Jareh Sebastian Dalke, 30, was an employee of the National Security Agency (NSA) where he served as an Information Systems Security Designer from June 6, 2022, to July 1, 2022.
Thursday, October 6, 2022
Former NSA Employee Arrested on Espionage-Related Charges
Jareh Sebastian Dalke, 30, was an employee of the National Security Agency (NSA) where he served as an Information Systems Security Designer from June 6, 2022, to July 1, 2022.
Thursday, September 8, 2022
Sports Spying (again)
A Republic FC spokesperson tells CBS13 at they filed a complaint with U.S. Soccer claiming that an Orlando City FC employee was caught spying on the Republic during practice just a couple of days ago...
Republic representatives say they asked the employee to leave but he refused. He eventually left after about 45 minutes -- this after taking various notes and making phone calls.
There are no official U.S. Soccer rules against spying on teams ahead of a finals match. more
Thursday, August 11, 2022
U.S. Government Gets More Aggressive to Curb Espionage at Universities
Wednesday, June 22, 2022
“Real knowledge is to know the extent of one’s ignorance.”
The Strange Spy Case of Dr. Doublelives
An internationally recognized Mexican scientist who pleaded guilty to acting as an unregistered agent for the Russian government and spying on an FBI informant in the Miami area, was sentenced Tuesday to four years in a U.S. prison...
Cabrera led a double life — as a cardiac scientist and a foreign agent — while also being married to a woman in Russia and another in Mexico, according to the few public court records. Much of the case was treated as a deep secret on national-security grounds under the Classified Information Procedures Act, or CIPA. more
Saturday, May 7, 2022
KeyTap3 Exploit Knows What You Type Keyboard Eavesdropping
It then analyzes those clusters and utilizes statistical information about the frequency of the letter n-grams in the supposed language of the text.
Monday, April 11, 2022
China Could Turn its Commercial Satellites into Espionage Platforms
China is reportedly developing an advanced artificial intelligence (AI) system that could turn low-cost commercial satellites, already orbiting the Earth, into powerful espionage platforms. Reports suggest it could have a success rate roughly seven times higher than existing technology.
The new system is being developed by Chinese military researchers, who say it is capable of tracking moving objects as small as a car with extraordinary precision... more
Saturday, February 12, 2022
Foreign Spies Use Dating Apps... to access government secrets
Foreign spies are using Tinder and other dating apps to recruit Australians with access to sensitive government secrets. ASIO boss Mike Burgess made the alarming revelation while delivering his annual threat assessment, in which he also warned identifying anti-vaccine activists who could turn violent was proving difficult. more
---
The National Security Service of Armenia (HAAT) has detained 19 people suspected of being members of an "espionage network" in the South Caucasus nation. The HAAT said on February 10 that dozens of servicemen in different units of the the armed forces may have been involved in the activities of the spy network, which worked for an unspecified nation.
According to the security agency, recruitment took place via an
online dating service through which Armenian servicemen who possessed
classified data and documents would eventually join the spy ring. more
Hidden Wisconsin Restaurant Serves Espionage Fun With Food
A truly exceptional themed restaurant needs to go further than some wall decor and select menu items, it needs to provide a full theme experience, something that the SafeHouse Restaurant and Bar in Milwaukee, Wisconsin seems to have nailed completely. Let's put it this way, when you arrive at the 'hidden' SafeHouse, you need to provide a password to gain entry, but once you get inside the real show begins. morePersonal recommendation... The Mission Impossible - Go rogue with this mission. A large fishbowl filled with Bacardi Superior Rum, Roaring Dan's Dark Rum, orgeat, lemon, orange, pineapple, and grenadine - serves 2 spies nicely or 1 brave agent. more
Sunday, January 9, 2022
'Leaked' Chinese Spy-Spoof Mocking US Draws Response From MI6
A British intelligence official has thanked China for "free publicity" after state media posted a James Bond spoof in a misguided attempt to mock western intelligence agencies.
Beijing-backed Xinhua news posted a spoof video on Twitter with a tongue-in-cheek caption claiming to have found a "leaked video" of a "secret meeting" between MI6 - the organization that employs famous fictional spy James Bond - and CIA agents after British Chief of Secret Intelligence Service Richard Moore announced that the UK considered China its "single greatest priority."
The video drew a rare response from Moore... more
Monday, November 22, 2021
Israel Accuses Defence Minister's Household Staffer of Espionage
In a statement, the Shin Bet security service said the suspect corresponded with the unnamed person over social media. It said he provided photographs taken in the house as proof he had access and proposing installing malware on Gantz's computer.
Tensions run high between Iran and Israel over Tehran's nuclear programme and what Israeli officials describe as its military entrenchment and support of Israel's enemies in the region.
The Shin Bet said the suspect, who
performed housekeeping and cleaning tasks in Gantz's residence, was
indicted on espionage charges by a court in Lod, a city near Tel Aviv.
It said he was arrested after an investigation earlier this month. more
Sunday, October 17, 2021
Fluffer & Nutter - The Peanut Butter Sandwich Spies
A nuclear engineer for the U.S. Navy and his wife have been charged with trying to share some of the United States’ most closely held secrets on submarine technology with another country, according to court documents unsealed on Sunday.
The engineer, Jonathan Toebbe, was accused of trying to sell information on the nuclear propulsion system of Virginia-class attack submarines — the technology at the heart of a recent deal that the United States and Britain struck with Australia...
Over a series of exchanges, the F.B.I. persuaded the sender to leave information at a dead drop in return for cryptocurrency payments. The F.B.I. then observed Mr. Toebbe and his wife, Diana Toebbe, at the location of the drop, in West Virginia.
With
Ms. Toebbe acting as a lookout, Mr. Toebbe left an SD card concealed
inside half a peanut butter sandwich in a plastic bag, according to the
court documents. After the undercover agent retrieved the sandwich, Mr.
Toebbe was sent $20,000. more
Wednesday, September 8, 2021
Martian Helicopter - Coincidence or Espionage? You Decide.
China’s National Space Science Center is working on an aerial drone that bears a striking resemblance to NASA’ Ingenuity helicopter, currently on Mars. It’s got four outstretched wiry legs, two rotors stacked atop each other, and a simplified fuselage. It’s China’s take on NASA’s wildly successful aerial drone.
A press release from China’s National Space Science Center suggests the vehicle, called the “Mars cruise drone,” has passed acceptance and will presumably advance to the next stage of development. Eventually, the Chinese aerial drone could make it to Mars, where it will patrol the landscape and further China’s exploration of the Red Planet. To that end, the Mars cruise drone will be equipped with a spectrometer for performing aerial surveys and for studying the Martian geology. more
Espionage - It Still Happens and it Still Matters
The Director General of Mi5 noted in his annual threat update hostile states seeking to spy on certain governments is as old as the hills. Nevertheless, it still happens, and it still matters. Hostile States utilising someone on the ‘inside’ to acquire privileged information makes their job so much easier. Recently we have seen media coverage of a security officer at the British Embassy in Berlin arrested on suspicion of acting on behalf of a foreign intelligence agency.
This blog serves as a reminder that traditional spycraft does exist and importantly provides you with some high-level protective security principles that your organisation should consider. more
Friday, September 3, 2021
Security Director Alert: Wireless Key-Logger Hides in USB-C to Lightning Cable
A USB-C to Lightning cable with a hidden wireless key-logger can enable an attacker to capture everything you type from a distance of up to a mile.
Any tech-literate person knows you should never plug a USB key into any of your devices unless you trust the person giving it to you, but fewer know that the same applies to USB cables...
“We tested this out in downtown Oakland and were able to trigger payloads at over 1 mile,” he added...
...the new cables now have geofencing features, where a user can trigger or block the device’s payloads based on the physical location of the cable. more
These spy cables come in various configurations, including standard USB charging cables. They look exactly like authentic cables. An electronic test can identify a malicious spy cable easily. In fact, you can do it yourself. Click here for instructions.
Monday, February 1, 2021
Russian Hack Changes Court Rules on Handling Sensitive Information
Until recently, even the most secretive material — about wiretaps, witnesses and national security concerns – could be filed electronically. But that changed after the massive Russian hacking campaign that breached the U.S. court system’s electronic case files and those of scores of other federal agencies and private companies.
The new rules for filing sensitive documents are one of the clearest ways the hack has affected the court system. But the full impact remains unknown. Hackers probably gained access to the vast trove of confidential information hidden in sealed documents, including trade secrets, espionage targets, whistleblower reports and arrest warrants. It could take years to learn what information was obtained and what hackers are doing with it. more
Friday, January 1, 2021
Convicted Spy Granted Citizenship
Jonathan Pollard, 66, triumphantly kissed the ground as he disembarked from the aircraft after it landed in Ben Gurion International airport near Tel Aviv. more
Tuesday, December 22, 2020
Industrial Espionage and IP Theft in the Manufacturing Threat Landscape
via Rob Acker...
Today, the manufacturing industry promotes innovation, productivity
and trade to capitalize on opportunities created by changing demand and
technological advancements. However, the move towards connected
manufacturing has introduced sophisticated threats to data, intellectual
property (IP) and operations.
Industrial Espionage and IP Theft
Manufacturing organizations invest heavily in IP development. It’s
often an organization’s most valuable asset and its theft is among the
most damaging of manufacturing cyber-threats. Recently, manufacturing executives cited IP protection as their primary concern...
Although manufacturing organizations are reasonably advanced in their awareness of the cyber and information security risks they face, preparedness varies. A certified ISO 27001 Information Security Management System (ISMS), paired with independent testing, detection and response services, provides a transparent solution. more
Thursday, November 26, 2020
100 Best Spy Movies of all Time
Stacker compiled data on all spy movies to come up with a Stacker score—a weighted index split evenly between IMDb and Metacritic scores. Here are the best spy movies of all time... more
#5 - Duck Soup
Thursday, October 29, 2020
Microsoft Says Iranian Hackers Targeted Conference Attendees
Microsoft says Iranian hackers have posed as conference organizers in Germany and Saudi Arabia in an attempt to break into the email accounts of “high-profile” people with spoofed invitations.
The targets included more than 100 prominent people invited by the hackers to the Munich Security Conference, which is attended by world leaders each February, and the upcoming Think 20 Summit, which begins later this week in Saudi Arabia but is online-only this year.“We believe Phosphorus is engaging in these attacks for intelligence collection purposes,” said Tom Burt, Microsoft’s security chief, in a prepared statement. “The attacks were successful in compromising several victims, including former ambassadors and other senior policy experts who help shape global agendas and foreign policies in their respective countries.” more