Showing posts with label #eavesdropping. Show all posts
Showing posts with label #eavesdropping. Show all posts

Wednesday, December 7, 2022

Canada Awarded RCMP Contract to Firm with Ties to China

Canada - The federal government awarded a contract to provide and maintain RCMP communications equipment to a company with ties to the Chinese government, Radio-Canada has learned.

The contract has security experts raising concerns about potential Chinese access to RCMP communications and data.

On October 6, 2021, the federal government awarded Sinclair Technologies a contract worth $549,637 for a radio frequency (RF) filtering system. One of the system's purposes is to protect the RCMP's land-based radio communications from eavesdropping...

Conor Healy, a Canadian now based in Washington, said, "the risks include eavesdropping, collection of communications data and jamming or shutting down the radio communications system." more

Tuesday, December 6, 2022

Just Because You are Paranoid... Device Found in CEO's Car

Eskom CEO, André de Ruyter, has doubled down on the claim that he stumbled upon a highly sophisticated tracking device under the driver’s seat of his Volvo...

This comes after details were provided to press in October about a circuit board, described as an “NSA-level device”, that De Ruyter found while cleaning his car.

Articles cited a preliminary report prepared by former police commissioner George Fivaz who claimed the device isn’t commercially available, and is typically used by law enforcement and intelligence agencies...

Journalists were provided photos of the circuit board, which they duly published....

Security researcher Daniel Cuthbert was willing to comment on the record.

He explained that, based on the evidence, the device was likely nothing more than a remote of some kind.

Such a remote button could be a gate or garage opener, a panic button, or a way to arm and disarm a home alarm.

MyBroadband’s in-house researcher and electronic engineer Wikus Steyn agreed.

“There is no GPS chip or antenna, so no tracking that way. I see no mic onboard, although there is what seems to be a 2-pin input at the top, but that is most likely for a push button,” Steyn stated. He also said the quality of soldering suggests cheap mass production. more

Our take... I agree with Dan and Wikus. (but be sure to read the last paragraph) If the TI IC info in the photo is correct TI lists the chip's applications as:

1.2 Applications
  • Low-Power, High-Performance, Wireless Systems With Data Rate Up to 1250 kbps
  • ISM/SRD Bands: 169, 433, 868, 915, and 920 MHz
  • Possible Support for Additional Frequency Bands: 137 to 158.3 MHz, 205 to 237.5 MHz, and 274 to 316.6 MHz
  • Smart Metering (AMR/AMI)
  • Home and Building Automation
  • Wireless Alarm and Security Systems
  • Industrial Monitoring and Control
  • Wireless Healthcare Applications
  • Wireless Sensor Networks and Active RFID
  • IEEE 802.15.4g Applications
  • Wireless M-Bus, All Modes
Eskom CEO, André de Ruyter, may have misidentified this item, but it definitely doesn't mean he is not being surveilled. Thoughts of tracking and bugging are not normal. Something has made him suspicious. Trust your instincts, André. Get some professional TSCM help, and don't make it a public issue.

Monday, October 31, 2022

Retail Employee Says Company Installed Illegal Audio-Recording Cameras at Work

In the U.S., most surveillance laws are dictated at the state level. While the majority of workplaces allow companies to install video cameras that capture visuals of whatever is going on in the store, including interactions of customers and employees, recording audio of their conversations is strictly prohibited in many states.

One of those states is New York, which has implemented anti-eavesdropping statutes that protect employees' conversations from being recorded while at work.

TikToker Ethan Carlson, who posts under the handle @therealethancarlson, recently uploaded a video about his workplace's audio-enabled cameras, prompting many viewers to urge him to report his employer.

In a now viral clip, Ethan says to the camera, "This is not a f--king drill, my place of work has installed these cameras."

He then points his camera lens and zooms in to show security devices installed up high in his store. more

Wednesday, October 19, 2022

Sensors Tap Into Mobile Vibrations to Eavesdrop Remotely

Using an off-the-shelf automotive radar sensor and a novel processing approach, Penn State researchers demonstrated they could detect the vibrations of a cell phone's earpiece and decipher what the person on the other side of the call was saying with up to 83% accuracy...

The radar operates in the millimeter-wave (mmWave) spectrum, specifically in the bands of 60 to 64 gigahertz and 77 to 81 gigahertz, which inspired the researchers to name their approach "mmSpy." This is a subset of the radio spectrum used for 5G, the fifth-generation standard for communication systems across the globe.

In the mmSpy demonstration, the researchers simulated people speaking through the earpiece of a smartphone. The brand is irrelevant, Basak said, but the researchers tested their approach on both a Google Pixel 4a and a Samsung Galaxy S20. The phone's earpiece vibrates from the speech, and that vibration permeates across the body of the phone.

"We use the radar to sense this vibration and reconstruct what was said by the person on the other side of the line," Basak said, noting that their approach works even when the audio is completely inaudible to both humans and microphones nearby. more

This paper presents a system mmSpy that shows the feasibility of eavesdropping phone calls remotely. Towards this end, mmSpy performs sensing of earpiece vibrations using an off-the-shelf radar device that operates in the mmWave spectrum (77GHz, and 60GHz). abstract

FM Bug Kits from China - $0.70

 Just when you thought electronic surveillance couldn't get more affordable... more




Saturday, October 15, 2022

SPECIAL EDITION: U.S. Bugging Operation Against Soviets

by Zach Dorfman
Recently, I obtained a set of declassified 1980s intelligence files from Poland’s cold war-era archives. The files detailed a Soviet operation to identify and remove a cornucopia of bugs placed in Russian diplomatic facilities across the United States. 

The document — written in Russian and almost certainly produced by the KGB, unlike the other Polish-language files in the tranche of documents — provides a meticulous pictorial account of the ways in which the U.S. spy services sought to technically surveil the Russians on American soil. The file offers an unprecedented, stunning — if dated — look at these efforts to eavesdrop on Russian government activities within the U.S.

Click to enlarge.

The file details a number of bugs found at Soviet diplomatic facilities in Washington, D.C., New York, and San Francisco, as well as in a Russian government-owned vacation compound, apartments used by Russia personnel, and even Russian diplomats’ cars. 

And the bugs were everywhere: 
  • encased in plaster in an apartment closet; 
  • behind electrical and television outlets; 
  • bored into concrete bricks and threaded into window frames; 
  • inside wooden beams and baseboards;
  • stashed within a building’s foundation itself; 
  • surreptitiously attached to security cameras; 
  • wired into ceiling panels and walls; 
  • and secretly implanted into the backseat of cars and in their window panels, instrument panels, and dashboards. 
It’s an impressive — and impressively thorough — effort by U.S. counterspies... 

Click to enlarge.
“The number of bugs is useful as an indication that this is a sustained operation over years,” a former U.K. intelligence official with experience conducting technical operations told me. (The official requested anonymity to discuss sensitive intelligence techniques.) The sheer variety in where U.S. counterspies placed the bugs shows a great deal of “creativity” on their part, the former U.K. official said. While the bugging of cars and power outlets is considered “fairly standard,” the former official added, U.S. spies cleverly inserted bugs in more unusual locations like window frames...

It's unknown why the Soviets declined to publicize all the bugs they found within their U.S.-based facilities. The Russians ripped them out from their hiding spots, ostensibly preventing them from feeding the U.S. disinformation through the listening devices and trackers they identified.

Click to enlarge.
The likelier explanation is that the KGB knew that U.S. diplomatic facilities in the Soviet Union were bugged to hell — including, at certain points, with listening devices activated by blasting American facilities with microwaves. The use of this technique by the Soviets, which some U.S. officials believed sickened those exposed to it, became a serious diplomatic issue in the 1970s between the two superpowers. more

(Kevin) A friend of mine, now deceased, was one of the CIA technical specialists during this time period who developed and planted these devices. He was prohibited from discussing the actual devices and placement operations even after he retired. However, he did write a "fictitious" story which details a typical bugging operation. Corporate security directors especially should read... The Attack on Axnan Headquarters: An Espionage Operation

Thursday, October 6, 2022

Office Bugging Leak Inquiry—Given 7 Days to Submit Report

Pakistani Prime Minister Shehbaz Sharif had ordered the formation of a committee to investigate the leaking of several audio files
and a review of cybersecurity at the prime minister’s office (PMO). Formally starting today, the committee will probe the public release of audio clips that took place in the PM office. 

PM Office leak inquiry committee is chaired by Rana Sanaullah, Interior Minister, the main agenda behind it is to inquire how this bugging was done and how cyber security was compromised from such a sensitive office...

Debugging practices (TSCM) are done in government offices but authorities doubt that some advanced mobile phone applications were used. For this, the formal body is going to engage intel agencies and technical experts. more

Tuesday, August 23, 2022

A Warning Worth Repeating — iPhone's Spying Feature

iPhone’s ‘spying’ feature lets you eavesdrop on conversations without people knowing...

The Apple iPhone is packed full of secret tools and tricks. But one feature is possibly the sneakiest of them all.

The iPhone's 'Live Listen' feature was originally intended to help people with hearing difficulties better manage conversations in noisy environments.

It lets you listen to a live audio feed through your AirPod earphones using the iPhone's microphone from a distance.

However, if used correctly, it means you could listen in on any conversation from outside a room without anybody else knowing. All you'd have to do is hide your iPhone somewhere in the room. more

Tuesday, August 16, 2022

Indoor Optical Fiber Eavesdropping Approach and its Avoidance

Eavesdropping exploit found in fibre-optic cables
Researchers in China have created a new technique for long-distance eavesdropping by tapping into fibre-optic cables, which are prominently used in networks across the globe.Abstract: The optical fiber network has become a worldwide infrastructure. In addition to the basic functions in telecommunication, its sensing ability has attracted more and more attention. more

In this paper, we discuss the risk of household fiber being used for eavesdropping and demonstrate its performance in the lab. 

Using a 3-meter tail fiber in front of the household optical modem, voices of normal human speech can be eavesdropped by a laser interferometer and recovered 1.1 km away

The detection distance limit and system noise are analyzed quantitatively. We also give some practical ways to prevent eavesdropping through household fiber. more

Eavesdropping via fiber optics is actually far from being new, as anyone who dealt with Mason & Hanger last century could tell you. In fact, we were alerting our clients to fiber optic eavesdropping microphones on our thank you mugs...
"Spy Trick #409 - Fiber Optic Microphone"
1994 - 1999
Number made - 323




Thursday, August 11, 2022

Journalist Vitaliy Portnikov Finds a Bed Bug

At home in Lvov, journalist Vitaliy Portnikov, presenter of a program about Espresso and Radio Liberty, found a listening device – a voice recorder with the ability to record for a long time.

About this in facebook Deputy Mykola Kniazhitsky said, reports Ukrinform.

“Journalist Vitaliy Portnikov, presenter of a program on Espresso and Radio Liberty, found a listening device at home in Lviv. This is a voice recorder with the ability to record for a long time. The police were called. They were quickly on the spot. do not know who and what purpose this device has installed: our services, foreign or criminals,” said the politician.




Vitaly Portnikov commented on the incident for “Espresso“: “Today, while cleaning the apartment in which I was located at the end of February, when the war started, I found a recording device under the bed. There was an inventory number on the device. I notified the police of my find so they could investigate the incident.”

Vitaliy Portnikov is a well-known Ukrainian journalist, publicist and political commentator. Works with Radio Liberty and Espresso. more

Wednesday, July 13, 2022

Walmart Patents Technology to Eavesdrop on Workers

In the latest piece of evidence that we’re living squarely in a dystopia, Walmart has won a patent for technology that will allow bosses to eavesdrop on their workers. 

The audio surveillance technology can measure workers’ performance and listen to their conversations with customers at checkout. The “listening to the frontend” technology, as its called, might never be used—it’s one of many patents the company has applied for in recent years—but shows that company bosses are thinking about how they can use tech to monitor their workers. 

Walmart said in a statement: “We’re always thinking about new concepts and ways that will help us further enhance how we serve customers... more

Wednesday, June 22, 2022

In The Listeners, Brian Hochman Details History of Eavesdropping (Book Review)

The Listeners: A History of Wiretapping in the United States
, by Brian Hochman, Harvard University Press, 368 pages, $33.67

America's first wiretapping conviction happened in 1864. A stockbroker named D.C. Williams had been tapping a telegraph line in California to get corporate information, which he used for advantageous stock trades. The law he broke had been passed two years earlier, making California the first state to regulate wiretapping.

The telephone had not been invented yet, and the transcontinental telegraph had only just been completed. The Golden State's legislators were ahead of the game. Ever since then, legislation dealing with electronic surveillance has been playing catch-up—both with the technology and with public sentiment. more

Thursday, June 2, 2022

What Can a Private Investigator do for Your Business?

Businesses can go under for several reasons, sometimes they simply aren’t profitable whereas other times something sinister is happening underneath that most business owners aren’t aware of.

Corporate espionage is bigger than you may think and if you have a product or industry secret that your competitors would love to get their hands on then hiring a private detective can help. There are many ways your competitors may use to steal your business data, some of which could be installing malware on your company computers or bugging your office or meeting rooms.


A private detective can be hired to search your business for electronic bugs and get rid of them accordingly. If you think this is a work of fiction and it doesn’t happen you would be mistaken. Bugs are placed in businesses and private residents illegally all of the time. more

Researchers Develop Anti-Eavesdropping Algorithm for Smartphone Mics

At Columbia University, a team of researchers has successfully created a program that can block out audio spying through microphones found in smartphones and connected audio devices that require voice use.


This algorithm works by using predictive voice technology: that is, it can recognize human speech and instinctively generate audible background noise like muffling or whispers in order to camouflage the user’s words.

The technology works in real-time as the algorithm is able to create the obstruction while a person is speaking to a voice-controlled device or conversing with a friend.

But why create such an algorithm in the first place?

The problem stems from advertiser eavesdropping. While this is an issue that has not been proved or disproved, there is plenty of anecdotal evidence that backs it up. more

Thursday, May 26, 2022

‘American Idol’ Winner Accused of Bugging LSU Student’s Dorm

American Idol winner Laine Hardy has been accused of bugging his ex-girlfriend’s dorm room at Louisiana State University so he could listen in on her conversations, according to a warrant obtained by WBRZ. 

The 21-year-old country singer was arrested Friday on charges of interception and disclosure of wire, electronic or oral communication. Investigators allegedly found several recordings on the device, including some of Hardy’s “very distinguishable” voice. 

In a vague Twitter post, Hardy acknowledged on Thursday that he’d received a warrant over “allegations” and was “cooperating” with the cops. “I humbly ask for privacy at this time,” he wrote. more

The Associated Press reported that Hardy’s ex-girlfriend and her roommate found the alleged listening device, which looked like a phone charger, in their dorm room on April 6. She reported it to LSUPD the next day, and officers noted in a police affidavit acquired by the AP that they found recordings from a 10-day span in February. more

Sunday, May 15, 2022

Ex-Coca-Cola Chemist Sentenced for Stealing $120 Million Trade Secret

A Chinese chemical engineer was sentenced to 14 years in prison for stealing trade secrets on drink can coatings to establish a Chinese company backed by the Chinese government.

Xiaorong “Shannon” You, 59, was sentenced on Monday by a federal judge in Greeneville, Tennessee, on the charges of conspiracy to commit trade secret theft, conspiracy to commit economic espionage, possession of stolen trade secrets, economic espionage and wire fraud. In addition, she is ordered to pay a $200,000 fine and serve three years of supervised release.

“Stealing technology isn’t just a crime against a company,” Acting Assistant Director Bradley S. Benavides of the FBI’s Counterintelligence Division said in a release. “It’s a crime against American workers whose jobs and livelihoods are impacted.” more

Chinese CCTV Cameras on British Streets Contain Hidden Microphones

Chinese-made surveillance cameras in Britain are made by companies linked to human rights atrocities and can pick up sound with hidden microphones, with this capability able to be activated remotely, according to the British government’s “snooping tsar”. more

We're shocked... that Brit techs didn't clip the microphones out before installing them.

Things Often Mistaken for Eavesdropping Bugs

“Is this a bug?” is a question we are often asked.


Usually the answer is, “I understand why you are asking is this a bug. Some bugs do look similar to this. But, here is what you actually found.”

Real electronic eavesdropping devices are getting smaller. So are lots of other little electronic bits which are part of our everyday lives. Distinguishing between the two can be tricky. 

If the object you found makes you think, is this a bug, keep reading. You stand a good chance of finding your answer here...  more

Saturday, May 7, 2022

The Colorful Side of Eavesdropping & Wiretaps

Russian fighters have been sharing tips with one another about how to deliberately damage their own equipment
and hamper Russian President Vladimir Putin’s war plans in Ukraine, according to recordings of alleged Russian troops’ phone calls that the Security Service of Ukraine (SBU) intercepted...

In one regiment, one Russian soldier allegedly said they’ve been pouring sand into the tanks’ fuel systems to clog them up.

“I don't follow stupid orders, I simply refuse,” one fighter can be heard telling a comrade. “The motherf*cker sent me to tanks, motherf*cking piece of shit. I f*cked it up and that's it.”

When the fellow Russian soldier on the other end of the line heard the unit wasn’t punished for the insubordination, he indicated he might repeat the tactic later in his own unit...

Inspired by the Russians’ intercepted phone calls, Ukraine’s government encouraged other Russian troops to disobey orders and refuse to attack, echoing earlier calls to surrender and abandon the war path. more

Sunday, April 24, 2022

New Algorithm to Shield Conversations from Eavesdropping AI

The thought that our gadgets are spying on us isn't a pleasant one, which is why a group of Columbia University researchers have created what they call "neural voice camouflage." 

This technology won't necessarily stop a human listener from understanding someone if they're snooping (you can give recordings a listen and view the source code at the link above). Rather, this is a system designed to stop devices equipped with microphones from transmitting automatically transcribed recordings. It's quiet – just above a whisper – but can generate sound specifically modeled to obscure speech in real time so that conversations can't be transcribed by software and acted upon or the text sent back to some remote server for processing...

According to Vondrick, the algorithm his team developed can stop a microphone-equipped AI model from interpreting speech 80 percent of the time, all without having to hear a whole recording, or knowing anything about the gadget doing the listening. more