Friday, January 26, 2024

China’s Nuclear Battery Powers your Smartphone for 50 Years

A Chinese startup called Betavolt has cooked up this itty-bitty nuclear battery - about the size of a little coin - which they claim can crank out electricity for 50 years straight, with no charging pit stops needed.

As the company leaps from development to the pilot stage, they're gearing up for full-scale production and a grand entrance into the market pretty soon...

Zhang Wei, Chairman and CEO of Betavolt, said in a press release that the BV100 marks a groundbreaking achievement as the world's first mass-produced nuclear battery...

The company also deems these batteries safe for medical devices within the human body, such as pacemakers and cochlear's, with no external radiation. more
Ok, now think of this technology being applied to quick-plant eavesdropping bugs and voice recorders.

Warning As 26 Billion Records Leak: Dropbox, LinkedIn, Twitter Named

via Rob Kleeger, Digital4nx Group, Ltd.

Hold on tight because we've got some major news for you. Brace yourselves for the 'Mother of all breaches' (MOAB) - a breach so massive it's making waves in the cybersecurity world!

Security researchers have just uncovered a mind-boggling database with over 26 billion records, compromising billions of accounts worldwide. Yep, you read that right! This treasure trove of data has been collected from big shots like LinkedIn, Twitter, Adobe, and many more.

Can you believe it? This jaw-dropping database is made up of a whopping 3,800 folders, which means these records were gathered over time to create a mind-blowing 12 Terabyte database. Talk about a digital goldmine! 

Now, here's the important part: some major players have been affected, including Twitter/X (281 million records), LinkedIn (251 million records), Evite (179 million records), and Adobe (153 million records). It's a serious situation, folks.

We don't want you to panic, but it's crucial to take immediate action to protect yourself. 
Here's what you need to do:
1️⃣ Change your passwords for ALL online accounts, especially those linked to the affected organizations.
2️⃣ Enable two-factor authentication wherever possible. Double the security, double the peace of mind! 
3️⃣ Stay on high alert for any suspicious emails, messages, or calls asking for personal information. Don't fall for their tricks!
4️⃣ Keep a close eye on your financial accounts and credit reports. If you spot any unauthorized activity, act fast!
The breach reminds me of this movie clip for some reason... 

Citizens Warned Against Spy's 'Exotic Beauty' Traps

China has warned its citizens against "exotic beauties" seeking to lure them into the hands of foreign spy agencies.


The Ministry of State Security said a Chinese man, Li Si, went to a nightclub while on an overseas trip and was later blackmailed by foreign spies.

The ministry's WeChat post's title read, "Hunting for beauty? You may become the prey". Analysts say such warnings reflect a sense of insecurity among China's leaders. more
Actually, good advice for any business traveler.

Thursday, January 25, 2024

Police Can No Longer Request Ring Doorbell Videos via App

Amazon-owned Ring will stop allowing police departments to request doorbell camera footage from users
, marking an end to a feature that has drawn criticism from privacy advocates.

In a blog post on Wednesday, Ring said it will sunset the “Request for Assistance” tool, which allows police departments and other public safety agencies to request and receive video captured by the doorbell cameras through Ring’s Neighbors app. The company did not provide a reason for the change, which will be effective starting this week. more

Wednesday, January 24, 2024

How To Turn On Apple iPhone’s New Anti-Theft Feature

Apple's 'Stolen Device Protection' tool aims to deter cases of phone theft, but you need to enable it first.

Apple's new ‘stolen device protection' tool, was launched as part of its iOS 17.3 release, and plans to squash instances of phone theft by ramping up security requirements and limiting the amount of data thieves have access to...

Activating Apple's new security mechanism is very straightforward. First you need to enable two-factor authentication for your Apple AI and set up a device passcode, Face ID or Touch ID, Find My, and Significant Locations (under Location Services).

Once you have these up, you need to: 
  • Go to Settings
  • Tap ‘Face ID & PassCode'
  • Enter your device passcode
  • Tap to turn Stolen Device Protection on

Monday, January 22, 2024

Widow: Hugh Hefner Had ‘Little Spy Holes’ to Record Celebs

Crystal Hefner has revealed that her late husband, Playboy founder Hugh Hefner, had camera peepholes in his bedroom and even in the foot of his bed
— where he says he recorded sexual encounters with celebrities and high-ranking politicians, apparently without their knowledge...

The revelation is part of Hefner’s upcoming tell-all book, Only Say Good Things: Surviving Playboy and Finding Myself, which is due out on January 23...

In the book, Hefner adds that Hef, who passed away in 2017 at the age of 91, claimed to have tapes of numerous A-list celebrities and “videos of wild orgies, also with celebrities and politicians and business leaders, some of whom were married.”... It has not been reported what Hef did with all those videos... more

Sunday, January 21, 2024

Flight Attendant Allegedly iPhone's Minors in Plane Restrooms

NBC Boston identified the suspect as 37-year-old Estes Carter Thompson III in its report Thursday, noting authorities launched an investigation after a 14-year-old girl said she found an iPhone taped to a toilet seat lid on a flight from Boston to Charlotte...

The minor told her parents about the incident and they reported that information to other crew members. In addition, the father confronted the suspect who reentered the restroom...

Police met the suspect when the plane landed in Boston and it appeared the suspect’s phone had been reset to factory settings. However, officials reportedly found stickers similar to those allegedly seen in the restroom tucked inside his suitcase.

Thompson’s iCloud account also revealed he allegedly had recordings of victims who were 7, 9, 11, and 14 years old, along with photos of an unaccompanied minor.


Not all spy cameras are this easy to detect. SpyCam detection training is a good idea.

Excellent Video on Early Law Enforcement Spy Tech

On January 18th AWA Wireless Museum published this video. As per its description, “during Mike Murphy’s career he had the opportunity to be involved with the design of law enforcement surveillance radios, and he met some of the colorful personalities who pioneered these controversial technologies. In this presentation Mike tells the story of the people and companies that created surveillance devices that remained secret for decades, some of which still haven’t seen the light of day.”

Friday, January 19, 2024

Weird Spy News: Stool Pigeon Jailed in Vet Hospital

A pigeon caught in Mumbai with a message in an illegible language on its wings has been kept in a hospital for eight months while police investigated.


Bought on 18th May 2023 by RCF Police personnel, due to the message written in red and green on his wings , suspected to be Chinese language, the pigeon has in custody of BSPCA animal hospital ever since... Suspecting the language to be Chinese, police handed it over to the hospital to run a medical test on the bird while they sent the two rings on its leg for a forensic examination to rule out the possibility of it spying in the Indian territory. more

UPDATE: After eight months in state custody, an athlete has been freed from jail following allegations of espionage... An open-water racing pigeon from Taiwan was set free in Mumbai last Tuesday after being held for eight months on suspicion of spying for China. more

CISA & FBI Release Chinese Drone Awareness Paper

Cybersecurity Guidance: Chinese-Manufactured UAS
is a Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) resource that raises awareness on the threats posed by Chinese-manufactured UAS and provides UAS cybersecurity recommendations that reduce risks to networks and sensitive information. This guidance also provides additional resources to augment an organization’s preparedness, response, and resilience.

"The People’s Republic of China (PRC) has enacted laws that provide the government with expanded legal grounds for accessing and controlling data held by firms in China. The use of Chinese-manufactured UAS in critical infrastructure operations risks exposing sensitive information to PRC authorities."  more  / download

A Corporate Espionage Gamble

Ivans Ivanovs, a former employee at OnAir Entertainment, has claimed that the company illegally accessed Playtech’s internal systems for two years.
The illegal access is said to have continued even after Igor Veliks, who was instrumental in the scandal, left his job with Playtech Live Latvia. Ivanovs asserts that Veliks, together with accomplices, made use of unauthorized access to clandestine monitor Playtech’s future games and features...

The impending release of OnAir Entertainment’s ‘Diamond Rush Roulette’, overseen by Veliks, is now under scrutiny amidst these industrial espionage claims. As the legal proceedings progress, Ivanovs pledges to divulge more details concerning the purportedly unethical operations at OnAir Entertainment. more

Corporate Espionage: A Very Basic Cautionary Tale

Aesop’s fable, “the Tortoise and the Hare,” famously warns us about the dangers of arrogance and complacency in the face of a determined adversary. 

Unfortunately, in the modern race for supremacy between the United States and the People’s Republic of China (PRC), it appears that American policymakers and executives have failed to heed this warning, bearing disastrous consequences for industries vital to U.S. national security.

Like the hare, the United States had long enjoyed a substantial lead in developing defense-industrial sectors and innovating dual-use technologies. However, Washington has since rested on its laurels and exposed itself to theft through its lax counterintelligence posture. 

Meanwhile, the PRC — marrying the patience and long-term vision of the fabled tortoise with the remarkable leapfrogging ability enabled by its pervasive industrial espionage — has now caught up and even surpassed the United States across a plethora of key defense and technology sectors. Therefore, if spying and stealing are how the PRC plans to ‘win the race’ in modern strategic competition, the United States can only hope to prevail by investing far more robustly in counterintelligence. more
Maybe this could help.

Ukraine's Security Service Investigates Bihus.Info Bugging

The Security Service of Ukraine (SSU) has announced that it is investigating the circumstances of the illegal bugging and filming of representatives of the investigative journalism project Bihus.Info...

(Numerous of individuals were implicated in monitoring activities, utilizing strategically placed cameras in various rooms. )

On 16 January, a video was leaked online showing employees of the Bihus.Info investigative project apparently using drugs. The project's head, Denys Bihus, recorded a video message giving explanations and stated that everyone who works with Bihus.Info would take drug tests.

Later, Bihus said that after talking to the people involved in the video, it transpired that members of the Bihus.Info editorial team had been under surveillance for about a year, and that fragments of intercepted conversations had been edited together from several episodes that were months apart. more

UPDATE: The media outlet Narodna Pravda, which published an illicitly sourced surveillance video the Bihus.Info team, has removed the video and closed its YouTube channel, Bihus.Info reported on Jan. 19. more

The Future of AI that Never Was (from 2012)

Enjoy the weekend!
The first 1:54 is all you need...

Sunday, January 14, 2024

Grandmother’s Abusers Caught by Hidden Camera

Two sisters caught four care workers abusing their 89-year-old grandmother after hiding a camera in her bedroom...
they put a photo frame with a hidden camera in her room at a care home... 

It caught the workers shouting in dementia sufferer Mrs Wall's face, making fun of her, holding her legs in the air and hitting her in the face with a pillow... "Without the footage we wouldn't have known it was going on let alone prove it happened," she said. more

China Says It Has Detained Spy Working for the U.K.

China has taken into custody an alleged British spy,
the country’s national security agency said, as Beijing steps up warnings over national security and the infiltration of foreign spies in the country.

In a social-media post on Monday, China’s Ministry of State Security alleged that MI6, the U.K. foreign-intelligence service, in 2015 recruited a foreign national surnamed Huang and provided both training and “specialized spy equipment for intelligence liaisons.”

According to the MSS, the British instructed Huang to enter China as a representative of a consulting agency and send back intelligence. The Chinese agency didn’t specify Huang’s nationality or name the consulting firm. more
This is not the first time a business consultant has been detained there on charges of spying.

Recent Spy News

• A Russian man working for a state firm was arrested for allegedly planning to pass sensitive information to Poland in exchange for help in fleeing the country, the security services said Friday. Russian security services have detained a slew of foreigners and its own nationals for working with foreign intelligence since it launched the conflict in Ukraine in February 2022. more

• Algeria caught up in spying drama on the eve of Africa Cup of Nations as police quiz man who flew a DRONE over their training session more

• The sentencing of a US Navy sailor is a window into Chinese espionage. more

• In a decision reflecting rising espionage concerns and a penchant for time-tested technologies, German Chancellor Olaf Scholz has chosen to keep alive the chancellery’s vintage pneumatic tube system. 
This unconventional yet highly functional method of document distribution, planned for phase-out by 2025, has been given a new lease of life. more  However: Researchers have found almost a dozen vulnerabilities in a popular brand of pneumatic tube delivery system more  Fun video clip.

• Belarusian Spy-Nude Model Detained in Poland - Polish state security services arrested a Belarusian OnlyFans model for allegedly engaging in espionage – something that she had admitted to friends while drunk. more

• 20 Best Spy Comedies – From 'Austin Powers' to 'Spies Like Us,' Moviefone counts down the 20 best spy comedies of all time. more

AI is Helping US Spies Catch Chinese Hacking Ops

Artificial intelligence and machine learning technologies are helping the National Security Agency and other U.S. government agencies detect malicious Chinese cyber activity
, a top U.S. intelligence official said in remarks on Tuesday that indicate how U.S. security agencies are using the technology to improve computer defenses. 

Speaking Tuesday at the International Conference on Cyber Security at Fordham University, Rob Joyce, the director of the NSA Cybersecurity Directorate, said that AI is helping his agency detect Chinese operations targeting U.S. critical infrastructure that might evade traditional defensive measures. more

Spy History: When Furbys Caused National Security Fears

In the late 90s, the U.S. National Security Agency (NSA) banned Furbys on its premises over fears they could record and repeat top-secret information.


When it first hit toy stores in 1998, Furby was an immediate sensation. The animatronic furball would eventually be recognized by Time Magazine as one of “History’s Best Toys.” And just as it spiked in popularity among children looking for a new robotic friend, security officials were reportedly concerned over the robot’s potential to record top-secret information.

All such stories stemmed from reporting by The Washington Post. On Jan. 13, 1999, The Post published an article titled “A Toy Story of Hairy Espionagemore

Ivanti Attacks Part of Deliberate Espionage Operation

Researchers warn the previously unknown actor has developed custom malware designed to maintain persistent access on targeted networks and evade detection.

The threat actor behind the monthlong exploitation of Ivanti Connect Secure VPN is conducting an espionage campaign using custom malware with the goal of maintaining continued access to the appliances, according to research released Thursday by Google Cloud’s Mandiant unit. 

Multiple suspected APT actors have used similar methods with appliance-specific malware in order to engage in post-exploitation threat activity and evade detection. However, Mandiant researchers said, at the moment, this exact activity is not linked to a known actor and they don’t have enough information yet to pinpoint the origin. more

Spybuster Tip #629: Delete Apps that are 'Spying' Using 'One Day Rule'

Security experts have explained how your phone apps track and collect your data even if they remain unused, but there's a handy hack to avoid data harvesting and potential spying...

The rule involves simply deleting one unused app a day which the expert says can massively improve your phone efficiency and free up your storage space. Doing this will help you manage how your data is used and stop it from being harvested...

To delete an app on the iPhone, find the app on your home screen, touch and hold down the icon and tap "Remove app." If you are an Android user, go to the Google Play store, tap the profile icon in the top right, and go to Manage Apps and Devices > Manage. Tap the name of the app you want to delete and choose to uninstall. more

Sunday, January 7, 2024

Download a Free 2024 Chinese Espionage Calendar

Looking for that perfect addition for your office? 
A year long reminder of the threat? 
Download and print a 2024 Chinese Espionage Calendar for that special counterintelligence or insider threat specialist. 
Complementary. (No info requested.)


Friday, January 5, 2024

Eavesdrops on Retail Workers Through Walkie-Talkie

TikTok user Michael (@mister_twister_55) is known for listening in on various stores’ walkie-talkie systems and sharing those conversations with his 67,000 Followers...


Previously, he filmed himself using a walkie-talkie to eavesdrop on Kohl’s employees talking about their co-workers. Before that, he tapped into Target’s walkie-talkie system, capturing employees uncovering a potential thief.

Now, in another viral video with over 176,000 views, the infamous TikToker has camped in the parking lot of a strip of retail stores, including the Express Factory Outlet and an Old Navy, capturing employees talking about customers.

The video begins with the TikToker sharing, “Retail worker complains about annoying customer on walkie.” ... As the conversation unfolds, it is apparent that the first employee has contacted the second employee to check on backstock, additional inventory that is not on the store floor, on behalf of the customer, but they are both hesitant because of the customer’s behavior.

“I want to say we do have them in the back but…” says the second employee before trailing off. The first employee, chimes in, “If you do find the jacket back there, or whatever they are looking for, I wouldn’t even bring it out .. because they pissed me off.more

5 Steps for Preventing & Mitigating Corporate Espionage

via Evan Gibbs, Will Taylor, Partners, Troutman Pepper
There has been a steady increase in the volume of incidents involving corporate espionage, especially matters in which an insider is the bad actor. In an era when such risks are escalating, protection of sensitive corporate information has become paramount.

Here are five key strategies companies should implement to prevent and mitigate corporate espionage. (summary...)
  1. Insist on Nondisclosure Agreements
  2. Know and Control Your Trade Secrets
  3. Perform Due Diligence
  4. Train Your Employees and Independent Contractors
  5. Promptly Investigate Suspected Activity

Preventing and mitigating corporate espionage requires a multifaceted approach. By implementing rigorous legal safeguards, conducting thorough due diligence, using secure communication practices, providing comprehensive employee training, and responding promptly and effectively to suspected activity, companies can significantly enhance their protection against corporate espionage and safeguard their assets. more

UnitedHealth Group Sues Ex-Executives Over Alleged Corporate Espionage

In a twist of corporate intrigue,
health care entrepreneurs from Minnesota, Ken Ehlert and Mark Pollman, find themselves locked in a legal duel with their former employer, UnitedHealth Group... 

The lawsuit alleges that Pollman managed to secure a hard drive crammed with sensitive files during an informal lunch rendezvous with a former subordinate... 

The lawsuit states that the former executives amassed 500,000 emails and files, brimming with confidential information and trade secrets, and leveraged them to conceive a suite of corporate entitiesmore

Spybuster Tip # 823: Store Your Car Key Fobs in a Metal Can

Thieves have perfected the art of stealing the code from that key fob sitting on a kitchen counter or hung on a hook by the door. And tools that make theft fast and easy can be purchased on the internet. Worse, the latest theft devices allow criminals to amplify a vehicle's radio signal so that thieves can better access and copy the key fob signal to steal a vehicle...

The Relay Attack, a two-person attack, is when a thief walks up to the victim’s home with a piece of equipment that captures the signal from the key fob and then transmits the signal from a car key fob. "An accomplice waits nearby at the car door, usually with another device, to open the car when the signal is received," the AARP website said. The copied signal can fool the car into starting the ignition.

Spybuster Tip #823: Store your car key fobs in a metal container when not in use.
Your other fobs are at risk too. Learn more here.

Disney’s AI CCTV

Disney wants to know what you’re up to in the “Happiest Place on Earth.”

The company wants to patent a system for “predicting need for guest assistance,” which would track guests’ behavior at Disney properties using machine learning analysis of video data. Disney’s filing lays out an AI-based system which determines whether or not a guest’s behavior is normal, and uses that to predict if they need something. 

Disney’s system would work in tandem with CCTV systems collecting a constant stream of video data. That data is fed to a deep learning model to determine if a guest’s actions differ from a predetermined set of “normal guest behaviors.”

If a guest’s behavior is deemed abnormal, the system will alert the operator that they may need some kind of assistance.



Your Smartphone: More Attentive Than Your Spouse?

via Joshua Brustein - Bloomberg Tech Daily
Eavesdropping ads: People have been telling me for years that their phones are listening to their conversations and sending them ads based on what they say. I've dutifully told them there’s no evidence this is a thing, which often turns into a long argument.

So I appreciated 404 Media’s scoop that Cox Media Group tells clients it actually can tap into the microphones of mobile devices to target ads. 

This sounds like the worst idea ever. But I’m at least looking forward to helping confirm my friends’ worst fears rather than trying to dissuade them.

Monday, January 1, 2024

A Corporate New Year's Resolution - Detect Espionage Easily

Intelligence collection is a leisurely process.
Enemies quietly collect long before they use. 
Until they use what they have gathered, no harm is done. Knowing this gives you the edge.

• Electronic Surveillance is not the goal. It is a means to an end.
• Electronic Surveillance is a key component of intelligence gathering.
• Electronic Surveillance is the one spy trick which is easily detectable, if you look for it.

Protection Requires Detection
Technical Surveillance Countermeasures (TSCM) audits exploit weaknesses inherent in electronic surveillance. Knowing you are being targeted provides you with time to counter - before your information is used against you; before harm is done.

All businesses need TSCM as their canary in the mine shaft
Click here to learn more... counterespionage.com