are a few things to look out for if you think you’re being targeted on social media.
- Urgency: Be cautious of anyone who connects on social media and makes it seem like they need information quickly.
- Do your research: Be skeptical of anyone who claims to be part of a company or think tank where there is little or no information available on the organization.
- Probing questions: Be wary of social media accounts that connect and follow up with a lot of questions pertaining to industry specifics.
Both experts said it’s best to follow the old adage: if the offer sounds too good to be true, then it probably is. more
Odd-Ball Spy News
Sweaters That Fool Facial Recognition
Famed Manhattan Showroom Loses Peephole Camera Appeal
Manhattan appeals court on Thursday revived the brunt of a lawsuit against the renowned New York Design Center over a video camera... Cast your mind back to 2014... A camera hidden in the wall of a ladies' room at the New York Design Center secretly documented customers and employees for a month, a new lawsuit alleges. According to court documents obtained by the Post, the camera was found behind a broken wall tile on the sixth floor bathroom in April; the custodian who discovered it said it was trained on one of the stalls. more
Who Is Anthony Pellicano?
Infamous Hollywood private investigator Anthony Pellicano is the subject of a new documentary Sin Eater: The Crimes of Anthony Pellicano. The two-part special debuts on March 10 at 10 p.m. on FX and will stream on Hulu. Pellicano...gained a reputation as a fixer who could dig up dirt on his clients’ enemies to make them go away. But Pellicano’s ruthless methods were eventually his undoing, as he served extensive prison time for weapons charges as well as racketeering, wiretapping, and other crimes. more & as previously reported here.
Chinese Rocket that Delivered Military Spy Satellites Breaks Up Over Texas
The second stage of a Chinese rocket that delivered a trio of military surveillance satellites in June disintegrated over Texas on Wednesday, USNI News has learned. The four-ton component of a Chang Zheng 2D ‘Long March’ rocket punched through the atmosphere on Wednesday over Texas at 17,000 miles per hour and disintegrated, two defense officials confirmed to USNI News on Thursday... The debris field is over the least populated counties in the state, according to the Texas Demographic Center. more
The 10 Best Spy Movies That Aren't James Bond
When it comes to pure action-packed entertainment, few genres serve up as many thrills as spy movies. Spy films have been a mainstay of cinema all the way back to the medium's earliest days, like 1914's silent film The German Spy Peril. The genre kicked into high gear during the Cold War... more
After six years of catering to secret agents and curious spies across Chicago, a spy-themed establishment has closed its doors. SafeHouse Chicago, a restaurant and bar featuring all things espionage-related, announced its abrupt closure online Monday, saying the business has "completed its last mission in Chicago." "We want to thank all of the spies who visited our Windy City headquarters and for your loyalty and support. It has been an absolute pleasure to welcome and serve spies from around the globe," SafeHouse said, in part, in a message posted on its website. more
Monday, March 6, 2023
A New National Cybersecurity Strategy
The White House on Thursday unveiled a new National Cybersecurity Strategy to make cyberspace more secure for Americans. The new policy puts the onus on tech firms and large organizations to make their systems more secure, so that they are better able to resist the increasingly more sophisticated cybersecurity threats from around the world.
Explaining its stance, the Biden administration said that the "organizations that are most capable and best-positioned to reduce risks" should do more to ensure the online safety of American citizens rather than shifting the burden of cybersecurity to individuals, small businesses, and local governments. more
Legal Claim: Glimpse into World of Corporate Espionage
Through its lawyers Kroll said that it had “acted entirely in accordance with all applicable laws and regulations”, that Earl’s claim was “misconceived” and that the company denied the claim in full. Jones Day did not respond to requests for comment.
Whether or not the legal claim against Jones Day or Kroll succeeds, the case, and emails disclosed in it, provide a rare glimpse into the murky world of corporate espionage and reputation management – and the lengths to which some companies will go to try to silence critics. more
Spy Bots: Last Month, Balloons - This Month, Trojan Horse Cranes
History: Early Anti-Eavesdropping / Wiretapping Invention
Wiretapping telegraph lines was a known problem back then. Problem was... it was risky, detectable, and the tap always lead to the tapper. In some instances, all this could be circumvented by simply eavesdropping. If one could hear the telegraph clicking—and knew code—one could jot down the message, just like the telegraph employee.
This is how the problem was solved...
Non-Disclosure Agreements That End Up in the Toilet
Contract Summary
NDA is an edible non-disclosure agreement that protects in perpetuity all information exchanged within 30 minutes of ingestion. Every NDA is comprised of a size 00 gelatin capsule imprinted with a QR code leading to this website and filled with powder made from copies of this agreement printed onto rice paper with ingestible ink. NDA can be executed by any number of people at once. Simply provide every party with their own capsule before executing the agreement. Parties can extend the duration of effect by consuming additional NDA. more
Saturday, March 4, 2023
"Technical Surveillance Countermeasures Market (TSCM) Is Likely to Experience a Tremendous Growth by 2029"
TSCM, also referred to as digital bug sweeping, entails detection and identification of the presence of technological surveillance hazards and devices, including hidden microphones, cameras, or other electronic devices. It offers thorough instrumented, and, physical and visible evaluation of a facility's technical security status. This system not only detects and locates espionage devices, however, additionally identifies various regions, where an enterprise has a risk factor to lose any vital information through illicit eavesdropping devices or systems such as electronic bugs, hidden cameras, listening devices, cellular interception, Bluetooth interception, burst transmitters, laser microphones, among other devices. more
The Secret, Insecure Life Of Security Cameras
Corporate Espionage
A more serious threat with smart cameras is that hackers can use them to spy on a company through video and audio feeds.
Sophisticated hackers can use this type of access to monitor susceptible areas in the company, such as boardrooms, executive conference rooms and manufacturing facilities. I’ve recently seen over half a dozen corporations compromised this way. The hackers remained undetected for years while they had direct access to important meetings and manufacturing operations.
Sneaky Data Theft
Smart cameras also make it harder for companies to detect stolen data leaving their networks. In a typical IT attack, hackers run the risk of getting caught when they try to exfiltrate data from the network. However, cameras and other types of IoT are a prominent blind spot for IT teams since they typically don’t monitor the cameras’ network traffic or block them from connecting to new IP addresses. This makes cameras a perfect conduit for data theft. more
Russian Spy Plane Destroyed With Help of Toy Store Drone
Cruise Ship Employee Busted - Spycaming in Women’s Bathroom
“This man was in the women’s restroom located at the kids club,” the victim, identifed only as Saja, captioned the disturbing clip.