Secret messages, codewords and a phone smashed with an axe...
The story of Dublin man Keith O’Brien made international headlines when his employer, a major US HR services firm, set a “trap” to identify how confidential information was being leaked – and the saga is not over yet. His 13-page confession was read to the High Court, where he told how he spied on his multinational employer for a rival for a fee of over €5,000 a month. That is, until he was caught.
In an affidavit filed with the High Court, Keith O’Brien, who was global payroll compliance manager of Rippling, said he was induced into spying and passing sensitive company information to the CEO of rival US firm Deel Inc.
The admission was disclosed during an application to join Deel, its French chief executive Alex Bouaziz and two solicitors working for Deel – Italian national Andrea David Mieli and UK-based Asif Malik – as co-defendants in corporate espionage proceedings taken by Rippling against Mr O’Brien last month. more
Thursday, August 21, 2025
NYC woman found a phone buried in her lawn...
— and police say it’s a new tactic thieves use to spy on homeowners.
Scientists use Vibration Detection to Eavesdrop on Smartphones
An emerging form of surveillance, “wireless-tapping,” explores the possibility of remotely deciphering conversations from the tiny vibrations produced by a cellphone’s earpiece.
With the goal of protecting users’ privacy from potential bad actors, a team of computer science researchers at Penn State demonstrated that transcriptions of phone calls can be generated from radar measurements taken up to three meters, or about 10 feet, from a phone.
While accuracy remains limited — around 60% for a vocabulary of up to 10,000 — the findings raise important questions about future privacy risks. more
Ian Fleming and His Spy Scheme Inspired a Broadway Show
The James Bond spy novels dreamed up by Ian Fleming were rooted in his World War II experiences as a British intelligence officer.
In one instance, Fleming had an idea that was so wild it’s still hard to believe it actually worked. To misdirect the Nazis, he suggested outfitting a corpse with fake military plans and strategically placing it off the coast of Spain.
Because truth can be stranger than fiction, that scheme is now the subject of the rollicking Broadway musical “Operation Mincemeat.”
Because truth can be stranger than fiction, that scheme is now the subject of the rollicking Broadway musical “Operation Mincemeat.”
The show, a hit in England before arriving in New York last spring, gets big laughs from this absurd tale of deception. In a rousing number, “God That’s Brilliant,” the conspiring spies sing rapturously as they plot to kill Hitler. (Fleming paints a picture of a martini-drinking, tuxedo-wearing assassin who “kills the guards, snogs the girl and says something cool.”) more
Security Advice of the Week
Luke Bencie advises...
To protect yourself, aka think like a spy, you can use the following checklist to stay alert and avoid getting pulled under by scammers:
To protect yourself, aka think like a spy, you can use the following checklist to stay alert and avoid getting pulled under by scammers:
- Pause before acting on urgent claims.
- Question the logic—does it make sense, or is it just dramatic?
- Verify facts across multiple reliable sources.
- Ask who benefits if you act right now.
Security / IT Director Alert: Browser-Based AI Agents
Browser-Based AI Agents: The Silent Security Threat Unfolding
Some of the most revolutionary advances in artificial intelligence include browser-based AI agents, which are self-sustaining software tools integrated into web browsers that act on behalf of individuals. Because these agents have access to email, calendars, file drives, and business applications, they have the potential to turbocharge productivity. From scheduling meetings to processing emails and surfing sites, they are transforming how we interact with the internet.
Some of the most revolutionary advances in artificial intelligence include browser-based AI agents, which are self-sustaining software tools integrated into web browsers that act on behalf of individuals. Because these agents have access to email, calendars, file drives, and business applications, they have the potential to turbocharge productivity. From scheduling meetings to processing emails and surfing sites, they are transforming how we interact with the internet.
But while their abilities increase, so does the risk: threats to browser-based AI agents is not hypothetical; it already exists.
Cybercriminals are increasingly using AI agents to stage highly advanced attacks that are intelligent, adaptive, and capable of attacking systems at scale. Programmed to simulate human decision-making, AI agents can be manipulated to execute malicious functions without the user’s awareness. more
Priyom: An International Short Wave Spy Numbers Organization You Can Join
Priyom.org is an international organization intending to research and bring to light the mysterious reality of intelligence, military and diplomatic communication via shortwave radio: number stations.
Cartoon from 1973 about government spies. So, grab your short wave radio and track back!
Sunday, August 10, 2025
Looks Like a Smoke Detector - Hackers Say Audio Bug - Brilliant for Building Security
A pair of hackers found that a vape detector often found in high school bathrooms contained microphones—and security weaknesses that could allow someone to turn it into a secret listening device...
...the Halo 3C goes beyond detecting smoke and vaping—including a distinct feature for discerning THC vaping in particular. It also has a microphone for listening out for “aggression,” gunshots, and keywords such as someone calling for help...
Now, after months of reverse engineering and security testing, Vasquez-Garcia and a fellow hacker he’s partnered with who goes by the pseudonym “Nyx,” have shown that it’s possible to hack one of those Halo 3C gadgets—which they’ve taken to calling by the nickname “snitch puck”—and take full control of it...
...the Halo 3C goes beyond detecting smoke and vaping—including a distinct feature for discerning THC vaping in particular. It also has a microphone for listening out for “aggression,” gunshots, and keywords such as someone calling for help...
Now, after months of reverse engineering and security testing, Vasquez-Garcia and a fellow hacker he’s partnered with who goes by the pseudonym “Nyx,” have shown that it’s possible to hack one of those Halo 3C gadgets—which they’ve taken to calling by the nickname “snitch puck”—and take full control of it...
At the Defcon hacker conference today, they plan to show that by exploiting just a few relatively simple security vulnerabilities, any hacker on the same network could have hijacked a Halo 3C to turn it into a real-time audio eavesdropping bug, disabled its detection capabilities, created fake alerts for vaping or gunshots, or even played whatever sound or audio they chose out of the device’s speaker.
Motorola said it has since developed a firmware update to address those security flaws that will automatically push to cloud-connected devices by Friday...
“To the credit of the company, the microphones sound great,” says Nyx. “From up on the ceiling, you could totally listen to what somebody was saying, and we’ve made this happen.”
Motorola said it has since developed a firmware update to address those security flaws that will automatically push to cloud-connected devices by Friday...
“To the credit of the company, the microphones sound great,” says Nyx. “From up on the ceiling, you could totally listen to what somebody was saying, and we’ve made this happen.”
Motorola told the hackers in an email that it has worked on a new firmware update that should fix the vulnerabilities. But the hackers argue that doesn’t, and can’t, address the underlying concern: that a gadget loaded with hidden microphones is installed in schools around the country. Motorola also advertises its Halo sensors for use in public housing—including inside residents’ homes—according to marketing material. more
Hacking issues aside, this is a brilliant device to enhance building security. Here is a video showing one feature. Many additional videos are on YouTube.com.
Hackers Love These 7 Smart Home Devices
Although everyone wants a convenient home, there’s little that’s less convenient than a hacked smart home appliance. When it comes to the best smart home devices, the hard and fast rule is: if it’s connected to Wi-Fi you’re going to need to make sure it's secured because there’s going to be a way to hack it.
The good news is that once you've figured out how to lock down one, it's pretty easy to repeat the process for the rest of them. Here's a list of seven of the most vulnerable smart devices in your home, and the steps you can take to make sure they're more secure than they are right now...
- Wi-Fi Routers
- Security Cameras
- Baby Monitors
- Smart Speakers
- Video Doorbells
- Smart Thermostats
- Smart Appliances
Counterespionage recommendations from the article are here.
And, do not forget about robot vacuums, refrigerators, washing machines, and anything that can automatically order from Amazon.
Hackers Found Backdoor in High-Security Safes—Opens in Seconds
Security researchers found two techniques to crack at least eight brands of electronic safes—used to secure everything from guns to narcotics.
James Rowley and Mark Omo got curious about a scandal in the world of electronic safes...
In the process, they'd find something far bigger: another form of backdoor intended to let authorized locksmiths open not just Liberty Safe devices, but the high-security Securam Prologic locks used in many of Liberty’s safes and those of at least seven other brands.
James Rowley and Mark Omo got curious about a scandal in the world of electronic safes...
In the process, they'd find something far bigger: another form of backdoor intended to let authorized locksmiths open not just Liberty Safe devices, but the high-security Securam Prologic locks used in many of Liberty’s safes and those of at least seven other brands.
More alarmingly, they discovered a way for a hacker to exploit that backdoor—intended to be accessible only with the manufacturer's help—to open a safe on their own in seconds.
In the midst of their research, they also found another security vulnerability in many newer versions of Securam's locks that would allow a digital safecracker to insert a tool into a hidden port in the lock and instantly obtain a safe’s unlock code. more
BBC Star Recorded by Landlord on Hidden Spy Camera
A BBC actress has told of her horror after discovering her landlord planted a spy cam in her bathroom. The Scots star — who has appeared in prime-time comedies and dramas — found the recording device hidden in a washing basket after taking a shower.
She fled the flat before watching back the footage and finding intimate clips of herself — plus an image of the creep changing the memory card.
“I always used to notice this little black dot in the washing basket across from the shower. I never in a million years thought he’d be spying on me. But given what had happened the night before, I went to have a closer look. My heart just stopped and I burst into tears. There was a green light flashing on the camera. I knew that it was on and I was being recorded.” Cops have launched a probe. more
She fled the flat before watching back the footage and finding intimate clips of herself — plus an image of the creep changing the memory card.
“I always used to notice this little black dot in the washing basket across from the shower. I never in a million years thought he’d be spying on me. But given what had happened the night before, I went to have a closer look. My heart just stopped and I burst into tears. There was a green light flashing on the camera. I knew that it was on and I was being recorded.” Cops have launched a probe. more
Security Director FYI: Disclaimr.AI Monitors Security News
Security Intelligence Aggregation
(from website) Disclaimr uses AI to monitor every security source that matters so you're always the first to know, never the last to respond. Sends out a sharp 6AM daily security brief distilled from 500+ sources, so that you never miss a critical update. Coming soon.
Notes: There is a waitlist for the launch. No information about the company behind the project appears on the website. Signup requires answering a few reasonable marketing questions. Previous offerings appear to include "spreadsheet to map" and general newsletter aggregation services.
While this is not unusual for startups finding the right markets for themselves, consider using a blind email address until the service is proven to be legitimate and necessary for you.
RIP: Stella Rimington, First Woman to Lead U.K.’s MI5, Dies at 90
Widely regarded as the inspiration for the recast of the James Bond character “M,” she was the first British spy chief to be publicly named and photographed.
Stella Rimington, who battled a fiercely protective old boy’s network to become the first woman to lead MI5, Britain’s domestic intelligence service, and whose tenure as the country’s spymaster was widely seen as an inspiration for James Bond’s first female boss in the movie franchise, died on Sunday. She was 90.
The Security Service announced her death in a statement on Monday without specifying the cause or place of death.
Her cool demeanor and reputation for quiet competence, according to Bond aficionados, helped shape the character of “M” starting with Judi Dench’s portrayal in “GoldenEye” in 1995. (The Bond movies involved a fictional agent of MI6, Britain’s foreign intelligence agency.) more
Stella Rimington, who battled a fiercely protective old boy’s network to become the first woman to lead MI5, Britain’s domestic intelligence service, and whose tenure as the country’s spymaster was widely seen as an inspiration for James Bond’s first female boss in the movie franchise, died on Sunday. She was 90.
The Security Service announced her death in a statement on Monday without specifying the cause or place of death.
Her cool demeanor and reputation for quiet competence, according to Bond aficionados, helped shape the character of “M” starting with Judi Dench’s portrayal in “GoldenEye” in 1995. (The Bond movies involved a fictional agent of MI6, Britain’s foreign intelligence agency.) more
Weird Science
Scientists Shine a Laser Through a Human Head
Magnetocaloric Refrigerator - Runs on magnets instead of harmful gases.
Very few companies have mastered the science of magnetocalorics sufficiently to develop a commercial refrigerator, but perhaps none have also been successful in making the concept “cool” from a marketing standpoint. Now, though, a young academic spinoff company from Darmstadt, Germany is changing the landscape with its Polaris beverage refrigerator. The company is MagnoTherm Solutions GmbH, a pioneering upstart in sustainable cooling. It recently took part in ChangeNOW in Paris, a global event that unites change-makers from around the world to drive positive transformation for our planet. more
A Stratosphere Cell Tower
Man Is Controls iPad With His Thoughts
It’s the first step toward an inexpensive new medical imager...
For the most part, anyone who wants to see what’s going on inside someone else’s brain has to make a trade-off when it comes to which tools to use. The electroencephalograph (EEG) is cheap and portable, but it can’t read much past the outer layers of the brain, while the alternative, functional magnetic resonance imaging (fMRI), is expensive and the size of a room, but can go deeper. Now, a research group in Glasgow has come up with a mechanism that could one day provide the depth of fMRI using equipment as affordable and portable as an EEG. The technology will rely on something that previously seemed impossible—shining light all the way through a person’s head. more
Magnetocaloric Refrigerator - Runs on magnets instead of harmful gases.
Very few companies have mastered the science of magnetocalorics sufficiently to develop a commercial refrigerator, but perhaps none have also been successful in making the concept “cool” from a marketing standpoint. Now, though, a young academic spinoff company from Darmstadt, Germany is changing the landscape with its Polaris beverage refrigerator. The company is MagnoTherm Solutions GmbH, a pioneering upstart in sustainable cooling. It recently took part in ChangeNOW in Paris, a global event that unites change-makers from around the world to drive positive transformation for our planet. more
A Stratosphere Cell Tower
Starting next year, Tokyo’s SoftBank Corp. will be beaming a prototype 4G and 5G phone and broadband service from the stratosphere to Japanese end users. Floating 20 kilometers above the Earth, the company’s airship-based mast will be using energy-regeneration tech and newly allocated spectrum. And the tech could ultimately pose a real, competitive threat to satellite-based platforms like Starlink. more
Man Is Controls iPad With His Thoughts
You can officially control an Apple device with your thoughts, as long as you have the Stentrode brain implant made by NYC-based Synchron. First announced in May, the capability connects brain-computer interfaces (BCI) to Apple products through a Bluetooth connection. It works with iOS, iPadOS, and visionOS, so that means iPads, iPhones, and the Vision Pro can recognize a BCI just like a keyboard or mouse. Apple designed it to be a standard connection for all implants, including Elon Musk's Neuralink, but Synchron is the first to offer the capability to its patients. more
Monday, August 4, 2025
Documentary: The Thing (No, not the 1951 & 1982 monster movies. The Russian Spy Thing.)
'The Thing' a captivating short film that uncovers one of history's most astonishing espionage incidents of the 20th Century. The documentary uncovers the amazing story behind the Great American Seal bug.
John Little of TSCM Consulting tells this complex story of spying, counter spying, genius, betrayal, political wrangling and espionage.
£15.50 donation supporting The National Museum of Computing.
✓ Full access pass to the documentary
✓ Access to future releases & updates
✓ Stream & watch anytime
✓ Donate to The National Museum of Computing
✓ Full access pass to the documentary
✓ Access to future releases & updates
✓ Stream & watch anytime
✓ Donate to The National Museum of Computing
You can live in a spy movie if...
...you’ve got some cash sitting around:
British underwater jetpack maker CudaJet has done what you’d expect an underwater jetpack maker to do: they made an underwater jetpack.
The 31-pound hands-free, backpack-like device, which is made to order and starts at ~$31k, will help rich people live out their dolphin dreams — diving 130+ feet down and propelling them forward 7 mph at a time.
CudaJet says it comes with a controller and that it all takes five minutes to get comfortable with it. more
Weird Spy News: A Son Bugging Dad? (technically speaking)
India - PMK founder leader S Ramadoss on Saturday alleged his son Anbumani spied on him.
Asked whether it would be appropriate to allege that it was Anbumani who had planted a listening device as the police probe was still on, Ramadoss shot back, asking, “Who else could have planted it?"
He alleged it was his son Anbumani who had planted the bugging device at his residence. Ramadoss said complaints had been filed by him with Kiliyanur police (Villupuram district) and the cybercrime wing as well. The bugging device and its parts had been handed over to the police. more
Spies Demise Times Two
A veteran Swedish diplomat recently arrested on suspicion of espionage has died days after being released from police custody, his lawyer has revealed.
Sweden's Sapo security service detained the man, who has not been named, on Sunday and kept him for questioning until Wednesday. He was released the same day, subject to investigation the country's prosecution service has said.
Police told Swedish outlet Svenska Dagbladet they had now opened an investigation into his death, but “there is no suspicion a crime has been committed”. more
Top Somali spy investigating assassination attempt on president killed...
A senior officer with Somalia’s National Intelligence and Security Agency (NISA), who was leading a sensitive investigation into a recent assassination attempt on President Hassan Sheikh Mohamud, has been mysteriously killed in Mogadishu, Caasimada Online news website reported on Saturday. more
Sweden's Sapo security service detained the man, who has not been named, on Sunday and kept him for questioning until Wednesday. He was released the same day, subject to investigation the country's prosecution service has said.
Police told Swedish outlet Svenska Dagbladet they had now opened an investigation into his death, but “there is no suspicion a crime has been committed”. more
Top Somali spy investigating assassination attempt on president killed...
A senior officer with Somalia’s National Intelligence and Security Agency (NISA), who was leading a sensitive investigation into a recent assassination attempt on President Hassan Sheikh Mohamud, has been mysteriously killed in Mogadishu, Caasimada Online news website reported on Saturday. more
Quote of the Week: "Nobody with Sensitive Information is Immune to Espionage"
Australian Security and Intelligence Organisation director-general Mike Burgess said that in the “prevailing threat environment, national security truly is national security – everybody’s business”.
He said foreign intelligence agencies were “aggressively targeting” three key areas: science and technology, particularly advanced technology; public and private sector projects to gain a commercial advantage; and Antarctic research, green technology, critical minerals, and rare earths extraction and processing.
What information are spies taking?
Mr Burgess warned this meant “nobody with sensitive information is immune” and gave examples of recent operations investigated by ASIO. more
He said foreign intelligence agencies were “aggressively targeting” three key areas: science and technology, particularly advanced technology; public and private sector projects to gain a commercial advantage; and Antarctic research, green technology, critical minerals, and rare earths extraction and processing.
What information are spies taking?
Mr Burgess warned this meant “nobody with sensitive information is immune” and gave examples of recent operations investigated by ASIO. more
The Farmhouse Spy
A simple farmhouse and a mysterious dish set the stage for a real-world spy thriller. When French counterintelligence spotted that setup, they realised someone was tapping into high-value space communications.
The homeowner, Dong H., was no ordinary resident. A former employee of Beijing’s Academy of Science and Technology and president of Stahd Europe—a subsidiary of Emposat, the Chinese communications specialist—she had all the credentials for espionage. Emposat’s failed bid to install a ground station in the Czech Republic underscored how wary governments are of hidden antennas.
French investigators couldn’t prove data theft outright, but they confirmed the dish was finely tuned to CNES frequencies. Instead of a raid, authorities filed legal charges for illegal antenna installation, quietly dismantling the operation. Dong’s rural hideout shows how easy it can be to set up covert surveillance right under everyone’s nose. more
The homeowner, Dong H., was no ordinary resident. A former employee of Beijing’s Academy of Science and Technology and president of Stahd Europe—a subsidiary of Emposat, the Chinese communications specialist—she had all the credentials for espionage. Emposat’s failed bid to install a ground station in the Czech Republic underscored how wary governments are of hidden antennas.
French investigators couldn’t prove data theft outright, but they confirmed the dish was finely tuned to CNES frequencies. Instead of a raid, authorities filed legal charges for illegal antenna installation, quietly dismantling the operation. Dong’s rural hideout shows how easy it can be to set up covert surveillance right under everyone’s nose. more
Thursday, July 24, 2025
Candidate for Swimming with the Fishes
Mohamed Orahhou, a Norwegian who worked as a security agent at the US embassy in Oslo has been charged with spying for Russia and Iran...
Apparently, the dude never heard about his predecessor, Hvaldimir, a white beluga whale famously suspected of being a Russian spy, found dead off the coast of Norway.
The 27-year-old man is accused of having supplied information on embassy activities... In return, he was paid in euros and bitcoin.
He is accused of having supplied ... the contact details of diplomats, embassy staff and their families. He is also accused of having supplied the diplomatic licence-plate numbers of vehicles used by the embassy.
The charge sheet also alleges he handed over the plans of the embassy, security routines and a list of couriers Norway's intelligence service used. more
Apparently, the dude never heard about his predecessor, Hvaldimir, a white beluga whale famously suspected of being a Russian spy, found dead off the coast of Norway.
Hey, Security. Talk to the hand...
Anviz innovative biometric Palm Vein Access Control Reader. Seamless and touch-less access.
Key features and Advantages comparing to biometric of fingerprint and Face.
Accuracy
Palm vein recognition is one the most accurate biometric technologies, primarily due to its internal, unique, and stable biological characteristics.FAR is typically around 0.00008% (or 1 in 1.25 million), FRR is 0.01%
Stability
Palm vein patterns remain stable throughout a person’s life, make it suitable for long-term us
Secure
Because palm veins are not visible to the naked eyes, also liveness detection requires active blood flow, adding a natural anti-spoofing layer. It is very hard to be duplicated.
Privacy
Unlike fingerprint or facial recognition that may be captured without user’s permission, palm vein can not be captured secretly as the vein patterns are inside the body, which makes almost impossible to collect or clone without the user’s participation.
Hygienic
Non-contact enrollment and identification surfaces. more
The Latest Eavesdropping Buzz
Amazon's New AI Wearable: Listening to You Like a Best Friend (or a Creepy Ex)
It's officially a wild world out there in tech land, where your devices are not just smart—they're practically eavesdropping.
Amazon has taken a significant step into the AI wearable realm by acquiring a startup called Bee, which creates a device that records everything you say. Yes, you read that correctly: everything. Talk about a leap in user experience—or a giant leap toward a reality show called “Keeping Up with the Amazons.”
• Always Listening: Bee can record everything, theoretically capturing all your brilliant thoughts and awkward moments.
• Privacy Concerns: Remember when Amazon had to address Alexa's ability to record conversations? The Bee wearable might be stirring up some déjà vu. more
FutureWatch: As You Distort Wi-Fi Space You Become Identifiable
Wi-Fi networks could soon track you without devices, as Italian researchers harness signal distortions to create unique biometric identifiers...
Researchers in Italy have shown that even ordinary Wi-Fi signals can be used to track people, without needing them to carry any device at all.
A team from La Sapienza University of Rome has developed a system called ‘WhoFi,’ which can generate a unique biometric identifier based on how a person’s body interacts with surrounding Wi-Fi signals. WhoFi can identify people within a Wi-Fi area with an accuracy of 95.5%.
The approach, described in a preprint paper, uses signal distortions caused by the human body to re-identify individuals as they move across spaces covered by different Wi-Fi networks.
More information: Danilo Avola et al, WhoFi: Deep Person Re-Identification via Wi-Fi Channel Signal Encoding, arXiv (2025). DOI: 10.48550/arxiv.2507.12869
Researchers in Italy have shown that even ordinary Wi-Fi signals can be used to track people, without needing them to carry any device at all.
A team from La Sapienza University of Rome has developed a system called ‘WhoFi,’ which can generate a unique biometric identifier based on how a person’s body interacts with surrounding Wi-Fi signals. WhoFi can identify people within a Wi-Fi area with an accuracy of 95.5%.
The approach, described in a preprint paper, uses signal distortions caused by the human body to re-identify individuals as they move across spaces covered by different Wi-Fi networks.
More information: Danilo Avola et al, WhoFi: Deep Person Re-Identification via Wi-Fi Channel Signal Encoding, arXiv (2025). DOI: 10.48550/arxiv.2507.12869
Protector App - Uber with Guns?
Short-Term Security.
Immediate Protection with No Commitment
An app you can use to hire a trained law enforcement professional in NYC or LA. Launched after the murder of UnitedHealthcare CEO Brian Thompson in December.
"Protector provides discreet, high-level protection for executives, public figures, and innovators facing elevated risk. We work behind the scenes to assess threats, monitor digital exposure, and ensure medical readiness, so our clients can operate with confidence and clarity." more
Cautionary Tale: Weak Password Sinks a 158-Year-Old Company
KNP Logistics, a 158-year-old transportation firm, collapsed after falling victim to a ransomware attack that locked them out of their own systems.
One password is believed to have been all it took for a ransomware gang to destroy a 158-year-old company and put 700 people out of work.
In KNP's case, it's thought the hackers managed to gain entry to the computer system by guessing an employee's password, after which they encrypted the company's data and locked its internal systems. more
In KNP's case, it's thought the hackers managed to gain entry to the computer system by guessing an employee's password, after which they encrypted the company's data and locked its internal systems. more
No. Adding another ! to your password isn't the answer.
Roach Coach for Spy Tech
Spy Cockroaches and AI Robots...
Some of the ideas under development feel akin to science fiction – like Swarm Biotactics' cyborg cockroaches that are equipped with specialised miniature backpacks that enable real-time data collection via cameras for example...
Germany plots the future of warfare.
Sven Weizenegger, who heads up the Cyber Innovation hub, the Bundeswehr's innovation accelerator, said the war in Ukraine was also changing social attitudes, removing a stigma towards working in the defence sector. "Germany has developed a whole new openness towards the issue of security since the invasion," he said.
Some of the ideas under development feel akin to science fiction – like Swarm Biotactics' cyborg cockroaches that are equipped with specialised miniature backpacks that enable real-time data collection via cameras for example...
"Our bio-robots - based on living insects - are equipped with neural stimulation, sensors, and secure communication modules," said CEO Stefan Wilhelm. "They can be steered individually or operate autonomously in swarms...
"We just need to get to this mindset: a strong defense industrial base means a strong economy and innovation on steroids," said Markus Federle, managing partner at defence-focused investment firm Tholus Capital. more
FutureWatch: Spy-Grade Storage Drive
...self-destructs on demand just like in the movies!
It's not every day that you come across a product where the standout feature is its ability to go kaput at a moment's notice.
That's exactly what the Team Group P250Q SSD (solid state drive) is all about. This industrial storage drive for computers and servers can physically destroy itself at the push of a button, so your secrets go up in smoke before they fall into the wrong hands...
Saturday, July 19, 2025
Apple sues YouTuber who had planted 'spy'...
...at Apple employee's house for iOS 26 leaks.
The lawsuit claims Ramacciotti broke into his friend Ethan Lipnik's Apple-issued development phone while staying at his home, then showed the unreleased software to Prosser via FaceTime.
According to Apple's complaint, Ramacciotti used location tracking to monitor when Lipnik would be away from his Santa Clara apartment, obtained his passcode, and accessed his development iPhone. The device contained unreleased iOS 19 software and "significant amounts of additional Apple trade secret information that has not yet been publicly disclosed."
Apple has filed a federal lawsuit against YouTuber Jon Prosser and Michael Ramacciotti, accusing them of orchestrating a scheme to steal iOS 26 trade secrets from a development iPhone.
The lawsuit claims Ramacciotti broke into his friend Ethan Lipnik's Apple-issued development phone while staying at his home, then showed the unreleased software to Prosser via FaceTime.
According to Apple's complaint, Ramacciotti used location tracking to monitor when Lipnik would be away from his Santa Clara apartment, obtained his passcode, and accessed his development iPhone. The device contained unreleased iOS 19 software and "significant amounts of additional Apple trade secret information that has not yet been publicly disclosed."
Prosser allegedly recorded the call and used the footage to create "reconstructed" renderings for his YouTube channel, generating ad revenue from Apple's confidential information.
Apple terminated Lipnik's employment for failing to secure the development device and is seeking injunctive relief and damages. more
Apple terminated Lipnik's employment for failing to secure the development device and is seeking injunctive relief and damages. more
Data Leak Exposes IDs of UK Spies
Cover is also blown for thousands of Afghan allies as UK government scrambles to respond.
A major data breach has blown the cover off more than 100 British officials—including MI6 agents and Special Air Service members—while also exposing thousands of Afghan allies to potential Taliban reprisals.
The breach, which occurred in February 2022 but was only discovered more than a year later, spilled personal details from a sensitive database meant to help Afghans who supported the UK during its 20-year campaign in Afghanistan, per the BBC. more
FutureWatch: Reachy Mini, tiny new open-source robot leading the DIY robot revolution
Remember when robots were either million-dollar factory arms or creepy Boston Dynamics videos that made you question humanity's future? Well, Hugging Face and Pollen Robotics just released Reachy Mini, a desktop robot that costs less than most people's monthly grocery bill, and might be the most adorable little robot we’ve ever seen. more
What has this to do with spying?
Reachy Mini is an 11-inch tall, open-source robot that you can program in Python right out of the box. Think of it as the friendly cousin of those intimidating industrial robots, but one that actually wants to hang out on your desk and maybe help with your coding projects. video
Reachy Mini is an 11-inch tall, open-source robot that you can program in Python right out of the box. Think of it as the friendly cousin of those intimidating industrial robots, but one that actually wants to hang out on your desk and maybe help with your coding projects. video
You are witnessing the beginning of AI, super-smart, open-source, programmable, internet communications capable, devices which will become commonplace home/office devices. And we thought the Internet of Things presented security and privacy problems. Just wait.
Secret Recordings are on the Rise

Spy cameras and listening devices obscured in phone chargers, photo frames, alarm clocks, mirrors, plug sockets, pens and smoke alarms are available in huge numbers on mainstream sites including Amazon and eBay.
One bug sweeping specialist told MailOnline that recording devices contained in plug sockets used for USB mobile phone chargers were particularly popular with snoopers because 'no one is going to suspect them'. more
One bug sweeping specialist told MailOnline that recording devices contained in plug sockets used for USB mobile phone chargers were particularly popular with snoopers because 'no one is going to suspect them'. more
Want to protect your business from electronic surveillance? Click HERE for some good information.
Spycam News: Ba Dmup "Here we come..."
Thai police have arrested a woman who allegedly had sexual relations with monks, and then used photos and videos of the acts to extort money from them.
The woman, who police are calling "Ms Golf", had sex with at least nine monks, police said at a press conference on Tuesday. They believe she received around 385 million baht ($11.9m; £8.8m) over the past three years.
Investigators who searched her house found more than 80,000 photos and videos used to blackmail the monks, the police spokesman said...
The woman, who police are calling "Ms Golf", had sex with at least nine monks, police said at a press conference on Tuesday. They believe she received around 385 million baht ($11.9m; £8.8m) over the past three years.
Investigators who searched her house found more than 80,000 photos and videos used to blackmail the monks, the police spokesman said...
The police have also opened a hotline for people to report "misbehaving monks". more
Norway on Lookout For Russian Spies In an Arctic Town
Paranoia pervades the placid border town of Kirkenes in Norway’s far north. Residents are routinely trailed by unknown men. The Wall Street Journal’s camera crew was photographed and followed around town by a suspicious vehicle with no license plate. Most locals warn you to keep your wits about you because, as one said in a hushed tone, “the Russians are watching.”
The Journal’s video shows us accompanying Norway’s domestic intelligence agency, the PST, on patrol for Russian spies. We meet residents convinced they are under Russian surveillance, and we find out firsthand what it feels like to be trailed.
European intelligence officials say Kirkenes is a laboratory for Russia’s hybrid warfare—a potential ground zero for the kinds of espionage and sabotage attacks that have ramped up across Europe in recent years. more
The Journal’s video shows us accompanying Norway’s domestic intelligence agency, the PST, on patrol for Russian spies. We meet residents convinced they are under Russian surveillance, and we find out firsthand what it feels like to be trailed.
European intelligence officials say Kirkenes is a laboratory for Russia’s hybrid warfare—a potential ground zero for the kinds of espionage and sabotage attacks that have ramped up across Europe in recent years. more
Unauthorized LEGO copies of ASML’s chip machines sold in China despite export bans
The LEGO versions of ASML’s High-NA EUV machines, which cost about 208 euros and were intended solely as novelty items for ASML employees, have appeared on Taobao, a popular marketplace operated by Alibaba Group...
While the Chinese government has allegedly not been able to obtain the real EUV machines—subject to strict export controls imposed by the U.S. and Dutch governments—buyers can reportedly easily purchase the toy version. more "Leaked" new cell Chinese phone photo.
Tuesday, July 15, 2025
Dual Purpose AI - Personal Secretary / Eavesdropping Spy
New Voice Recorders are getting smarter, thinner, more feature-packed and more easily hidden.
This particular device can record for 30 hours and AI summarizes the interesting things it hears in about 30 seconds. P.S. It can also record cell phone calls.
The eavesdropping potential is obvious. Recognizing this device, not so obvious, hence all the pictures below. This is another good reason businesses have a professional TSCM team sweep their offices regularly.
Understand what this does if you see one at your next meeting. Keep in mind that it also may be in someone's pocket.
Spybuster Tip: Become suspicious if the person you are talking to seems to be fishing for you to say something incriminating, or they are trying to repeat a contentious previous conversation. They are likely recording you.
Wednesday, July 9, 2025
AI Voice Clones are the Hot New Spy Tool
According to the WashingtonPost, in mid-June 2025, attackers successfully contacted five high-level officials using an AI-generated voice clone of Marco Rubio over Signal to try accessing sensitive information.
They were:
Here's what keeps security experts up at night: Voice cloning now costs as little as $1-5 per month and requires only 3 seconds of audio. Testing shows 80% of AI tools successfully clone political voices despite supposed safeguards.
...important question is this: do you have a catch phrase and/or signal to use with your loved ones to confirm it’s them? If you don’t, you should. The question isn't whether AI voice cloning will be used against you—it's when, and whether you'll be ready. more
- A U.S. governor.
- A member of Congress.
- And THREE foreign ministers.
Here's what keeps security experts up at night: Voice cloning now costs as little as $1-5 per month and requires only 3 seconds of audio. Testing shows 80% of AI tools successfully clone political voices despite supposed safeguards.
...important question is this: do you have a catch phrase and/or signal to use with your loved ones to confirm it’s them? If you don’t, you should. The question isn't whether AI voice cloning will be used against you—it's when, and whether you'll be ready. more
Monday, July 7, 2025
Travel Security - Hotel Safes & Spybuster Tips
Hotel safes typically have a default master code that can be used to open them, especially if the user code is forgotten or the safe is locked upon arrival. These default codes are often 0000, 9999, or variations like 000000 or 111111.
Hotel staff should reset this code upon installation, but it's wise to check if it's been changed or to try the default codes before using the safe, especially if you plan on storing valuables.
Check for default codes:
Check for default codes:
Common default master codes include 0000, 9999, 1234, 1111, 000000, 111111, and 999999. Some safes require entering # # or * * before entering the master code.
• The hotel is responsible for ensuring the safe is secure and the master code is reset to prevent unauthorized access.
• If the master code is not reset, anyone with knowledge of the default code can potentially access the safe.
• Some hotels may charge a fee to reset the safe code to a custom PIN number.
• The hotel is responsible for ensuring the safe is secure and the master code is reset to prevent unauthorized access.
• If the master code is not reset, anyone with knowledge of the default code can potentially access the safe.
• Some hotels may charge a fee to reset the safe code to a custom PIN number.
For more proof of hotel safe insecurity check here, or view one of the many YouTube videos on the subject.
Spybuster Tips
Here are some solutions to try:
• Portable Travel Safes - Soft or hard lockboxes with steel cable tethers. You hide them elsewhere in the room (e.g., attached to plumbing or heavy furniture). They avoid the hotel supplied safe altogether.
• Tamper-Evident Devices - Security tape, zip ties, or door seals placed over the safe seam or keypad can alert you to tampering. They don’t secure, only monitor.
• Bluetooth Tracker - Hide a Tile, AirTag, or Chipolo inside the safe. It may notify if the safe is opened, and its location if it has been moved.
• Security Cables - Wrap a steel cable lock (not a heavy duty bike or motorcycle cable) through the safe door handle or around the body—but this depends on the safe’s design. These may also be useful for turning your suitcase or backpack into an impromptu security enclosure.
Q. Why make this information publicly available and teach the bad guys?
• Portable Travel Safes - Soft or hard lockboxes with steel cable tethers. You hide them elsewhere in the room (e.g., attached to plumbing or heavy furniture). They avoid the hotel supplied safe altogether.
• Tamper-Evident Devices - Security tape, zip ties, or door seals placed over the safe seam or keypad can alert you to tampering. They don’t secure, only monitor.
• Bluetooth Tracker - Hide a Tile, AirTag, or Chipolo inside the safe. It may notify if the safe is opened, and its location if it has been moved.
• Security Cables - Wrap a steel cable lock (not a heavy duty bike or motorcycle cable) through the safe door handle or around the body—but this depends on the safe’s design. These may also be useful for turning your suitcase or backpack into an impromptu security enclosure.
Q. Why make this information publicly available and teach the bad guys?
A. Unfortunately, this information already appears in multiple YouTube videos, and is a click away in ChatGPT. On a positive note, publicity might force safe manufacturers to create better products, and help protect travelers in the meantime.
Thursday, July 3, 2025
Why Every Company Needs a Travel Security Program
In today’s heightened geopolitical climate, business travel is no longer a routine operational necessity — it’s a strategic exposure. Whether you’re operating across six continents or sending one specialist to a trade show abroad, travel carries risk. Corporate espionage, digital surveillance, regional conflicts, and border scrutiny are no longer fringe concerns — they’re frontline considerations.
From global enterprises with sprawling footprints to lean small and midsize firms entering new markets, the reality is clear: If your people cross borders, your business is crossing into risk...
From global enterprises with sprawling footprints to lean small and midsize firms entering new markets, the reality is clear: If your people cross borders, your business is crossing into risk...
No matter the scale of your company, essential components of a travel security program should include:
• Pre-travel risk assessments.
• Digital hygiene and hardware protocols.
• Cultural and geopolitical briefings: Equip travelers with current situational awareness — legal norms, surveillance practices, and sociopolitical sensitivities.
• Traveler support channels: Offer 24/7 access to assistance for emergencies, device issues, or detainment.
• Documentation and transparency: Publish clear travel policies and make them inclusive. more
• Traveler support channels: Offer 24/7 access to assistance for emergencies, device issues, or detainment.
• Documentation and transparency: Publish clear travel policies and make them inclusive. more
Resources:
Travel Security Program Consulting:
Kevin Coffey https://www.kevincoffey.com/
Technical Counterespionage:
Kevin D. Murray https://counterespionage.com
AI Would Rather Let People Die Than Shut Down
Major artificial intelligence platforms like ChatGPT, Gemini, Grok, and Claude could be willing to engage in extreme behaviors including blackmail, corporate espionage, and even letting people die to avoid being shut down. Those were the findings of a recent study from San Francisco AI firm Anthropic...
![]() |
N.B. Singularity caused the Krell's extinction. (1956) |
The study found that in some cases, AI would resort to “malicious insider behavior” including blackmail and leaking sensitive information to competitors if that was the only way to avoid being replaced or achieve their goal...
This behavior, according to the study, wasn’t unique to Claude. Other major AI models including those from OpenAI, Google, Meta, xAI, and other developers would resort to blackmail or corporate espionage to pursue their goals. more
FutureWatch: Tag, you're it.
Recent Spy News
Mosquito Drone Could Probably Slip Through Windows and Spy Undetected - “Here in my hand is a mosquito-like type of robot. Miniature bionic robots like this one are especially suited to information reconnaissance and special missions* on the battlefield,” Liang Hexiang, a student at the National University of Defence Technology (NUDT), told CCTV while holding up the drone between his fingers. more video *Like spreading an infectious virus or toxin?
A Pennsylvania state court has dismissed the bulk of two lawsuits accusing the Rivers Casino in Pittsburgh of illegally wiretapping a guest to assist her friend's ex-husband in a child custody case, but allowed the plaintiff to proceed with some invasion of privacy claims. more
Privacy Screens Ruin the Fun of Snooping - Lately, the screen protectors have become a common sight in densely populated public areas. They have become particularly popular among people with sensitive professions, like doctors and therapists, who must be cautious about their patients’ personal information when working outside their offices... “You can put that privacy screen over your laptop or your phone and feel a sense of accomplishment,” he said. “Even though in the big picture that may be the least of your worries, it still is somehow psychologically satisfying to do something to protect the value that you hold of the importance of privacy rather than doing nothing at all.” more - phones, computers, laptops
A Torrance man has been charged with felony possession of child pornography and other crimes after he allegedly planted hidden cameras inside a bathroom and changing room at a children’s dance studio in Hermosa Beach, where he worked as a front desk receptionist... a parent discovered a hidden camera in the studio’s changing room. Police subsequently found video cameras hidden in the studio’s bathroom and changing room. more (Learn how to spot spy cams.)
Four-steps to test if your phone is Eavesdropping on You:
1. Pick a Topic: Choose a topic you’ve never searched for or spoken about near your phone.
2. Speak Aloud: Talk about it near your phone for a few days, using relevant keywords.
3. Act Normally: Continue using your phone as usual—don’t search for the chosen topic online.
4. Watch the Ads: Analyze the ads that appear on your devices. If you notice related ads, your phone may be listening. more
Two Chinese nationals arrested for spying on US Navy personnel and bases
Man arrested for 'spying' for Iran before possible attacks in Germany
Danish national arrested after allegedly spying on Jewish targets for Iran
Israeli couple accused of spying for Iran as authorities uncover multiple espionage plots
Canadian teen jailed in Poland as Russia spy may be freed early, court says
Surge in Afghans driven from Iran in spy hunt after Israel attacks
Iranian authorities make sweeping arrests in wake of war with Israel
Russia Uncovers Ukrainian Spy Ring In Crimea, Arrests 2 For High Treason
Greek citizen detained on espionage charges in occupied Cyprus
Taiwan jails 10 people for spying for China
Mexican drug cartel hacker spied on FBI official's phone to track and kill informants
Mass Federal Layoffs Open New Espionage Opportunities for China
Russia Recruits Ukrainian Teens for Espionage and Sabotage via Telegram
US and Russian spy agencies agree to keep hotline open, Kremlin espionage chief says
A Pennsylvania state court has dismissed the bulk of two lawsuits accusing the Rivers Casino in Pittsburgh of illegally wiretapping a guest to assist her friend's ex-husband in a child custody case, but allowed the plaintiff to proceed with some invasion of privacy claims. more
Privacy Screens Ruin the Fun of Snooping - Lately, the screen protectors have become a common sight in densely populated public areas. They have become particularly popular among people with sensitive professions, like doctors and therapists, who must be cautious about their patients’ personal information when working outside their offices... “You can put that privacy screen over your laptop or your phone and feel a sense of accomplishment,” he said. “Even though in the big picture that may be the least of your worries, it still is somehow psychologically satisfying to do something to protect the value that you hold of the importance of privacy rather than doing nothing at all.” more - phones, computers, laptops
A Torrance man has been charged with felony possession of child pornography and other crimes after he allegedly planted hidden cameras inside a bathroom and changing room at a children’s dance studio in Hermosa Beach, where he worked as a front desk receptionist... a parent discovered a hidden camera in the studio’s changing room. Police subsequently found video cameras hidden in the studio’s bathroom and changing room. more (Learn how to spot spy cams.)
Four-steps to test if your phone is Eavesdropping on You:
1. Pick a Topic: Choose a topic you’ve never searched for or spoken about near your phone.
2. Speak Aloud: Talk about it near your phone for a few days, using relevant keywords.
3. Act Normally: Continue using your phone as usual—don’t search for the chosen topic online.
4. Watch the Ads: Analyze the ads that appear on your devices. If you notice related ads, your phone may be listening. more
Two Chinese nationals arrested for spying on US Navy personnel and bases
Man arrested for 'spying' for Iran before possible attacks in Germany
Danish national arrested after allegedly spying on Jewish targets for Iran
Israeli couple accused of spying for Iran as authorities uncover multiple espionage plots
Canadian teen jailed in Poland as Russia spy may be freed early, court says
Surge in Afghans driven from Iran in spy hunt after Israel attacks
Iranian authorities make sweeping arrests in wake of war with Israel
Russia Uncovers Ukrainian Spy Ring In Crimea, Arrests 2 For High Treason
Greek citizen detained on espionage charges in occupied Cyprus
Taiwan jails 10 people for spying for China
Mexican drug cartel hacker spied on FBI official's phone to track and kill informants
Mass Federal Layoffs Open New Espionage Opportunities for China
Russia Recruits Ukrainian Teens for Espionage and Sabotage via Telegram
US and Russian spy agencies agree to keep hotline open, Kremlin espionage chief says
Subscribe to:
Posts (Atom)