Thursday, June 19, 2025
CISOs Anticipate Surge in Cyber Attacks Next Three Years
The report, “CISO Outlook 2025: Navigating Evolving Domain-Based Threats in an Era of AI and Tightening Regulation,” names cybersquatting, domain and DNS hijacking, and distributed denial-of-service (DDoS) attacks as the top three global cyber threats in 2024. These risks are only projected to escalate, as cybercriminals leverage new techniques and capabilities from AI and other modern technologies to launch more sophisticated attacks. Looking ahead, cybersquatting, domain-based attacks, and ransomware top the list of cybersecurity concerns for CISOs over the next three years. more
Flash: Councillors Put Phones in Kitchen Amid Bugging Claims
The protocol has been introduced at Attleborough Town Council following suspicions that one of the councillors has been secretly recording discussions and leaking details...
The new protocol about phones being left in the kitchen next to the council chamber relates to ‘under the line’ parts of the meetings, where the public can be excluded and confidential matters discussed...
Heineken and Shell Linked to Massive Espionage Scandal in Italy
On paper, Equalize provides services like business intelligence and reputation management. It conducts research into the reliability of suppliers, the position of competitors, or misconduct by customers’ staff. Under the counter, Equalize also sold confidential data gained from hacking into police systems, the Italian tax authorities’ systems, and the reporting center for suspicious bank transactions, according to the Italian authorities. The company also had informants within Italian government organizations. more
Protecting Electronic Devices When Crossing U.S. Borders
- Consider leaving your device behind.
- Password-protect your electronic devices with strong passwords
- Back up data before traveling.
- Remove sensitive data from a device before traveling.
- Remember that “deleted” files can be searched.
- Log out of cloud accounts
- Know your rights and legal status.
- Keep emergency contact information (including for an attorney) on paper to make this information available if a device is seized.
- If your device is seized, request a receipt (CBP Form 6051D)
- After a search, be sure to change your passwords.
Summer Reading: Philby’s Granddaughter Exposes Espionage’s Best-Kept Secret: Women
Philby’s new book, The Secret Lives of Women Spies, uncovers the hidden stories of female operatives, from Civil War spy Harriet Tubman to Resistance hero Josephine Baker and Soviet spymaster Agent Sonya.
Journalist and author Charlotte Philby writes in The Independent, the representation of women in espionage remains long overdue.
Philby—granddaughter of infamous double agent Kim Philby—offers a personal and poignant look into this evolution. Recounting her travels to Moscow and reflections on her grandfather’s complicated legacy, she notes the glaring absence of women in spy narratives. “Where were all the women?” she asks, recalling the male-centric portrayals of Cold War espionage in books, plays, and films.
Publication date : 19 Jun. 2025
Language : English
Print length : 240 pages
ISBN-10 : 0241709431
ISBN-13 : 978-0241709436
Britain’s MI6 Spy Agency - First Female Chief
Superyachts Are Getting Caught Up in Spy Scandals
Even the rich and powerful may not be safe from the world of international espionage, as recent reports have alleged that countries are using multimillion-dollar superyachts in spy operations. And at least one country, China, has reportedly been spying on the superyacht manufacturers themselves.
How are superyachts connected with spying?
Most notable is Russia, which is reportedly "using its unrivaled underwater warfare capabilities to map, hack and potentially sabotage critical British infrastructure," said The Sunday Times...
This is noteworthy given that many of these oligarchs' yachts have moon pools, which are openings in the bottom of a ship's hull that can be "used covertly to deploy and retrieve deep-sea reconnaissance and diving equipment," said the Times...
Beyond the yachts themselves, Chinese officials may be spying on superyacht manufacturers, in particular luxury shipbuilder Ferretti SpA, according to a Bloomberg report. more
Weird Spy Science: Watch Watches Computer
The concept, created by researchers from Ben-Gurion University, sounds like something out of a spy thriller, but the details reveal just how technically complex and narrowly feasible such an attack would be.
These ultrasonic transmissions operate between 18 and 22 kHz, just above the range of human hearing, and can carry data such as keystrokes or biometric information at up to 50 bits per second over distances of at least six meters.
For any part of the attack to work, multiple difficult steps must already be accomplished. (Whew!) more
Wednesday, June 11, 2025
Bugging Devices Found at Italian Yacht Builder Ferretti
...the Ferretti Group filed its own complaint... “Ferretti SpA considers itself an aggrieved party, having been wronged by the unlawful and improper installation of surveillance devices within its offices,” the statement said. more
Laptop Microphone Could Be Spying — Through Walls — Even When It’s Off
• The attack is surprisingly accessible: Researchers achieved over 94% accuracy in speech recognition using simple equipment like copper tape antennas, making this vulnerability exploitable by anyone with basic technical knowledge.
• Your “off” microphone might still be listening: Testing revealed that microphones often activate automatically when playing audio or video content, and some remain active even when apps appear muted. more
Spy Device Can Read Book Text from Nearly a Mile Away
As detailed in a new paper published in the journal Physical Review Letters, the team used interferometry, a commonly used technique in the world of astronomy that uses superimposed waves of light to create interference patterns, to develop the spy system.... Put simply, researchers applied a technology that space observatories use to a ground-based laser system to zoom across vast distances — with promising and somewhat creepy results. more
OpenAI's New Threat Report is Full of Spies, Scammers, and Spammers
Ever wonder what spies and scammers are doing with ChatGPT?
OpenAI just dropped a wild new threat report detailing how threat actors from China, Russia, North Korea, and Iran are using its models for everything from cyberattacks to elaborate schemes, and it reads like a new season of Mr. Robot.
The big takeaway: AI is making bad actors more efficient, but it's also making them sloppier. By using ChatGPT, they’re leaving a massive evidence trail that gives OpenAI an unprecedented look inside their playbooks.
1. North Korean-linked actors faked remote job applications. They automated the creation of credible-looking résumés for IT jobs and even used ChatGPT to research how to bypass security in live video interviews using tools like peer-to-peer VPNs and live-feed injectors.
2. A Chinese operation ran influence campaigns and wrote its own performance reviews. Dubbed “Sneer Review,” this group generated fake comments on TikTok and X to create the illusion of organic debate. The wildest part? They also used ChatGPT to draft their own internal performance reviews, detailing timelines and account maintenance tasks for the operation.
3. A Russian-speaking hacker built malware with a chatbot. In an operation called “ScopeCreep,” an actor used ChatGPT as a coding assistant to iteratively build and debug Windows malware, which was then hidden inside a popular gaming tool.
4. Another Chinese group fueled U.S. political division. “Uncle Spam” generated polarizing content supporting both sides of divisive topics like tariffs. They also used AI image generators to create logos for fake personas, like a “Veterans for Justice” group critical of the current US administration.
5. A Filipino PR firm spammed social media for politicians. “Operation High Five” used AI to generate thousands of pro-government comments on Facebook and TikTok, even creating the nickname “Princess Fiona” to mock a political opponent.
Why this matters: It’s a glimpse into the future of cyber threats and information warfare. AI lowers the barrier to entry, allowing less-skilled actors to create more sophisticated malware and propaganda. A lone wolf can now operate with the efficiency of a small team. This type of information will also likely be used to discredit or outright ban local open-source AI if we’re not careful to defend them (for their positive uses).
Now get this: The very tool these actors use to scale their operations is also their biggest vulnerability. This report shows that monitoring how models are used is one of the most powerful tools we have to fight back. Every prompt, every code snippet they ask for help with, and every error they try to debug is a breadcrumb. They're essentially telling on themselves, giving researchers a real-time feed of their tactics. For now, the spies using AI are also being spied on by AI.
Any Wall Can be Turned Into a Camera...
An ordinary camera could soon take photos of things that are out of sight, thanks to algorithms that interpret how light bounces off a wall.
“Normally, when light bounces off rough surfaces, like walls, it scrambles the scene into a messy blur,” says Wenwen Li at the University of Science and Technology of China, Hefei. “Our goal was to ‘unscramble’ that blur and recover the hidden scene. Think of it like turning a rough wall into a mirror.”
The method involves mapping the geometry and reflectance of the wall surface by taking many images under different lighting conditions, so the researchers could predict how each bump and groove would distort reflected light. Once they had created a digital model of the surface, the team devised equations to reconstruct a hidden image from the scrambled light pattern
Li and her colleagues have successfully demonstrated real-time imaging at 25 frames per second using an ordinary camera, like one found in a smartphone. more
Personnel Officer, "So, What Qualifies You for this National Security Position?"
His professional experience prior to joining a U.S. national security agency was remarkably similar to that of Thomas Fugate, who has just been appointed to lead terror prevention at the Department of Homeland Security.
A cybersecurity graduate of Florida Polytechnic University, Nathan Vilas Laatsch is the second national security official in two days whom The Daily Beast has revealed to have virtually no professional experience other than working at a grocery store before being hired by a U.S national security agency at the age of 22.
Laatsch, now 28, a computer scientist with “top secret” clearance at the Defense Intelligence Agency (DIA) in Virginia, was hired under the last Trump administration. He was arrested last week, accused of attempting to pass sensitive information to Germany’s Federal Intelligence Service (BND). more
FBI: Home Internet Connected Devices Facilitate Criminal Activity
The Federal Bureau of Investigation (FBI) is issuing this Public Service Announcement to warn the public about cyber criminals exploiting Internet of Things (IoT) devices connected to home networks to conduct criminal activity using the BADBOX 2.0 botnet. Cyber criminals gain unauthorized access to home networks through compromised IoT devices, such as TV streaming devices, digital projectors, aftermarket vehicle infotainment systems, digital picture frames and other products. Most of the infected devices were manufactured in China. Cyber criminals gain unauthorized access to home networks by either configuring the product with malicious software prior to the users purchase or infecting the device as it downloads required applications that contain backdoors, usually during the set-up process. Once these compromised IoT devices are connected to home networks, the infected devices are susceptible to becoming part of the BADBOX 2.0 botnet and residential proxy services known to be used for malicious activity.
WHAT IS BADBOX 2.0 BOTNET
BADBOX 2.0 was discovered after the original BADBOX campaign was disrupted in 2024. BADBOX was identified in 2023, and primarily consisted of Android operating system devices that were compromised with backdoor malware prior to purchase. BADBOX 2.0, in addition to compromising devices prior to purchase, can also infect devices by requiring the download of malicious apps from unofficial marketplaces. The BADBOX 2.0 botnet consists of millions of infected devices and maintains numerous backdoors to proxy services that cyber criminal actors exploit by either selling or providing free access to compromised home networks to be used for various criminal activity.
INDICATORS
The public is urged to evaluate IoT devices in their home for any indications of compromise and consider disconnecting suspicious devices from their networks. more
Friday, June 6, 2025
Behold The Amazing "AIR" Key
Corporate Spy v Spy v Spy v Spy, or Spy Cubed
The complaint accuses Deel of targeting, infiltrating, and compromising four other competitors, in addition to Rippling.
The revised complaint doesn’t name all of the four other alleged victims, except cryptocurrency-based tax and payroll compliance company, Toku. Toku is suing its competitor LiquiFi, also alleging corporate espionage and that Deel was involved...
So, A Man Steals A Cherry-Picker...
A man carjacked an L.A. County Sheriff’s Department bucket truck early Wednesday morning while a sheriff’s deputy was precariously positioned high above the ground in the bucket, authorities said....
Two undercover deputies were using the truck to remove concealed cameras when a man jumped into the vehicle, said he had to go to the hospital and began to drive away, law enforcement sources told The Times.
Supermarket Facial Recognition: "Attention. Miscreant in Asile 5."
The trial covered 25 supermarkets in which more than 225.9 million faces were scanned ... the system was effective at reducing harmful behavior, especially reducing serious violent incidents...The system only identified people who have engaged in seriously harmful behavior, while people under 18 or deemed vulnerable were not included on the list.
The Privacy Commissioner’s Office is currently working on New Zealand’s first code of practice for regulating biometric data, slated to be released by mid-2025. more
Book: Cyber for Builders: The Essential Guide to Building a Cybersecurity Startup
Cyber for Builders: The Essential Guide to Building a Cybersecurity Startup
From the Off-Topic Files
This dataset contains over 7500 fart recordings that were collected over a period of 37 months.
Suggested Uses
• Unsupervised signal classification - You can experiment with categorizing farts without any preexisting knowledge of defining characteristics and potentially apply these learnings to other signal types - speech, radar, tv, radio, light, EEG.
• Supervised signal recognition - This dataset could be used to experiment with developing deep learning models capable of recognizing whether a sound is a fart. An interesting property of farts is variable frequencies and inconsistent durations.
• Sound effects creation - This dataset could be used by sound designers or audio engineers as a basis to create new sound effects for movies, video games, or other media. You could also simply use it as a publicly available and free source of farts.
• Education and outreach - Educators and scientists can use this dataset as an approach to better engage their audiences in signal processing and deep learning.
License
• This data is publicly and freely available to use and modify however you would like. There is no license and no limitations for use. I would appreciate being notified of this data being used publicly, purely for my own entertainment. more
Tuesday, May 27, 2025
Belgium Bugged Football Stadium Box to Spy on Huawei MEP Lobbying
They also listened into other conversations involving one of Huawei’s leading lobbyists, including in his car.
Dutch Government: More Forms of Espionage to be a Criminal Offence
Legislation already exists which makes traditional espionage, such as sharing state secrets, a criminal offence. The problem is that espionage is changing in terms of its manifestations and use.
Türkiye: China Is Spying on Uyghurs Using Fake Cell Towers
Earlier this month, Turkish intelligence agents arrested seven suspects and discovered their vehicles outfitted with IMSI-catcher devices. These devices, which emulate genuine base stations, can intercept data, call logs, conversations, and other sensitive information from nearby mobile phones.
Intelligence sources indicate that some members of this espionage ring entered Türkiye as recently as March. However, a report last week disclosed that the network has been operational for the previous five years. more
China’s Spy Agency Warns - Foreigners Posing as Scholars, Tourists or ‘Insincere Lovers’
In a post on its official social media account on Sunday, the Ministry of State Security said foreign spies might be hiding in plain sight, using various identities to carry out activities that threaten China’s national security.
It highlighted five deceptive identities commonly used by foreign spies: tourists who do not sightsee, scholars who conduct no real research, businesspeople who do not do business, investigation consultants who do not investigate, and “insincere lovers” who exploit relationships to gather information. more
FutureWatch / Spytech: Contact Lenses Allow Seeing in the Dark, Even With Eyes Closed
"Our research opens up the potential for noninvasive wearable devices to give people super-vision," says senior author Tian Xue, a neuroscientist at the University of Science and Technology of China. "There are many potential applications right away for this material. For example, flickering infrared light could be used to transmit information in security, rescue, encryption or anti-counterfeiting settings." more
Friday, May 23, 2025
AI Can't Protect It's IP Alone - It Needs TSCM
Altman himself was paranoid about people leaking information. He privately worried about Neuralink staff, with whom OpenAI continued to share an office, now with more unease after Elon Musk’s departure. Altman worried, too, about Musk, who wielded an extensive security apparatus including personal drivers and bodyguards.
Thursday, May 22, 2025
This Week in Spy News
![]() |
Vlogger, Jyoti Malhotra |
• Netherlands expands espionage laws to include cyber activities more
• After vlogger arrest, Haryana says more YouTube channels under espionage scanner more & more & more
• Russia’s intelligence services turned Brazil into an assembly line for deep-cover operatives. A team of federal agents from the South American country has been quietly dismantling it. more
• Why seduction is the weapon of choice in spying more
• Corrections sergeant accused of voyeurism - accused of putting a camera inside a shampoo bottle more
• Sen. Steinhardt sounds alarm after spy tech found in Chinese solar inverters more
• Bartender arrested for hidden cameras in restaurant bathroom, home more
• FBI Director Kash Patel Abruptly Closes Internal Watchdog Office Overseeing Surveillance Compliance more
• Researchers warn of China-backed espionage campaign targeting laid-off US workers more
• What China's spies are doing in the U.S., and what happens when they're caught more (CBS 60 Minutes)
• CIA Gadget-Maker Rates 11 Spy Gadgets In Movies And TV video
The Cold War Spy Technology Which We All Use
Moscow, 4 August, 1945. The European chapter of World War Two was over, and the US and the USSR were pondering their future relationship.
At the American embassy, a group of boys from the Young Pioneer Organization of the Soviet Union made a charming gesture of friendship between the two superpowers.
They presented a large, hand-carved ceremonial seal of the United States of America to Averell Harriman, the US ambassador. It was later to become known simply as The Thing.
GPS Trackers: Under Cover & Under the Hood
They are disguised to look like legitimate vehicle parts.
You can view all 38 photos here.
"Take it Down" Law Signed - Thank Nancy Mace
“Freedom is not a theory. It is the right to breathe. It is the right to dress and undress, to sleep without someone’s camera filming your naked body,” the congresswoman said during a House Oversight Committee hearing. “The Founders wrote liberty in parchment, but hidden cameras erase it in pixels.”
“I speak not just as a lawmaker, but as a survivor.” more
A North Korean Agent Applied for a Job - A Halloween Question Tripped Him Up
But it wasn’t until they compared Smith’s email to a list of those suspected to be part of a hacker group that their suspicions were confirmed: Smith was a North Korean operative.
Kraken could have just tossed the application. Instead, Kraken’s chief security officer, Nick Percoco, decided to take a closer look at Steven Smith...
The interview was scheduled for Halloween, a classic American holiday—especially for college students in New York—that Smith seemed to know nothing about.
“Watch out tonight because some people might be ringing your doorbell, kids with chain saws,” Percoco said, referring to the tradition of trick or treating. “What do you do when those people show up?” Smith shrugged and shook his head. “Nothing special,” he said. more
Find Out if Someone is Spying on Your Facebook Account
You should be the only one to control your account. To ensure this, periodically verifying that everything’s secure is a wise idea...
Meta buries this info in its account center. To go directly there, head to https://accountscenter.facebook.com/password_and_security/login_activity.
- Open the Facebook website in your browser
- Click on your profile icon at the top right of the window
- Choose Settings & privacy
- Select Settings
- Under Accounts Center in the upper left, click on See more in Accounts Center
- Choose Password and security
- Under Security checks, click on Where you’re logged in
Going Away This Holiday Weekend? Hide Your Stuff
A bold thief made off with a $25,000 Jet Ski in broad daylight Wednesday, and the crime was caught on doorbell camera.
Enjoy the Long Weekend: CIA Officers Reveal Their Top Spy Movies
1. A Most Wanted Man (2014)2. Tinker Tailor Soldier Spy (2011)3. Red Joan (2018)4. The Little Drummer Girl (1984)5. Argo (2012)6. Syriana (2005)7. The Good Shepherd (2006)8. The Hunt for Red October (1990)9. Spy (2015)10. Three Days of the Condor (1975)11. North by Northwest (1959)12. The Spy Who Came In From the Cold (1965)13. The Amateur (1982)14. Ill Met By Moonlight, aka Night Ambush (1957)15. The Third Man (1949)
Wednesday, May 7, 2025
Vatican to Deactivate Mobile Phone Signals
The Vatican also plans to use signal jammers around the Sistine Chapel to prevent electronic surveillance or communication outside the Conclave that will see 133 Cardinals vote on who will succeed Pope Francis and lead the world’s 1.4 billion Catholics, Italian news agency ANSA reported.
Phone signal will be cut off at 3.00 pm local time (9.00 am ET) today, an hour and a half before the Cardinals are scheduled to proceed to the Sistine Chapel to begin the papal conclave, Italian state broadcaster RAI reported on Monday. more
So get down without your phone,
Comfort knowing you're not alone,
Bow your head with great respect,
And disconnect, disconnect, disconnect!
NSO Group Pegasus Spying Software Fined $168 Million in Damages
How Apple's Network can be a Potential Tracking Tool
FutureWatch: Apple is Developing AirPods with Cameras
Visual Intelligence integration
With the iPhone 16 lineup, Apple introduced Camera Control. This new button is great for taking photos and adjusting camera settings, but it also unlocked a new feature: Visual Intelligence.
Visual Intelligence is a powerful tool that helps users learn about the world around them, and allows users to take action based on the physical context around them. You can add an event flyer to your calendar, for example, or tap into the power of ChatGPT or Google to help learn about something you don’t understand. more
Apple’s iPhone Warning—400 Million Chrome Users Must Now Act
Secret Cameras Found in Bathrooms
"This is like a safe and sacred place for many children for the last over 25 years. So, I'm horrified," Liliana Somma, the owner of School of Dance and Music, said through tears.
Now, Somma is taking every precaution she can think of... "Also, we bought these regular sweeping devices that we're going to be doing throughout the day, which I think everyone should be doing," Somma said. "But that's what we're going to be doing. That's newly purchased. We also added cameras in the hallway so we can see who is coming in and out of the studio itself." more
A Professional Electronic Surveillance Operation Described
Wednesday, April 16, 2025
EU Hands Out Burner Phones to US-bound Staff Over Spying Fears
The Financial Times reported on Monday that European Commissioners and senior officials travelling to the IMF and World Bank spring meetings next week have been given the new guidance to take basic phones and laptops. "They are worried about the US getting into the commission systems," FT quoted one official as saying. "The transatlantic alliance is over," the report said, quoting another anonymous EU official. more
Cameras Are Popping Up in Eldercare Facilities
Spy Quote of the Week
"I smashed my old phone with an axe and put it down the drain at my mother-in-laws's house."Not a movie scene, but: the directions former Rippling employee-turned-corporate spy Keith O’Brien said he received from a Deel attorney (and carried out) to destroy evidence in an ongoing legal battle between the two HR tech companies, according to a recent court filing via TechCrunch.
Deel CEO Alex Bouaziz is accused of hiring O’Brien to collect intel on competitor Rippling — product road maps, customer accounts, sales leads, etc. — in a four-month-long scheme, according to the lawsuit. O’Brien’s compensation? Allegedly just $6k a month. Not exactly hush money, it seems.
Google: Human Surveillance Isn't Enough - Target Dolphins
The system, announced on Google's blog, makes use of 38 years of underwater recordings from the Wild Dolphin Project (WDP), the longest-running study of its kind. These recordings capture everything from mother dolphins calling their calves with unique signature whistles to aggressive "squawks" during confrontations. The AI processes these vocalizations in real-time, searching for patterns that could unlock the dolphins' communication code. more