Friday, March 28, 2025
This Week in Corporate Espionage News
• Deel and Rippling corporate espionage case takes a turn as accused ‘spy’ agrees to cooperate
• US is increasingly vulnerable to espionage threats, analysts warn
• Former Spy: Unstoppable AI-Powered Threats Target All
• Russian espionage group focused on corporate espionage, mainly targeting organizations in the US
• North Korea hackers go after business executives in latest info-stealing scheme
• DOGE Purge Is Boosting China’s Espionage Activities Against U.S.
• '$35 million gone in one call': Deepfake fraud rings are fooling the world's smartest firms: Impersonating CEOs for wire fraud to creating fake hostage videos for extortion
This Week in Spy News
Man Charged with Installing Eavesdropping Device
A Missouri man was charged with installing an eavesdropping device in an Oak Grove home Wednesday night.
Alvarez reportedly claimed he put in the camera due to things being stolen and said it was not hidden. more
A Chinese Spy Network is Targeting Former US Officials Laid Off by Musk and Trump
Student: Allegedly Secretly Recording Videos in Girls' Restroom
The most recent incident occurred on Feb. 25, but warrants reveal the teen is accused of similar actions at least 13 times since October 2024.
According to a police report, the 17-year-old male student entered the girls’ restroom and took a picture or video of a 17-year-old female student without her consent. Investigators collected the student's cell phone as evidence.
Officials credited a student's vigilance in reporting the incident, which led to swift action by administrators. more
Not So Secure: Drones Can Now Listen to Underwater Messages
Researchers from Princeton and MIT have developed a method to intercept underwater communications from the air, challenging long-standing beliefs about the security of underwater transmissions.
The team created a device that uses radar to eavesdrop on underwater acoustic signals, or sonar, by decoding the tiny vibrations those signals produce on the water’s surface. In principle, the technique could also roughly identify the location of an underwater transmitter, the researchers said. more
Cool Spycraft at the Tip of Your Finger
This is a Near-Field Communications (NFC) chip. Very small. Very thin. NFC is a short-range wireless technology that enables data exchange between two devices within ~4 cm. The chip contains a small amount of memory, a radio antenna, and a controller. It can be operated in one of two modes.
- Passive: No battery, powered by the electromagnetic field from the reader.
- Active: Has its own power source and can initiate communication.
1. Covert Information Drops
• The chip links to a hidden or encrypted file or payload.
• Handler taps the object with a phone to retrieve information without direct contact.
2. Target Tracking
• Spy plants an NFC tag on a person or vehicle.
• The chip contains a unique ID or triggers background logging when scanned by compromised devices.
• Useful in tight surveillance environments.
3. Access Credential Spoofing
• Clone an NFC badge or card to gain unauthorized access.
• With a reader and software, a spy can harvest data and replicate a target’s access card.
4. Payload Delivery
NFC chip programmed to:
• Open malicious URLs.
• Trigger phone actions (e.g., Bluetooth pairing, contact injection).
• Launch scripts on rooted devices or with social engineering.
• Planted in public items (posters, flyers, seats, hotel room items).
5. Dead Drops with Geofencing
• NFC chip triggers a secure drop message only when tapped in a specific location.
• Adds plausible deniability; nothing visible unless in context.
6. Asset Authentication & Deception
• Tag gear or documents with NFC chips claiming authenticity (e.g., fake origin metadata).
• Alternatively, verify real gear during handoff using known chip signatures.
7. Remote Trigger Mechanism
• NFC tag acts as a trigger for another device (e.g., when tapped, it signals a hidden recorder to start transmitting).
Monday, March 24, 2025
FutureWatch: Sophisticated & Smart Surveillance Electronics To Become Smaller and Cheaper
The MCU packaging is only 1.38 square millimeters in size... TI says the product is aimed at small products including medical wearables, earbuds, stylus pens and electric toothbrushes. The product includes a 12-bit analog-to-digital converter and has 16KB of flash memory and 1KB of SRAM and runs at 24MHz...
TI says the microcontroller costs 20 cents per unit in quantities of 1,000, which means a company could get an army of robot spiders project started for as little as $200.
Vinay Agarwal, vice president and general manager of MSP Microcontrollers at TI: "With the addition of the world's smallest MCU, our MSPM0 MCU portfolio provides unlimited possibilities to enable smarter, more connected experiences in our day-to-day lives."
William Luk, a consultant and technology expert at Quandary Peak Research, said the MCU shrinkage opens up opportunities in areas where miniature devices weren't previously possible.
"One of the important verticals for micro-devices is in healthcare and surgical: smart pills, embedded sensors, or even surgical devices that can reach places like never before," Luk said. more
Bank of Ghana - Planted Spy Devices at Home
The claim follows a controversial search conducted by National Security operatives at Dr Addison’s residence, which Minority Leader Alexander Afenyo-Markin condemned, alleging that personal belongings, including cash and jewellery belonging to Addison’s wife, were seized.
However, Rtd. Col. Aboagye insists that the operation was based on credible intelligence suggesting Dr Addison had set up surveillance devices that enabled remote monitoring of BoG activities.
Speaking on TV3, he stated, “Monitoring is a very diplomatic word. This is spying, this is surveillance,” adding that sources within National Security had confirmed the presence of such “back door electronic devices” at Addison’s home.
He emphasized that no former BoG Governor had the authority to install systems that allowed remote oversight of the bank’s operations. more
"The Wildest Stories of Corporate Espionage We've Ever Heard"
Video Podcast Episode 689: Sam Parr ( https://x.com/theSamParr ) and Shaan Puri ( https://x.com/ShaanVP ) break down the craziest stories of corporate espionage in history. — Show Notes: (0:00) Rippling vs Deel (10:21) The British East India Company (17:11) Oracle vs Microsoft (21:28) Coke vs. Pepsi (24:14) Uber vs. Waymo (26:03) U.S. Intellectual piracy (28:10) Wiz sells for $32B (39:40) A case for Glassdoor (45:54) Marc Lore's new thing (51:52) Money, Status, Power
Using Drones for Peeping, Burglaries on Rise: “It’s Gotten Dramatically Worse”
Illicit drone use has not only continued despite states passing strict laws but in recent years has proliferated, says Mike Fraietta, an FAA drone pilot and founder of security company Gargoyle Systems. Drone security systems are on the rise as companies and event producers look to secure their airspace. Professional, military-grade drone-detection systems — the kind used for sporting events, for instance — can cost about $200,000...
Drones are typically detected by their noise or the radio frequency (RF) an operator uses to pilot the craft. Fraietta says the technology is innovating in three ways: using AI to program portions of a preplanned flight path instead of relying on RF, making drone wings quieter, and using a wire like a kite string. “A tethered drone sounds silly at first,” he says. “But they’re fiber optic wires that also allow for 4K streaming, and the drone is not detectable by the police looking for a radio frequency. So they’re able to get away and move drones a lot quicker and quieter than a year ago.” Such teathers can literally be miles long. more
Notes From ‘Watchers’ of Spy Kim Philby Made Public
In daily bulletins submitted to MI5 in November 1951, undercover operatives describe how Philby, codenamed Peach, moved about London...
Philby spent 25 years in Moscow, instructing trainee spies in the techniques of “tradecraft”. When he died, in 1988, he received full KGB honours. more
An El Cheapo Laser Listener (<$30.)
RIP: Oleg Gordievsky, KGB Spy Who Defected to the UK - 86
Dr. Seuss on Surveillance
Dr. Seuss wrote a story about a Hawtch-Hawtcher Bee-Watcher who had a rather peculiar job. He was tasked with keeping an eye on his town’s only lazy bee.
The idea was that if a bee is watched, it’ll work harder, right?
Well, guess what? That didn’t seem to work at all! So, they decided to assign another Hawtch-Hawtcher to watch the first one, and then another to watch the second… and so on. Before you know it, the entire town was watching each other watch a bee!
Thursday, March 20, 2025
HR Tech Firm Sues Rival for Corporate Espionage
Former Council Candidate Bugs Town Hall
John Garate, 50, was arrested by Davie police on Dec. 19 after they caught him leaving Town Hall with a recording device he secretly placed in a conference room the day before, according to an arrest report.
...the recording shows Garate entering the conference two hours before the Dec. 18 meeting. After he left Town Hall, but before the meeting, police checked the conference room and “verified that a device was placed on the bookshelf.”
The next morning, after the meeting, Garate returned to Town Hall, entered the conference room, picked up the device and was stopped by police as he was leaving. “During the search incident to arrest, in the defendant’s pocket was a black device with a USB attachment,” the police report states.
John Garate, 50, was arrested by Davie police on Dec. 19 after they caught him leaving Town Hall with a recording device he secretly placed in a conference room the day before, according to an arrest report. more
AI is Watching You Drive, And it Knows More Than You Think
- AI traffic cameras are becoming widespread, detecting violations like texting or not wearing seat belts.
- Location determines enforcement methods, with some countries automating citations while others involve human officers.
- AI cameras can improve road safety by catching distracted drivers, but data security, accuracy, and bias concerns remain.
As you drive past, the camera snaps a high-resolution photo of your car. These images capture the license plate, front seats, and “driver behavior.” Then, AI software analyzes the image to detect violations, like if you’re holding a phone or riding without a seat belt.
- Acusensus heads-up system snapshot of a passenger not wearing a seatbelt.
If they decide you are breaking the law, you get a ticket. If not, the image is deleted. more
Sunday, March 16, 2025
Book: In the Shadow of Giants: A true story of corporate espionage... by Liam Monclair
At the heart of modern power struggles, In the Shadow of Giants follows the extraordinary journey of Liam Monclair, a security and strategy expert. This gripping narrative, blending memoir and thriller, opens the door to a unique and little-known universe—corporate espionage, geopolitical manipulations, and cultural tensions—spanning from the skyscrapers of Shanghai to the streets of Jakarta and the vast deserts of the Middle East.
From the escalation of a fierce conflict between Altéone Group—a French multinational—and Wang Industries, a Chinese giant led by the enigmatic Mr. Wang, to high-stakes missions in Iraq and the protection of a football star in dangerous zones, the author unveils the inner workings of a demanding world.
Based on a true story, In the Shadow of Giants is both a tribute to those who work behind the scenes and an exploration of a life lived on the edge. Masterfully blending suspense and thought-provoking insights, it takes readers deep into the hidden reality of an extraordinary existence. more
The Atlas of Surveillance
The Atlas of Surveillance, which documents police surveillance technology across the US. See how your city is spending its money.
FutureWatch: Acoustic Eavesdropping with Multi-Antenna mmWave Radar
RIP: Mark Klein, AT&T Tech, NSA Check - 79
Mark didn’t set out to change the world. For 22 years, he was a telecommunications technician for AT&T, most of that in San Francisco. But he always had a strong sense of right and wrong and a commitment to privacy.
Mark not only saw how it works, he had the documents to prove it.
When the New York Times reported in late 2005 that the NSA was engaging in spying inside the U.S., Mark realized that he had witnessed how it was happening. He also realized that the President was not telling Americans the truth about the program. And, though newly retired, he knew that he had to do something. He showed up at EFF’s front door in early 2006 with a simple question: “Do you folks care about privacy?” more
RIP: Peter Sichel, Spy Turned Wine Guy -102
Peter Sichel was a shrewd observer, a skill that served him as both spy and marketing genius.
As a U.S. intelligence officer in occupied Berlin in the aftermath of World War II, the German-Jewish immigrant put Western fears to rest when he concluded that the Soviet Union did not intend to launch a military invasion of West Germany.
Later, after he’d grown disenchanted with espionage, Sichel took over his family’s wine business. Realizing that most Americans in the late 1950s had little knowledge of wine, he determined that they’d be drawn to something simple. He chose Blue Nun, a slightly sweet German white his family had been making since the 1920s, and the brand became ubiquitous. At its peak in 1984, it sold 30 million bottles... more
Tuesday, March 11, 2025
Hackers are Taking Aim at Board Directors
“Often times they’re targets, especially for public companies, where their profiles are out there,” he said during a virtual conversation on Thursday hosted by Fortune in partnership with Diligent for The Modern Board series.
Lish added that he’s even seen an increase in the mailing of physical ransom letters to board directors and company executives. “How do they stay protected in their personal lives?” he said. “Because threat actors will try to do reconnaissance.” more
Secret Commands Found in Bluetooth Chip - Used in a Billion Devices
According to researchers at the cybersecurity firm Tarlogic, a hidden command has been found coded into a bluetooth chip installed in devices around the world. This secret functionality can be weaponized by bad actors and, according to the researchers, used as an exploit into these devices.
Using these commands, hackers could impersonate a trusted device and then connect to smartphones, computers, and other devices in order to access information stored on them. Bad actors can continue to utilize their connection to the device to essentially spy on users. more
Chinese Spy Balloon Packed with American Tech
The discovery of a satellite communication module, sensors and other tech from at least five American firms underlines the failure of U.S. efforts to restrict exports of technology that could have military uses to main adversary China as well as to countries such as Russia and Iran. It also raises questions over the role of private companies that sell their equipment globally in keeping control over the ultimate users of dual-use technology that can have defense applications as well as civilian uses.
A Chinese patent reviewed by Newsweek describes a communications system for exactly such a balloon as the one that crossed America, based on using a satellite transceiver from a U.S. company that the balloon’s controllers in China would use to communicate with it and that would send data back, and that is easily available online. more
1984 or 2025 - What the Flock?
Flock Safety, a maker of license plate-reading cameras, is said to be valued at $7.5 billion — a 56% increase from a year ago — in a funding round to be led by Andreessen Horowitz. The startup plans to raise $250 million. more
Not everyone is thrilled, and the courts have not weighted in yet. When they do, it will be boom or bust.
2025 Canadian Technical Security Conference (CTSC)
Tuesday May 06, 2025 to Thursday May 08, 2025
Arrival Monday May 05, 2025
Conference Venue
Banff Centre for Professional Development
Kinnear Centre for Innovation
107 Tunnel Mountain Drive, Banff, Alberta Canada T1L 1H5
Conference Theme:
The Future of Technical Security: Adapting to a Changing Threat Landscape
Defensive resources, tools, countermeasures, and technologies are available. That is why, you need to attend the Canadian Technical Security Conference to hone an up-to-date awareness of the threat environment, countermeasures, tools and a better understanding how to make the best use of them. Moreover, not only will you learn from experts but you can become part of a community that pulls together against the threat operators to share information and best practices.
History: Spies and Informants | A 60 Minutes Marathon
Wednesday, February 19, 2025
Spy Cam News: 2024 Singapore Slings
• Over 30% of the incidents occurred in victims' own homes.
• Physical crime cases in Singapore remained stable in 2024.
At public transport nodes, the SPF has started initiatives to display advisory messages on voyeurism prominently on floor decals at selected MRT stations. Anti-voyeurism messages are also broadcast at all MRT stations during peak hours. The SPF has also collaborated with the Restroom Association (Singapore) to introduce security design guidelines, enhancing safety in public toilets. more
Mom Hears a Stranger Talking to Child Through WiFi Baby Monitor
The OP asked their husband if there was anything in the room that talks or if the camera made noise when turning the audio on. The answers were no and no. “I go back upstairs, and as I’m opening the door to my son’s room I hear the same woman talking to my son through the camera,” the OP writes. “She said, ‘Hi baby! It’s OK!’
“Consumer Reports found that most of these models have pretty lax security and privacy and didn't earn a recommendation in our ratings,” explains Allen St. John, the content manager for baby monitors of Consumer Reports. more
A Spymaster Sheikh Controls a $1.5 Trillion Fortune. He Wants to Use It to Dominate AI
But in recent years, a new quest has taken up much of Sheikh Tahnoun’s attention. His onetime chess and technology obsession has morphed into something far bigger: a hundred-billion-dollar campaign to turn Abu Dhabi into an AI superpower. And the teammate he’s set out to buy this time is the United States tech industry itself. more
An Extra Defense Against Keyless Car Theft
“The idea of measuring fluctuations in a car’s electrical system seems simple, but designing one device that can do it accurately on thousands of different vehicle models in varying environmental conditions gets quite complicated,” said Liang He , assistant professor of computer science and engineering at the University of Colorado, Denver and a researcher on the project. “We’re working to design a system that’s smart enough to measure the parameters of the vehicle it’s installed on and then customize itself to work effectively on that vehicle.” more
Student Arrested for Placing Spy Cameras in Bathrooms
Authorities say 21-year-old Michael Nguyen planted three cameras disguised as pens inside the bathrooms of a residence he shared with his now former Delta Chi Psi fraternity brothers on 17th Street and Montgomery Avenue...
They say he was expelled from the fraternity “without hesitation.” more
Spy History: 1902 Corporate Espionage on the High Seas
The document is in the form of a quasi-official report, written by one of P&O's traveling inspectors on two voyages in 1902, one from Southampton to New York, the other from Vancouver to Yokohama.
The writer (whose signature is, alas, indecipherable) was clearly more than a passenger, he was a benevolent spy, assessing conditions aboard the competition...
"I have the honor to report my arrival here yesterday. The following details of the steamers in which I have traveled may interest you..." more
Saturday, January 25, 2025
Better Idea: Prevent the Boardroom Leaks - Conduct TSCM Inspections
Hewlett-Packard conducted feasibility studies on placing spies in news bureaus of two publications as part of an investigation into leaks from its board, The New York Times reported on Wednesday. Hewlett-Packard could not immediately be reached for comment.
The Times cited an individual briefed on the company's review of the operation in its report. It is not clear whether the plan described in the documents, which were read to a reporter, was ever acted upon, The Times said.
The newspaper said the feasibility studies, referred to in a February 2 draft report for a briefing of senior management, were said to have included the possibility of placing investigators acting as clerical employees or cleaning crews in the San Francisco offices of technology news Web site CNET and The Wall Street Journal.
HP is under investigation by U.S. federal prosecutors and the California attorney general over the company's potentially illegal tactics in obtaining phone records in a bid to end boardroom leaks to the media. more
FutureWatch: "Proactive Eavesdropping"
Note from website: This Nature Research Intelligence Topic summary is one of 30,000 created with generative AI and the cited references. We take care to ground generative text with facts, and have systems in place to gain human feedback on the overall quality of the process. We however cannot guarantee the accuracy of every summary and welcome feedback.
Seminar in Information Security & Cryptography
Zurich Switzerland, June 11−13, 2025
Lecturers: Prof. David Basin and Prof. Ueli Maurer, ETH Zurich
We are pleased to announce our seminar in Information Security and Cryptography. A full description of the seminar, including all topics covered, is available at
https://www.infsec.ch/#seminar. Early registration is until February 28th.
This seminar provides an in-depth coverage of Information Security and Cryptography. Concepts are explained in a way understandable to a wide audience, as well as mathematical, algorithmic, protocol-specific, and system-oriented aspects. The topics covered include cryptography and its foundations, system and network security, PKIs and key management, authentication and access control, privacy and data protection, and advanced topics in cryptography including blockchains and cryptocurrencies.
The seminar takes place in Zurich, Switzerland. The lectures and all course material are in English. Participants will receive certification for their attendance.
Spy Camp 2025
Week 1: July 14 – July 18 | Week 2: July 21 – July 25
9:00 AM – 3:00 PM Daily | Ages: 9 – 12
Price per child: $625 (Non-member) | $545 (Spy Museum Members)
Aspiring KidSpy® recruits will hone their tradecraft, learn from real spies, and hit the streets of DC to run training missions. Develop a disguise for cover, make and break codes, discover escape and evasion techniques, create and use spy gadgets, and uncover the science behind spying – all of this and more awaits young recruits! more
Friday, January 24, 2025
Point One for the Chinese Cyber Spies
Members of the Cyber Safety Review Board are getting the boot as part of an early move by the Trump administration to dismiss participants in Department of Homeland Security advisory committees, according to multiple news reports and a person familiar with the matter.
A spokesperson for the Department of Homeland Security didn’t immediately respond to a request for comment. more
Thursday, January 23, 2025
Stop Working for Russia, Britain Tells its Private Spies
In new guidance for security professionals published this week, the U.K. Home Office said such work risks breaking tough new national security laws — and could even see pros sent to prison for up to 14 years...
It suggests companies should “strongly consider” turning down work if a potential client works for a foreign state’s public sector, fails to provide sufficient information about their identity, or asks them to gather sensitive information. more
Sunday, January 12, 2025
Russian Spy Hoarded Surveillance Gadgets - Boasted: Like James Bond Q
Orlin Roussev boasted to his controller that he was becoming like the James Bond character "Q" as he prepared his spying "toys" for kidnap and surveillance operations across Europe...
The Old Bailey was told a "vast" amount of technical equipment for "intrusive surveillance" was found at Roussev's address in Great Yarmouth, Norfolk, which he described in messages as his "Indiana Jones warehouse"... a "significant amount of IT and surveillance equipment". It was stacked up in two storage rooms and an office used by Roussev, the court was told. more
Recent Spycam News
• Celebrity osteopath caught spying on changing university students 'agrees to cooperate with police more
• Palm Beach County Man Arrested After Hidden Cam Found In Room He Rented Out more