Showing posts with label #spytech. Show all posts
Showing posts with label #spytech. Show all posts

Sunday, January 15, 2023

Videos About Spy Cameras

Berning Robot SC Electronic 35mm camera

Serial number 0-01486. Schneider Xenagon 30mm lens, for covert uses. This 35mm camera manufactured in the 1980s takes images 16x16mm in size on its own small diameter cassettes which allow 40 monochrome or 35 colour images to be taken (colour film being thicker than black and white, hence the different capacities). The camera has an interchangeable back, eliminating the need for rewinding film in camera. The camera uses a TTL metering system. The lens has a fixed f5.6 aperture, which allows shutter speeds to be set between 4 and 1/500 of a second. Manual settings are possible. Images can be shot at the rate of one frame every 1.5 seconds. The slowness of the motorised wind on minimises the noise of the camera operationally. Various shutter release mechanisms are known, both mechanical and electronic, including radio control. Mossad allegedly developed an infra-red pulse controlled shutter release. Purported to have been designed to the specifications of the Israeli intelligence service, the camera was intended for covert surveillance. Both its size being around the size of a cigarette packet and its silent operation make it very suitable. It was also certainly used by the East German STASI and other intelligence agencies. The size of the camera lends itself to use in a variety of concealments. Examples evidenced include Sony ‘Walkman’ cassette players, books and handbags. A high quality button frontage for the lens exists. This model comes with an adapted bag concealment, where the lens shoots through a decorative metal emblem on the side of the bag and the shutter is fired by a concealed button. and many more videos from spycamerasaurus, @spycamerasaurus3745

Sunday, January 1, 2023

The 2.4 GHz Bug: $10

2.4 GHz Bug

Another Good Reason to Schedule TSCM Corporate Security Inspections

This 2.4 GHz bug is just one of many eavesdropping devices, GPS trackers and spy cameras flooding the market these days. Corporations valuing information security and privacy need to be especially alert.

Many of these surveillance devices are not sophisticated, but they are very effective. 

Worse, they are readily available to anyone with a credit card and internet access. Most are so inexpensive they are considered “toss-away” — use once, don’t retrieve — perfect for short-term, low-risk use. Let’s examine… more

Friday, December 30, 2022

EarSpy Attack Can Use Motion Sensors Data to Pry on Android Devices

As smartphone manufacturers are improving the ear speakers in their devices, it can become easier for malicious actors to leverage a particular side-channel for eavesdropping on a targeted user’s conversations, according to a team of researchers from several universities in the United States.

The attack method, named EarSpy, is described in a paper published just before Christmas by researchers from Texas A&M University, Temple University, New Jersey Institute of Technology, Rutgers University, and the University of Dayton.

EarSpy relies on the phone’s ear speaker — the speaker at the top of the device that is used when the phone is held to the ear — and the device’s built-in accelerometer for capturing the tiny vibrations generated by the speaker. more

Monday, December 26, 2022

FutureWatch: More Progress on the Electronic Dog Nose - TSCM Potential

Recap #1: Device can detect distress signals from plants that are harmed, under attack It turns out the best way to hear a plant scream is to smell it. (10/17/2008) more

Recap #2: Specially trained dogs have been used to sniff out covert electronic items, like cell phones in prisons, for quite a while now. The secret to detection is the device's electronic circuit boards. They contain these compounds: triphenylphosphine oxide (TPPO) and hydroxycyclohexyl phenyl ketone (HPK). This second compound is also found on CDs, DVDs, Blu-Rays, the old tech floppy disks. (5/18/2021) more

The latest development:
Researchers use biomimicry to enhance particle detection 16-fold by sniffing like dogs. more


FutureWatch: Technical Surveillance Countermeasures (TSCM) professionals have many types of technologies at their disposal for detecting illegal electronic surveillance devices. To name a few... Non-Linear Junction Detection, Infrared Thermography, and Radio-frequency Spectrum Analysis. We are now well on our way to adding EDN to our kit.

Tuesday, December 6, 2022

Spy Tech: Amazing Microphone Tricks

Forget about turning up the TV to block eavesdropping bugs. 
The EveryWord™ Ultra Far-Field AFE Processor is here.

ArkX Labs' EveryWord ultra far-field voice capture and control DSP solutions offer an unmatched voice experience for H2H and H2M interfaces. 

Utilizing 3-D reverberation technology, the AFE voice module and development kit capture voice commands from 3x the distance (up to 9+ meters) versus traditional beam-forming technology. 

These solutions work reliably around corners, and in noisy and reverberate environments without having to lower the playback volume from other loud or competing single-point noise sources... Just watch the video.

Wednesday, November 30, 2022

Under Appreciated Espionage Attach Vector - Computer Repair Shops

If you’ve ever worried about the privacy of your sensitive data when seeking a computer or phone repair, a new study suggests you have good reason.
It found that privacy violations occurred at least 50 percent of the time, not surprisingly with female customers bearing the brunt.

Researchers at University of Guelph in Ontario, Canada, recovered logs from laptops after receiving overnight repairs from 12 commercial shops. The logs showed that technicians from six of the locations had accessed personal data and that two of those shops also copied data onto a personal device. Devices belonging to females were more likely to be snooped on, and that snooping tended to seek more sensitive data, including both sexually revealing and non-sexual pictures, documents, and financial information. more

Thursday, September 8, 2022

Using SDRs for Signals Intelligence (SIGINT)

One of the several technical techniques your TSCM team uses to detect illegal electronic eavesdropping...

Signals intelligence (SIGINT) is an umbrella term for collecting and analyzing information through the monitoring of radio frequency signals. In the era of remote and wireless communications, intercepting radio information is crucial in any application involving the malicious use of the RF spectrum, including military surveillance, homeland security, and monitoring of illegal RF transmissions. In this article, we discuss the basic concepts of SIGINT/COMINT, the requirements for system design, how software-defined radio (SDR) can contribute to the performance, and the various applications of SDR-based SIGINT.

By detecting strange signals in a hostile electromagnetic environment, SIGINT systems can rapidly adapt to emerging threats, locate unknown and/or illegal devices, and counteract against adversarial interference. SIGINT requires a large variety of devices, techniques, and algorithms for RF signal detection, measurement, processing, exploitation, and manipulation.

The most fundamental component in a SIGINT system is the spectrum analyzer. more

Tech Aids Chess Cheating and Possibly More

James Stanley — "I have come up with a new way to win at chess: I have connected up a Raspberry Pi Zero in my pocket to some buttons and vibration motors in my shoes, so that I can surreptitiously communicate with a chess engine running on the Pi. The project is called "Sockfish" because it's a way to operate Stockfish with your socks.
The feet are ideal for this sort of thing, because they're the only part of your body that has any sensible degree of dexterity while still being invisible to casual observers."

Now, imagine this innovative use of technology—easily combined with Wi-Fi, Bluetooth or other radio-frequency modulation—being used during business negations or advance placement testing. Unsettling, to say the least. 

If you employ a Technical Surveillance Countermeasures (TSCM) team this is another way they can help you. more

Thursday, August 18, 2022

Spybuster Tip #823 - The Car Thief Cell Phone Trick

Another reason not to leave personal belongings inside your vehicle. Memphis police say car thieves are using their cell phone cameras to look through tinted windows.


During a crime forum in the Cooper-Young neighborhood, Crump station officers said it was a new tool being used by the bad guys looking for items to steal.

They told the group it doesn’t matter how dark the tint is on your windows; when you put a cell phone in camera mode up to the windows, you can see right through them.

We (WREG-TV) put a cell up to a back window; sure enough, you could see everything in the backseat. more

Extra Credit: The reverse of this technique is how spy cameras, hidden behind black plastic, can see you when you can't see them. Learn more.

Tuesday, August 16, 2022

Indoor Optical Fiber Eavesdropping Approach and its Avoidance

Eavesdropping exploit found in fibre-optic cables
Researchers in China have created a new technique for long-distance eavesdropping by tapping into fibre-optic cables, which are prominently used in networks across the globe.Abstract: The optical fiber network has become a worldwide infrastructure. In addition to the basic functions in telecommunication, its sensing ability has attracted more and more attention. more

In this paper, we discuss the risk of household fiber being used for eavesdropping and demonstrate its performance in the lab. 

Using a 3-meter tail fiber in front of the household optical modem, voices of normal human speech can be eavesdropped by a laser interferometer and recovered 1.1 km away

The detection distance limit and system noise are analyzed quantitatively. We also give some practical ways to prevent eavesdropping through household fiber. more

Eavesdropping via fiber optics is actually far from being new, as anyone who dealt with Mason & Hanger last century could tell you. In fact, we were alerting our clients to fiber optic eavesdropping microphones on our thank you mugs...
"Spy Trick #409 - Fiber Optic Microphone"
1994 - 1999
Number made - 323




Be Careful What You Fish For

The U.S. accused a Chinese MIT professor of spying. Now cleared, he helped discover what may be the ‘best semiconductor material ever found’

A team of researchers has discovered what the Massachusetts Institute of Technology calls the “best semiconductor material ever found,” even better than silicon, the material used in just about every computer chip on earth.

In July, scientists from MIT, the University of Houston, and other institutions announced they had proved that cubic boron arsenide performs better than silicon at conducting heat and electricity, opening up new possibilities for smaller and faster chips. The team includes China-born professor Gang Chen, the former head of MIT’s Department of Mechanical Engineering, who was the subject of a yearlong investigation by the Department of Justice before the agency dropped espionage charges because of lack of evidence. more

Surveillance Documentary: Theo Anthony on All Light, Everywhere

Anthony follows the bliss of two hawkers of cutting-edge surveillance technology. 

In Scottsdale, Arizona, taking corporate assertions of transparency at their word, he is given a PR-guided tour of the headquarters of Axon Enterprise, Inc, formerly known as Taser, manufacturer of electroshock weapons and now runaway leader in the deployment of police body cameras. He tests the tech (and its limits) in a mall, captures the police’s internal rationale for body cameras in a training session, and – with the Axon PR now in overdrive – stages a multi-cam Axon-branded arrest scenario in the desert.

Back home in Baltimore, Anthony also attends to the efforts of Ross McNutt, president of Persistent Surveillance Systems, to sell citizens on his “God’s-eye view” plane-mounted live-feed spy cams – somewhat belatedly, since the tech had previously been deployed in 2016 without disclosure even to the mayor. Now he presents a genial face in community liaison meetings, offering blandishments about providing an “unbiased witness” in “troubled cities”. As Anthony’s voiceover says over an Axon promotional video, “It feels like watching a corporation dream out loud”: the claim is objectivity, the dream is omniscience, the end game is power. One thinks of Jeremy Bentham’s all-seeing panopticon, but also of Naomi Klein’s insights in No Logo into corporate aspirations of weightless, unburdened power. more

Thursday, August 11, 2022

SOS (and more) With the Touch of a Finger

An electronic chip under your fingernail veneer, or anywhere else you care to hide it. 

It seems like spy tech. It is actually just NFC radio-transmission tech; same as when you hold your credit card near the payment terminal instead of swiping or plugging it in. 

The list of practical uses is long. The list of nefarious uses I leave to your imagination.

Virtual Call - Through the IoT Cloud Nail Chip, when you are in an Awkward Situation, you can quickly Schedule a Scheduled Virtual Call through your beautiful Fingertips and customize the reason for leaving. It is the best way to get out. At a critical moment, you can quickly ask for help by touching your mobile phone with your Fingertips, giving yourself more security. 

Information Sharing - Share Various cloud information with friends, such as importing mobile phone electronic business cards, sharing shopping website links, and downloading online disk files. more




Sunday, July 31, 2022

Chinese Backup Chargers can Eavesdrop and Locate Individuals

Chinese media reporters have discovered that backup chargers can eavesdrop, locate citizens, and “live broadcast” citizens’ lives. However, this “spy backup charger,” which violates personal privacy, has been sold widely on e-commerce platforms in recent years. more

Practical Spy Gear: High-Tech Personal Electronics

Let’s rummage around in James Bond’s closet to discover some spy equipment with real-world applications...

Personal electronics have come a long way in just the past few years. This sampling of gear that used to be available only to spies just may prove useful in your daily life.

Uzi Parabolic Listening Kit

This comes in handy when you need to better hear what the referee is saying during a football game or want to listen to the songbirds in your backyard. The parabolic microphone and wind deflector funnel sound to an amplifier so you can hear every word or note clearly.
Keep It Clean

Destruct Pro Data Wipe Key

If you sell your computer or send it in for service, make sure your business or personal information doesn’t go along with it. Using a three-phase data-wiping process, this easy-to-use device can be used as often as needed on any PC whose contents you need to delete.
See What’s Ahead

Lanmodo Vast Pro Night Vision Driving Camera

Driving on dark, snowy, rainy, or foggy roads known to be populated with deer or pedestrians can be stressful. This system provides a clear, crisp image of what’s ahead, up to 984 feet, providing you with time to react. An integrated dashcam records in 1080p high-resolution.

Monday, March 28, 2022

Three Declassified Spy Gadgets Of The CIA

Informally known as the “Agency” or the “Company”, the Central Intelligence Agency is a civilian foreign intelligence service of the United States government. Its main task is to gather, process, and analyze national security information from all over the world, mostly through the use of human intelligence and performing actions behind the curtain. It was former-President Harry S. Truman’s initiative to create the Central Intelligence Group out of the Office of Strategic Services on January 22, 1946, which was transformed itself into the Central Intelligence Agency by the implementation of the National Security Act of 1947.

Here are three of the declassified spy gadgets that were designed by the CIA and could be found in their museum:




 

Spy Quote of the Week

“There’s no such thing as technology that’s too old for operations.” 
~ Toni Hiley, Director, CIA Museum 
 
One good reason why a corporate TSCM program is so important. 

Monday, January 24, 2022

Yamaha Announces VSP-2 Speech Privacy System

Yamaha Unified Communications is broadening its support for productive and confidential conferences and meetings with the new VSP-2 Speech Privacy System. The new system is designed to be quickly retrofitted in almost any office. It also features Yamaha’s high-performance audio technology that prevents speech privacy problems. This is achieved by effectively reducing human voice intelligibility with customizable sound options.

In addition, the system components include the VSP-CU2 control unit with user-selectable sound types and volume levels, supporting two, four, or eight VSP-SP2 speakers. more

Sunday, January 9, 2022

iPhone Malware Tactic Causes Fake Shutdowns: Enables Spying

The ‘NoReboot’ technique is the ultimate in persistence for iPhone malware, preventing reboots and enabling remote attackers to do anything on the device while remaining completely unseen.

In the world of mobile malware, simply shutting down a device can often wipe out any bad code, given that persistence after rebooting is a challenge for traditional malicious activity. But a new iPhone technique can hijack and prevent any shut-down process that a user initiates, simulating a real power-off while allowing malware to remain active in the background.

The stealthy technique, dubbed “NoReboot” by researchers, is “the ultimate persistence bug,” according to a ZecOps analysis this week... 

Is There a Patch for NoReboot?

ZecOps researchers noted that even though they call the issue a “persistence bug,” it can’t actually be patched because “it’s not exploiting any…bugs at all — only playing tricks with the human mind.” Via Twitter, the firm said that the technique works on every version of iPhone, and to prevent it, Apple would need to build in a hardware-based indicator for iPhone sleep/wake/off status.

To protect themselves, iPhone users should run standard checks for malware and trojanized apps, and take the usual vetting precautions when downloading and installing new apps. more

Tuesday, December 7, 2021

Spy Trick # 712 - The Memory Card Ring (Make Your Own!)

Honus, a former bicycle industry designer turned professional jeweler can teach you how to make your own spy ring.  

This is how spies (and corrupt employees) can sneak file cabinets of documentation out of companies, no matter how good their security is. more  
more spy rings

Secret Message Decoder Ring Great Christmas gift