Showing posts with label #spytech. Show all posts
Showing posts with label #spytech. Show all posts

Monday, August 4, 2025

You can live in a spy movie if...

...you’ve got some cash sitting around: 

British underwater jetpack maker CudaJet has done what you’d expect an underwater jetpack maker to do: they made an underwater jetpack.

 The 31-pound hands-free, backpack-like device, which is made to order and starts at ~$31k, will help rich people live out their dolphin dreams — diving 130+ feet down and propelling them forward 7 mph at a time. 

CudaJet says it comes with a controller and that it all takes five minutes to get comfortable with it. more

The Farmhouse Spy

A simple farmhouse and a mysterious dish set the stage for a real-world spy thriller.
When French counterintelligence spotted that setup, they realised someone was tapping into high-value space communications.

The homeowner, Dong H., was no ordinary resident. A former employee of Beijing’s Academy of Science and Technology and president of Stahd Europe—a subsidiary of Emposat, the Chinese communications specialist—she had all the credentials for espionage. Emposat’s failed bid to install a ground station in the Czech Republic underscored how wary governments are of hidden antennas.

French investigators couldn’t prove data theft outright, but they confirmed the dish was finely tuned to CNES frequencies. Instead of a raid, authorities filed legal charges for illegal antenna installation, quietly dismantling the operation. Dong’s rural hideout shows how easy it can be to set up covert surveillance right under everyone’s nose. more

Thursday, July 24, 2025

FutureWatch: As You Distort Wi-Fi Space You Become Identifiable

Wi-Fi networks could soon track you without devices, as Italian researchers harness signal distortions to create unique biometric identifiers...
Researchers in Italy have shown that even ordinary Wi-Fi signals can be used to track people, without needing them to carry any device at all.

A team from La Sapienza University of Rome has developed a system called ‘WhoFi,’ which can generate a unique biometric identifier based on how a person’s body interacts with surrounding Wi-Fi signals. WhoFi can identify people within a Wi-Fi area with an accuracy of 95.5%.

The approach, described in a preprint paper, uses signal distortions caused by the human body to re-identify individuals as they move across spaces covered by different Wi-Fi networks.

More information: Danilo Avola et al, WhoFi: Deep Person Re-Identification via Wi-Fi Channel Signal Encoding, arXiv (2025). DOI: 10.48550/arxiv.2507.12869

Roach Coach for Spy Tech

Spy Cockroaches and AI Robots...
Germany plots the future of warfare.

Sven Weizenegger, who heads up the Cyber Innovation hub, the Bundeswehr's innovation accelerator, said the war in Ukraine was also changing social attitudes, removing a stigma towards working in the defence sector. "Germany has developed a whole new openness towards the issue of security since the invasion," he said.

Some of the ideas under development feel akin to science fiction – like Swarm Biotactics' cyborg cockroaches that are equipped with specialised miniature backpacks that enable real-time data collection via cameras for example...

"Our bio-robots - based on living insects - are equipped with neural stimulation, sensors, and secure communication modules," said CEO Stefan Wilhelm. "They can be steered individually or operate autonomously in swarms...

"We just need to get to this mindset: a strong defense industrial base means a strong economy and innovation on steroids," said Markus Federle, managing partner at defence-focused investment firm Tholus Capital. more

FutureWatch: Spy-Grade Storage Drive

...self-destructs on demand just like in the movies!

It's not every day that you come across a product where the standout feature is its ability to go kaput at a moment's notice. 

That's exactly what the Team Group P250Q SSD (solid state drive) is all about. This industrial storage drive for computers and servers can physically destroy itself at the push of a button, so your secrets go up in smoke before they fall into the wrong hands...

The nuclear option involves a patented independent destruction circuit that overloads the flash memory chip, melting it in the process.  more  video

Saturday, July 19, 2025

FutureWatch: Reachy Mini, tiny new open-source robot leading the DIY robot revolution

Remember when robots were either million-dollar factory arms or creepy Boston Dynamics videos that made you question humanity's future?
Well, Hugging Face and Pollen Robotics just released Reachy Mini, a desktop robot that costs less than most people's monthly grocery bill, and might be the most adorable little robot we’ve ever seen. more

What has this to do with spying?
Reachy Mini is an 11-inch tall, open-source robot that you can program in Python right out of the box. Think of it as the friendly cousin of those intimidating industrial robots, but one that actually wants to hang out on your desk and maybe help with your coding projects. video

You are witnessing the beginning of AI, super-smart, open-source, programmable, internet communications capable, devices which will become commonplace home/office devices. And we thought the Internet of Things presented security and privacy problems. Just wait.

Secret Recordings are on the Rise

Divorcees spying on exes, perverted landlords and staff wanting to know their next pay rise are among those making secret recordings using bugs hidden in everyday items, an expert has warned.

Spy cameras and listening devices obscured in phone chargers, photo frames, alarm clocks, mirrors, plug sockets, pens and smoke alarms are available in huge numbers on mainstream sites including Amazon and eBay.

One bug sweeping specialist told MailOnline that recording devices contained in plug sockets used for USB mobile phone chargers were particularly popular with snoopers because 'no one is going to suspect them'.  more
Want to protect your business from electronic surveillance? Click HERE for some good information.

Tuesday, July 15, 2025

Dual Purpose AI - Personal Secretary / Eavesdropping Spy

New Voice Recorders are getting smarter, thinner, more feature-packed and more easily hidden.

This particular device can record for 30 hours and AI summarizes the interesting things it hears in about 30 seconds. P.S. It can also record cell phone calls.


The eavesdropping potential is obvious. Recognizing this device, not so obvious, hence all the pictures below. This is another good reason businesses have a professional TSCM team sweep their offices regularly. 

Understand what this does if you see one at your next meeting. Keep in mind that it also may be in someone's pocket. 

Spybuster Tip: Become suspicious if the person you are talking to seems to be fishing for you to say something incriminating, or they are trying to repeat a contentious previous conversation. They are likely recording you.






Thursday, July 3, 2025

Four Cool Spy Cameras for Sale

Vintage Cameras & Lenses | Coeln Cameras
I am very glad to offer my 30 years of experience with vintage cameras to provide my knowledge in the field for valuations and appraisals. Whether you are looking for advice regarding sale or would like to receive an appraisal for a single camera or an entire collection, I am happy to provide my expertise to you.
Yours,
Peter Coeln

Rare watch camera with yellow wrist-strap, Steineck 2.5/12.5mm lens, in very fine and working condition, matching original presentation case, red maker's box, instructions, warranty card - very hard to find so complete.
Steineck 
A.-B.-C Watch Camera
Condition: B+
Year: c.1949
$2,878.21


Small all-metal box camera for 12 exposures on special cassettes, with cloth focal plane shutter - in near mint condition. With film, leather case and original box.
Expo Camera Co., NY
Police Camera

Condition: A/B
Year: c.1920
$1,067.34


6x6mm images on 8mm perforated film for 20 exposures, diamond pattern gold finish, fixed focus lens, 2-speed shutter for instant and bulb exposure, engraved 'OTV' (Osaka Television), in balsa wood box with orig. maker's printed instruction leaflet, film rolls, case. The extremely rare camera was never sold to public, it was a special present for the first Anniversary of Osaka Television.
Suzuki Optical Co.
Camera-Lite B Gold

Condition: B
Year: 1955
$2,878.21













The Watch Camera was manufactured by J. Lancaster & Son of Birmingham, from 1886 to 1900. It was patented on October 4th, 1886, patent no. 12571. It was constructed of engine turned metal with nickel plating. Designed to look like a pocket watch and easily carried in a waistcoat pocket. It was a self erecting camera which expanded six spring-loaded telescoping tubes when opened to form the bellows of the camera. It featured an internal meniscus lens. The offered camera is the later model with drop shutter. Men's model for 1 1/2x2' plates, with original filmholder, the extremely rare camera is in fine original condition.
Lancaster 
Watch Camera Men's Model

Condition: B
Year: 1890
$26,383.61

Thursday, June 19, 2025

Weird Spy Science: Watch Watches Computer

A new research paper proposes an unusual method of data exfiltration from air-gapped systems using smartwatches.


The concept, created by researchers from Ben-Gurion University, sounds like something out of a spy thriller, but the details reveal just how technically complex and narrowly feasible such an attack would be.

The method, dubbed “SmartAttack,” relies on exploiting the microphone of a compromised smartwatch to receive ultrasonic signals from an infected air-gapped computer.

These ultrasonic transmissions operate between 18 and 22 kHz, just above the range of human hearing, and can carry data such as keystrokes or biometric information at up to 50 bits per second over distances of at least six meters.

For any part of the attack to work, multiple difficult steps must already be accomplished. (Whew!) more

Friday, June 6, 2025

Behold The Amazing "AIR" Key

Behold the Amazing AIR Key









































AIR, a joke acronym for “Anti InfraRed.”

However, just a blast of compressed air can open most card-key access entry doors in commercial buildings. 

Compressed air does this by tricking the internal exit sensor into thinking someone wants to leave. 

Click the link to learn more and actually watch how anyone can B&E without a key. https://counterespionage.com/lock-trick/

P.S. - We creatively labeled these cans for our clients so they can demonstrate the vulnerability to their colleagues. Of course, we also provide them with security solutions to rectify the problem. 

You really should join our client family. It's easy. Just add our TSCM inspections to your security program. 

Tuesday, May 27, 2025

Türkiye: China Is Spying on Uyghurs Using Fake Cell Towers

Turkish intelligence has dismantled a Chinese espionage network operating on its soil.
This network had been conducting surveillance on Uyghur refugees as well as Turkish officials using advanced technology, particularly fake mobile towers.

Earlier this month, Turkish intelligence agents arrested seven suspects and discovered their vehicles outfitted with IMSI-catcher devices. These devices, which emulate genuine base stations, can intercept data, call logs, conversations, and other sensitive information from nearby mobile phones.

Intelligence sources indicate that some members of this espionage ring entered Türkiye as recently as March. However, a report last week disclosed that the network has been operational for the previous five years. more

FutureWatch / Spytech: Contact Lenses Allow Seeing in the Dark, Even With Eyes Closed

Neuroscientists and materials scientists have created contact lenses that enable infrared vision in both humans and mice
by converting infrared light into visible light. 

Unlike infrared night vision goggles, the contact lenses, described in the journal Cell, do not require a power source—and they enable the wearer to perceive multiple infrared wavelengths. Because they're transparent, users can see both infrared and visible light simultaneously, though infrared vision was enhanced when participants had their eyes closed.

"Our research opens up the potential for noninvasive wearable devices to give people super-vision," says senior author Tian Xue, a neuroscientist at the University of Science and Technology of China. "There are many potential applications right away for this material. For example, flickering infrared light could be used to transmit information in security, rescue, encryption or anti-counterfeiting settings." more

Thursday, May 22, 2025

The Cold War Spy Technology Which We All Use

From: The Thing (aka The Great Seal Bug), to RFID cardkeys and tap-to-pay credit cards.

Moscow, 4 August, 1945. The European chapter of World War Two was over, and the US and the USSR were pondering their future relationship. 

At the American embassy, a group of boys from the Young Pioneer Organization of the Soviet Union made a charming gesture of friendship between the two superpowers. 

They presented a large, hand-carved ceremonial seal of the United States of America to Averell Harriman, the US ambassador. It was later to become known simply as The Thing. 

Naturally, Harriman's office would have checked the heavy wooden ornament for electronic bugs, but with neither wires nor batteries in evidence, what harm could it do? more & much more

GPS Trackers: Under Cover & Under the Hood

If you are inspecting you vehicle for covert GPS trackers do not overlook these.

They are disguised to look like legitimate vehicle parts.

You can view all 38 photos here.

Wednesday, May 7, 2025

FutureWatch: Apple is Developing AirPods with Cameras

Apple is ‘actively developing’ a version of AirPods with integrated cameras.
This tech is unlikely to make an appearance in AirPods Pro 3, which are expected to debut this year – but nonetheless, it’s in the pipeline. Apple wants your AirPods to better understand your environment, but why?
Visual Intelligence integration

With the iPhone 16 lineup, Apple introduced Camera Control. This new button is great for taking photos and adjusting camera settings, but it also unlocked a new feature: Visual Intelligence.

Visual Intelligence is a powerful tool that helps users learn about the world around them, and allows users to take action based on the physical context around them. You can add an event flyer to your calendar, for example, or tap into the power of ChatGPT or Google to help learn about something you don’t understand. more

Friday, March 28, 2025

Cool Spycraft at the Tip of Your Finger

Only $3.18.

This is a Near-Field Communications (NFC) chip. Very small. Very thin. NFC is a short-range wireless technology that enables data exchange between two devices within ~4 cm. The chip contains a small amount of memory, a radio antenna, and a controller. It can be operated in one of two modes. 
  • Passive: No battery, powered by the electromagnetic field from the reader. 
  • Active: Has its own power source and can initiate communication.
How you might want to put your new spy power to work...

1. Covert Information Drops
• Spy embeds NFC tag in a common object (book, card, clothing tag).
• The chip links to a hidden or encrypted file or payload.
• Handler taps the object with a phone to retrieve information without direct contact.

2. Target Tracking
• Spy plants an NFC tag on a person or vehicle.
• The chip contains a unique ID or triggers background logging when scanned by compromised devices.
• Useful in tight surveillance environments.

3. Access Credential Spoofing
• Clone an NFC badge or card to gain unauthorized access.
• With a reader and software, a spy can harvest data and replicate a target’s access card.

4. Payload Delivery
NFC chip programmed to:
• Open malicious URLs.
• Trigger phone actions (e.g., Bluetooth pairing, contact injection).
• Launch scripts on rooted devices or with social engineering.
• Planted in public items (posters, flyers, seats, hotel room items).

5. Dead Drops with Geofencing
• NFC chip triggers a secure drop message only when tapped in a specific location.
• Adds plausible deniability; nothing visible unless in context.

6. Asset Authentication & Deception
• Tag gear or documents with NFC chips claiming authenticity (e.g., fake origin metadata).
• Alternatively, verify real gear during handoff using known chip signatures.

7. Remote Trigger Mechanism
• NFC tag acts as a trigger for another device (e.g., when tapped, it signals a hidden recorder to start transmitting).

Monday, March 24, 2025

FutureWatch: Sophisticated & Smart Surveillance Electronics To Become Smaller and Cheaper

Texas Instruments says it has shrunk the size of the smallest microcontroller unit in its industry with a new MCU the size of a black pepper flake.


The MCU packaging is only 1.38 square millimeters in size... TI says the product is aimed at small products including medical wearables, earbuds, stylus pens and electric toothbrushes. The product includes a 12-bit analog-to-digital converter and has 16KB of flash memory and 1KB of SRAM and runs at 24MHz...

TI says the microcontroller costs 20 cents per unit in quantities of 1,000, which means a company could get an army of robot spiders project started for as little as $200.

Vinay Agarwal, vice president and general manager of MSP Microcontrollers at TI: "With the addition of the world's smallest MCU, our MSPM0 MCU portfolio provides unlimited possibilities to enable smarter, more connected experiences in our day-to-day lives."

William Luk, a consultant and technology expert at Quandary Peak Research, said the MCU shrinkage opens up opportunities in areas where miniature devices weren't previously possible.

"One of the important verticals for micro-devices is in healthcare and surgical: smart pills, embedded sensors, or even surgical devices that can reach places like never before," Luk said. more

Tuesday, March 11, 2025

Chinese Spy Balloon Packed with American Tech

A Chinese spy balloon that crossed over the United States in 2023 was packed with American technology
that could have enabled it to spy on Americans, according to two sources with direct knowledge of a technical analysis conducted by the U.S. military.

The discovery of a satellite communication module, sensors and other tech from at least five American firms underlines the failure of U.S. efforts to restrict exports of technology that could have military uses to main adversary China as well as to countries such as Russia and Iran. It also raises questions over the role of private companies that sell their equipment globally in keeping control over the ultimate users of dual-use technology that can have defense applications as well as civilian uses.

A Chinese patent reviewed by Newsweek describes a communications system for exactly such a balloon as the one that crossed America, based on using a satellite transceiver from a U.S. company that the balloon’s controllers in China would use to communicate with it and that would send data back, and that is easily available online. more

1984 or 2025 - What the Flock?

Flock Safety, a maker of license plate-reading cameras, is said to be valued at $7.5 billion — a 56% increase from a year ago — in a funding round to be led by Andreessen Horowitz. The startup plans to raise $250 million. more

Not everyone is thrilled, and the courts have not weighted in yet. When they do, it will be boom or bust.