Showing posts with label #weird. Show all posts
Showing posts with label #weird. Show all posts

Tuesday, May 18, 2021

Tin Foil Hat Alert: Tiny, Wireless, Injectable Chips Use Ultrasound to Monitor

Columbia Engineers develop the smallest single-chip system that is a complete functioning electronic circuit; implantable chips... that can be injected into the body with a hypodermic needle to monitor medical conditions.

Researchers at Columbia Engineering report that they have built what they say is the world's smallest single-chip system, consuming a total volume of less than 0.1 mm3. The system is as small as a dust mite and visible only under a microscope. In order to achieve this, the team used ultrasound to both power and communicate with the device wirelessly. The study was published online May 7 in Science Advances.

“We wanted to see how far we could push the limits on how small a functioning chip we could make,” said the study’s leader Ken Shepard, Lau Family professor of electrical engineering and professor of biomedical engineering. “This is a new idea of ‘chip as system’—this is a chip that alone, with nothing else, is a complete functioning electronic system. This should be revolutionary for developing wireless, miniaturized implantable medical devices that can sense different things, be used in clinical applications, and eventually approved for human use.more

Monday, May 10, 2021

Hvaldimir: Seeking Sanctuary for Whale Dubbed a Russian Spy

A mysterious beluga whale was dubbed a spy when he appeared off Norway's coast wearing a Russian harness... The whale seemed to be seeking help... The fisherman put on a survival suit and jumped into the icy water, freed the whale and retrieved the harness. To his surprise it had a camera mount and clips bearing the inscription "Equipment St. Petersburg"... 

Norwegians were captivated by the whale's dramatic rescue. Because of the whale's apparent spy status, he was given a tongue-in-cheek name. In a nod to hval, Norwegian for whale, and Russian President Vladimir Putin, the beluga was christened Hvaldimir. more

Sunday, May 9, 2021

The Very Long Arm of the Law

UK - A Royal Navy submarine and a bugged Scottish farmhouse were used to try to catch the killers of Stephen Lawrence, it has emerged.

The elaborate surveillance operation was set up in 1999 in an attempt to gather evidence from five men accused of the teenager’s murder, as they enjoyed a two-week break after giving a high-profile TV interview...

But the Daily Mail yesterday revealed how, before they arrived, police had planted hidden microphones in the house, in the Perthshire village of Forteviot. The submarine, which took up position off Dundee, sent the signal back to London...

The Met rigged up the whole venue with hidden listening devices even placing them in golf buggies the suspects rode on in the quaint village of Forteviot.

They relayed their signal to a helicopter circling nearby which passed it onto the sub which in turn fired it down to detectives in Scotland Yard.

Even the friendly minibus driver who showed them the sights during their 15-day Highlands stay was an undercover police officer, reports the Mail.

One source said: “It was pure James Bond. It was run like a big anti-terror operation. The team had every piece of kit you had ever heard of.” more  more

Saturday, May 8, 2021

Weird GPS Tracking Story: Shark Seems to Leave Sea for a Road Trip

Australia - A bull shark under surveillance left scientists scratching their heads after it seemed to begin traveling down a major roadway in New South Wales.

Marine biologists noticed the predator – or at least its tag – was moving along the Princes Highway between Shellharbour and Wollongong, having apparently quit the sea at Shell Cove on Wednesday morning. more 

I recall a somewhat similar incident involving a bear here in New Jersey... sing-a-long Enjoy the weekend!

Monday, November 16, 2020

In Other News... Laser Device Can Make Lightning Strike Specific Targets

An international team of researchers says that small lasers could be used to guide lightning strikes — much like Thor’s legendary hammer Mjölnir.

“It turns out that to deliver particles, you do not need high-intensity lasers, even low intensity like your laser pointer will be already enough,” Andrey Miroshnichenko, a researcher at the University of New South Wales in Canberra, Australia, told Agence France Presse of the work...

“We can imagine a future where this technology may induce electrical discharge from passing lightning, helping to guide it to safe targets and reduce the risk of catastrophic fires,” co-researcher Vladlen Shvedov from the Australian National University told AFP.

Or you could use it to smite your enemies. Just saying. more

Friday, October 30, 2020

Scarier than Halloween - Ponder This Over the Weekend...

In an influential 2003 paper, University of Oxford philosopher Nick Bostrom laid out the possibility that our reality is a computer simulation dreamed up by a highly advanced civilization. In the paper, he argued that at least one of three propositions must be true:
  1. Civilizations usually go extinct before developing the capability of creating reality simulations.
  2. Advanced civilizations usually have no interest in creating reality simulations.
  3. We’re almost certainly living inside a computer simulation.

Now, Columbia University astronomer David Kipping took a hard look at these propositions, also known as Bostrom’s “trilemma,” and argued that there’s essentially a 50-50 chance that we are indeed living in a simulation, Scientific American reports.

Wednesday, October 28, 2020

Phones, Cameras, Cardkeys - What Will Track You Next?

Thanks to a new system developed at EPFL, building owners can detect the number of occupants and track their movement using sensors installed on floor slabs. This novel approach could be particularly useful for enhancing safety in retirement homes or managing buildings' energy use more efficiently...

Scientists at ENAC's Applied Computing and Mechanics Laboratory (IMAC), headed by Professor Ian Smith, have developed an alternative approach.  

"By installing sensors in a building's floor slabs, we can measure the vibrations created by footsteps. That lets us calculate the number of people in the building as well as where they are located and their trajectory," says Slah Drira, the IMAC Ph.D. student who completed his thesis on this topic.

To each his own gait...

"The signals our sensors record can vary considerably depending on the person's anatomy, walking speed, shoe type, health and mood," says Drira.

His method uses advanced algorithms—or more specifically, support vector machines—to classify the signals recorded by the sensors. Some interpretation strategies were inspired by the convolutional neural networks often employed in pixel-based image recognition, and can identify the footstep characteristics of specific occupants. more

Friday, October 23, 2020

Friday Funnies

High Bridge, NJ - Tin Foil Hat Contest
Worried about microwave mind zapping, spies, aliens, or your nosy neighbor?  You may find a answer to your concerns here... Polka Dot Café in High Bridge, NJ more

Trump’s Twitter Account Was Hacked
President Trump’s Twitter account was hacked last week, after a Dutch researcher correctly guessed the president’s password: “maga2020!more

Ghostbusters sneakers from Reebok
Reebok is releasing this fun and cartoony Ghostbusters "Ghost Smashers" sneaker design on Halloween. more (You really need the matching backpack to complete the outfit.)

Wednesday, September 23, 2020

If there's something strange In your neighborhood, who you gonna call?

For 18 months, residents of a village in Wales have been mystified as to why their broadband internet crashed every morning... Then local engineer Michael Jones called in assistance...

 (Note: For a faster tracker, call a TSCM'er.)

Engineers used a device called a spectrum analyzer and walked up and down the village "in the torrential rain" at 6 a.m. to see if they could locate an electrical noise, Jones said in a statement. 

"The source of the 'electrical noise' was traced to a property in the village. It turned out that at 7 a.m. every morning the occupant would switch on their old TV which would in-turn knock out broadband for the entire village." more | sing-a-long | TSCM'er

Thursday, August 20, 2020

Hackers Can Now Clone Your Keys Just by Listening to Them (wtf?!?!)

Every time you unlock your front door, your key whispers a small, but audible, secret. Hackers finally learned how to listen. 

Researchers at the National University of Singapore published a paper earlier this year detailing how, using only a smartphone microphone and a program they designed, a hacker can clone your key. 

What's more, if a thief was able to install malware on your smartphone, smartwatch, or smart doorbell to record the audio from afar, they wouldn't even need to be physically nearby to pull off the attack. 

The key (ahem) to the attack, dubbed SpiKey, is the sound made by the lock pins as they move over a typical key's ridges. more

Saturday, August 15, 2020

Corporate Espionage in the News

RedCurl is its name.
Corporate espionage is its game.

Security researchers today published findings on a new APT group they claim has been stealing data from organizations around the world as far back as 2018. Since then, RedCurl has targeted at least 14 private companies in 26 attacks designed to steal documents containing commercial secrets and employees' personal information.

Its targets span a range of industries and locations. The group has targeted organizations in construction, finance, consulting, retail, banking, insurance, law, and travel...

There is no indication who might have hired RedCurl, where they might be based, or who is behind these attacks, he adds. The group is fairly new, and researchers hope to learn more over time.

"Corporate espionage is not something that we're used to on the cyberscene," Mirkasymov says. Researchers believe the frequency of these attacks indicates it's likely to become more widespread in the future. more

----------

Three corporate espionage reasons why VW was not a good career choice...

March 14th - Former VW employee says he was fired after questioning deletion of documents. more

June 16th - Former VW employee sought by U.S. arrested in Croatia... more 

August 14th - Former VW employee under investigation for corporate espionage found dead in burned-out car...was investigated by the police on suspicion of violating business secrets. more

----------

The U.S. National Security Agency and Federal Bureau of Investigation today issued a joint cybersecurity advisory warning on a previously undisclosed form of Russian malware...although the objectives of Drovorub were not detailed in the report, they could range from industrial espionage to election interference. more

----------

Once again, LinkedIn is the battleground for nation state espionage operations. Every counterintelligence and insider threat professional should be paying attention...The goal of the social engineer is to entice the target to at least take a gander at the job offering being discussed and click the attachment which is provided. This attachment carries the payload of malware designed to compromise the device and network of the target. Once the device is compromised and the group has access to the content, their espionage goals are achieved. more

----------

...and Corporate Espionage can also be entertaining...

How 'American Ronin' Explores Superhumans and Corporate Espionage
As the conflict between global corporations heats up, one man decides to strike back against the unseen forces that quietly rule the modern world, using an entirely unanticipated weapon — his own mind. That’s the idea at the center of American Ronin...The series is the first collaboration between writer Peter Milligan (Shade the Changing Man, Hellblazer, X-Force) and artist ACO (Midnighter, Nick Fury), with the two playing off each other’s strengths to create a story that’s part-corporate espionage, part-superhuman thriller and unlike anything else on the stands at the moment. more

Friday, August 7, 2020

1650 Kircher Musurgia Listening Devices

The book Musurgia Universalis is famous and has been since it appeared in 1650. 
kircher musurgia listening device
Vol. 2 (Af-x.10): plate between pages 302 & 303

The illustration depicts a piazza-listening device.

The voices from the piazza are taken by the horn up through the mouth of the statue in the room on the piano nobile above, allowing both espionage and the appearance of a miraculous event. more

The modern eavesdropping equivalent is the ventilation plenum. Acoustical ducting is something most people don't consider when concerned about eavesdropping. We do.

Thursday, August 6, 2020

Stay Safe - Stay Feeling Good

This fun statement can be taken several ways...
• Anti Covid-19
I'm not feeling very social right now!
• A warning to spies that you are protected against electronic surveillance. 
Available here.

Want to know more about protecting your privacy?
Visit us at https://counterespionage.com

Monday, August 3, 2020

Block TikTok, or Microsoft to the Rescue

U.S. Secretary of State, Mike Pompeo, claimed that TikTok sends user data to China, exerting pressure on the video-sharing social networking service. Pompeo brought attention to the fact that if personal information flows across a Chinese server, it will eventually end up in the hands of the Chinese Communist Party which he calls an “Evil Empire”.

TikTok has denied U.S. allegations but a report by cyber experts at ProtonMail says otherwise. The report is more a warning as it states – “Beware, the social media giant not only collects troves of personal data on you, but also cooperates with the CCP, extending China’s surveillance and censorship reach beyond its borders.” more

In other news...
Microsoft said Sunday it will continue talks to buy short-form video app, TikTok after its chief executive spoke with President Trump, following a weekend of uncertainty clouding the future of the Chinese-owned app. more

Connect the Dots...
When Microsoft bought Skype, Wired Magazine noted, "The Skype client itself is written almost as if it were a piece of malware, using complex obfuscation and anti-reverse engineering techniques, and it would be disquieting for Microsoft to release something that behaved in such a shady way; at the very least, the client would surely have to be rewritten to avoid the obfuscation and outright hostility to managed networks that Skype currently has... Ultimately, it's hard to see how the Skype purchase is worthwhile from a technology or user-access perspective. The technology isn't good enough and the users aren't lucrative enough or plentiful enough to justify it. more

Pure Conjecture Disguised as Analysis...
Microsoft already had Windows Live Messenger. Did it really need Skype? Skype you might recall was a predominately Estonian-based encrypted platform. It was giving governments fits worldwide. Then, in 2011, Microsoft bought it. Guess what happened.

TikTok, it appears, is also giving government fits. Who ya gonna call?

FutureWatch: Early (1930) Facetime Smartphone Calls

"This technology was predicted by many authors, futurists, and illustrators in the past. This one is one of the earliest illustrations on this subject; it was made in 1930. Again, the resemblance with a modern gadget that we all know as “smartphone” is uncanny." more

Thursday, July 30, 2020

The Little Bugger Spycam or Beetleloose


Scientists developed a teensy-tiny black-and-white camera that can comfortably be mounted on a live beetle—specifically a death-feigning beetle and a Pinacate beetle.

The device streamed photos and videos straight to an iPhone, depicting exactly what the beetle was staring at: from squirrels that look like hulking grizzly bears to a truck that looms like a mountain. They published their findings in Science Robotics last week.

The entire system weighs around a tenth of a playing card, uses minimal power, and keeps the frame pointed at where the bug looks by mimicking its steering mechanisms. more

Friday, July 17, 2020

From The Dot Connection Files - CIA & Iran - Just Coincidence? You Decide

Three stories.
Same day.
Makes one wonder...

The Central Intelligence Agency, using new powers, carried out aggressive covert cyber operations against countries including Iran, North Korea, China and Russia, a new report says... The new powers gave the CIA more latitude to “damage adversaries’ critical infrastructure, such as petrochemical plants, and to engage in the kind of hack-and-dump operations that Russian hackers and WikiLeaks popularized,” the report explained. more

Iranian cyberspies leave training videos exposed online — One of Iran's top hacking groups has left a server exposed online where security researchers say they found a trove of screen recordings showing the hackers in action. more

The US has "several" intelligence indications that Iran has put portions of its air defense system on "high alert" in recent days, following unexplained explosions at key facilities tied to the country's military and nuclear programs, according to a US official who is closely tracking developments. more   sing-a-long (nsfw use headphones)

Tuesday, July 7, 2020

Don't Click on Links Like This... but click on this one to learn why. (blahaha)

A subset of Three UK users have received an SMS message warning them about text message-based spam – complete with a shortlink and textual urgings to click it and learn more.

The definitely-not-smishing-honest message was received by Reg reader Chris, and he was not very chuffed with it. He told us:

"They send an unsolicited out-of-the-blue SMS which asks you to 'click' (not tap) on a link. When checked out in a sandboxed environment this goes to an insecure http-only page which warns of suspicious text messages and a video telling recipients not to tap on any links. Awesome!" more

The offending message is reproduced in all its glory below:

Privacy Advocates Alert: Make Orwell Fiction Again

Make Orwell Fiction Again https://amzn.to/2O591aq