Showing posts with label X-Ray Vision. Show all posts
Showing posts with label X-Ray Vision. Show all posts

Thursday, February 15, 2024

Aliens Could Be Spying On Us

Here’s What Their Space Probes Might Look Like
Maybe it’s abduction stories from the 1960s, in which alien doctors poke and prod human subjects with surgical tools. Or perhaps you picture something a little more like Oumuamua: a rocky, cigar-shaped “interstellar interloper” that slingshotted around the center of our solar system roughly 15 million miles from Earth back in 2017.

It’s this second type of potential “probe” that has attracted the attention of scientists, including Harvard astronomer Avi Loeb. In addition to suggesting that Oumuamua might have been an alien spaceship, Loeb, who holds a Ph.D. in plasma physics, has also searched the bottom of the ocean for evidence of alien visitors. These ideas, however, are not widely accepted in the greater scientific community. more

Monday, December 26, 2022

FutureWatch: More Progress on the Electronic Dog Nose - TSCM Potential

Recap #1: Device can detect distress signals from plants that are harmed, under attack It turns out the best way to hear a plant scream is to smell it. (10/17/2008) more

Recap #2: Specially trained dogs have been used to sniff out covert electronic items, like cell phones in prisons, for quite a while now. The secret to detection is the device's electronic circuit boards. They contain these compounds: triphenylphosphine oxide (TPPO) and hydroxycyclohexyl phenyl ketone (HPK). This second compound is also found on CDs, DVDs, Blu-Rays, the old tech floppy disks. (5/18/2021) more

The latest development:
Researchers use biomimicry to enhance particle detection 16-fold by sniffing like dogs. more


FutureWatch: Technical Surveillance Countermeasures (TSCM) professionals have many types of technologies at their disposal for detecting illegal electronic surveillance devices. To name a few... Non-Linear Junction Detection, Infrared Thermography, and Radio-frequency Spectrum Analysis. We are now well on our way to adding EDN to our kit.

Wednesday, June 2, 2021

New X-Ray Inspection and Analysis Service Detects Eavesdropping Devices Secreted in Everyday Objects

Click to enlarge.

Planting bugs, spy cameras, and other illegal surveillance devices is easy. Most come pre-disguised as fully functional everyday objects. They are being built into wall clocks, power strips, USB chargers, and even desktop calculators, for example.

Competent Technical Surveillance Countermeasures (TSCM) consultants have a variety of very effective ways to detect electronic surveillance devices. But, when the stakes are high enough—and the opposition is sophisticated enough—a Murray Associates TSCM X-ray deep clean is the logical option. This new service offers the most assurance that room objects are not bugged. 

------

Kevin D. Murray, Director, relates an interesting cautionary tale, “There are also times when a TSCM X-ray deep clean is just smart due diligence. The classic example of a lack of due diligence is the KGB bugging of American typewriters during the Cold War.”


Popular Mechanics
explains… “The Cold War spy drama that played out between the U.S. and the Soviet Union was the source of much ingenious spy technology. One of the most ingenious devices fielded by both sides was a typewriter designed to spy on the user, quietly transmitting its keystrokes to KGB listeners. The technology was an early form of keylogging but done entirely through hardware—not PC software.”

A total of 16 bugged typewriters were used at the U.S. Moscow embassy for over eight years before discovery. Had a TSCM X-ray inspection been conducted before the typewriters were installed, no secrets would have been lost.

Keep the KGB typewriters in mind when bringing in a new phone system, keyboards, mice or other office items. This is the ideal time to sneak a bug in, and for a TSCM X-ray deep clean.

------

Murray Associates TSCM can economically inspect all your new arrivals at one time, at your location, or ours. And, discretely security seal your items at no extra charge—before you start using them.

When should a TSCM X-ray inspection be conducted?

  • When the stakes are high.
  • When the opposition is formidable.
  • When the areas being inspected with regular TSCM methods are especially sensitive.
  • Whenever you bring new tech into the workplace en masse. New desk phones, new computer equipment, new gifts, for example.

How often should an a TSCM X-ray deep clean be conducted?

  • Once per year during the quarterly, proactive TSCM inspections. (Quarterly inspections are the norm for most businesses.)
  • Whenever there are active suspicions of illegal electronic surveillance.
  • Upon the discovery of a listening device or other suspicious object.


Counterespionage Tip: If one bug is discovered, keep searching. Professionals will plant multiple devices, with one being easy to find. Their strategy… to thwart further searching by inexperienced TSCM technicians.

Types of X-ray analysis services offered:

  • On-site, when we are conducting a Technical Surveillance Countermeasures (TSCM) inspection for you.
  • On-site, to inspect multiple new items entering your environment, such as new telephones, keyboards, computer mice, etc.
  • Objects may also be mailed to the Murray Associates TSCM lab for X-ray analysis. Contact them directly for details.
Full Press Release
 

Wednesday, April 7, 2021

Spy History: KGB Spy in 1961 Used X-Ray to Crack U.S. Top-Secret Lock

In late 1961 [Robert Lee Johnson] received the top-secret clearance and was admitted into the vault as a clerk. At long last the KGB was in. […] Over the following weeks the infiltration began in earnest as he successfully copied the vault keys using clay molds supplied by KGB operatives. 

In October of 1961 he received a specially manufactured X-ray device from Moscow that he was instructed to place over the final lock in the vault; KGB technicians could then deduce what combination unlocked the vault by studying the cogs inside the locking mechanism...

On 15 December 1962, Johnson accessed the vault for the first time and looted its contents. The operation, extensively rehearsed beforehand, went exactly as planned and by 03:15 the following morning some of America’s most sensitive cryptographic and military information⁠—some of it classified higher than top secret⁠—was on its way to Moscow. more

Friday, December 18, 2020

TSCM Tech Alert: If You Detect a Signal at 9.65 GHz You're Being Watched

A New Satellite Can Peer Inside Buildings, Day or Night

A few months ago, a company called Capella Space launched a satellite capable of taking clear radar images of anywhere in the world, with incredible resolution — even through the walls of some buildings.

And unlike most of the huge array of surveillance and observational satellites orbiting the Earth, its satellite Capella 2 can snap a clear picture during night or day, rain or shine...a capability that will only get more powerful with the deployment of six additional satellites next year. Is that creepy from a privacy point of view? Sure...

The satellite beams down a powerful 9.65 GHz radio signal toward its target, and then collects and interprets the signal as it bounces back up into orbit...

Possibilities abound. Train two SAR satellites on the same target and they can actually image targets in three dimensions down to minute differences in height. more

Tuesday, May 5, 2020

Air-Gapped PC Power Supplies Spills the Screens

One of the most secure system arrangements today consists of air-gapped PCs. The reason being their total disconnection from the internet.

In February this year, it was reported that hackers can steal data from air-gapped PC using screen brightness and now the same can be done through their power supply.

Mordechai Guri, a cybersecurity researcher from the Israeli Ben Gurion of the Negev University has conducted an experiment that shows how power supply units (PSUs) can be exploited to extract information from both an air-gapped & audio-gapped computer.

Termed as POWER-SUPPLaY; the malware exploits the PSU using it as an “out-of-band, secondary speaker with limited capabilities”. The data that can be extracted includes different files & information of the user’s keystrokes transmittable up to 1 meters away along with passwords and encryption keys that the attacker could receive with a device that is five meters away from such as a smartphone...

The research does not deal with the question of how the malware will be implemented in the first place. The technique is very clever nonetheless. more

Wednesday, January 22, 2020

FutureWatch: Mind-Reading Called Brain-Hacking - Food for Thought

The world is in the middle of a new technology arms race, according to best-selling historian Yuval Noah Harari, who warns that the prize being fought over this time is not physical territory, but our brains. 

Speaking at the World Economic Forum in Davos, Harari predicted a future where governments and corporations will be able to gather enough data about citizens around the world that, when combined with computational power, will let them completely predict – and manipulate – our decisions. Harari calls this concept "brain-hacking".

"Imagine, if 20 years from now, you could have someone sitting in Washington, or Beijing, or San Francisco, and they could know the entire personal, medical, sexual history of, say, every journalist, judge and politician in Brazil," said Harari.

"You could control a whole other country with data. At which point you may ask: is it an independent country, or is it a data colony?" more   Previous mind-reading posts.

Monday, November 18, 2019

The Invisible Man - 122 Years in the Making

“Quantum Stealth” (Light Bending material) non-powered adaptive camouflage which portrays what is behind the user in-front of the user bending the light around the target. The cost is inexpensive, very lightweight and there are no power requirements.

It even blocks thermal imaging! more

Thursday, August 29, 2019

A Golf Ball Right Out of Spy vs. Spy

Nissan Motor Co. has developed a golf ball that will help you make a putt with your eyes closed.

As a proof of concept, the carmaker unveiled a video on Tuesday, whereby a toddler taps a ball with his club and makes a putt that would make Tiger Woods’ jaw drop. Here’s how it works... more

Monday, June 17, 2019

Apple-knocker Forensic Advancement - iOS & Android are No Longer Secure.

The “arms race” of mobile forensics – ever-tougher encryption and the breakneck operations to crack it – has become more of a public tug-of-war than ever before.

Cellebrite, the largest player in the mobile-forensics industry, unveiled its UFED Premium last Friday. Along with the announcement came the bombshell: that it can now get into any Apple iOS device, and many of the high-end Android devices. 

“An exclusive solution for law enforcement to unlock and extract data from all iOS and Android devices,” the company said in a tweet.

Those devices have historically been the toughest to crack... more

Friday, May 10, 2019

Smokin' - New Camera Can See 28 Miles - Through Smog

A new camera can photograph you from 45 kilometers away...

Developed in China, the lidar-based system can cut through city smog to resolve human-sized features at vast distances...

Zheng-Ping Li and colleagues from the University of Science and Technology of China in Shanghai show how to photograph subjects up to 45 km (28 miles) away in a smog-plagued urban environment.

Their technique uses single-photon detectors combined with a unique computational imaging algorithm that achieves super-high-resolution images by knitting together the sparsest of data points...
Click to enlarge.
The results speak for themselves. 

The team set up the new camera on the 20th floor of a building on Chongming Island in Shanghai and pointed it at the Pudong Civil Aviation Building across the river, some 45 km away...

The entire device is about the size of a large shoebox and so is relatively portable. more

Friday, March 15, 2019

The New 'Cone of Silence', or The Death of Acoustical Ducting

Boston University researchers, Xin Zhang, a professor at the College of Engineering, and Reza Ghaffarivardavagh, a Ph.D. student in the Department of Mechanical Engineering, released a paper in Physical Review B demonstrating it's possible to silence noise using an open, ringlike structure, created to mathematically perfect specifications, for cutting out sounds while maintaining airflow.

"Today's sound barriers are literally thick heavy walls," says Ghaffarivardavagh. ...they are a clunky approach not well suited to situations where airflow is also critical...

They calculated the dimensions and specifications that the metamaterial would need to have in order to interfere with the transmitted sound waves, preventing sound—but not air—from being radiated through the open structure. The basic premise is that the metamaterial needs to be shaped in such a way that it sends incoming sounds back to where they came from, they say.

As a test case, they decided to create a structure that could silence sound from a loudspeaker. Based on their calculations, they modeled the physical dimensions that would most effectively silence noises... The metamaterial, ringing around the internal perimeter of the pipe's mouth, worked like a mute button. more

Thursday, September 13, 2018

FutureWatch: The AI Eye of Providence, or Silcon Santa Surveillance

NICE Actimize, a NICE business and the leader in Autonomous Financial Crime Management, is hosting a series of global events to educate financial services organization (FSO) professionals on the challenges of electronic communications (eComms) surveillance and which are designed to demonstrate how its innovative Intelligent eComms Surveillance solution can transform compliance and conduct risk management, while avoiding reputational damage and fines...

Powered by artificial intelligence and automation, NICE Actimize’s Intelligent eComms Surveillance solution is a comprehensive platform for automating employee surveillance and investigations. The solution provides a single platform for monitoring 100 percent communications across all communication channels, including voice, so analysts can easily uncover hidden conduct risks, collusion, and insider trading...

...it supports hundreds of data types and can connect to, ingest and index data from storage vaults containing emails, instant messages, chat room communications, social media threads, text messages and voice calls...

NICE Actimize’s Intelligent eComms Surveillance solution uses Natural Language Understanding (text analytics and linguistics), machine learning and intelligent analytics (all fine-tuned for financial markets) to comprehend the true context of conversations and accurately identify risk...

This systematic approach enables firms to identify suspicious communications with unprecedented accuracy... more

Keep in mind, the financial world had the initial need and means to develop this. Once evolved and rolled-out you can bet it will be customized for other uses. Eventually... click here.  ~Kevin

Sunday, July 1, 2018

Could Your Smartphone Battery Spy on You? (unlikely, but...)

Most batteries in today’s smartphone are intelligent enough to detect how people use their phones and employ power-saving technologies that result in longer battery life. That advantage sounds excellent all around, but...

The researchers who authored a paper [PDF] on the subject of smartphone batteries capable of spying on people pointed out that this hack would be quick to implement and difficult to detect. They say smartphone owners may even participate in helping the hacks happen by installing malicious batteries themselves.

It could happen in a scenario where a hacker sets up an online store and entices users with promises of extra-long battery life and low prices, sends a purchaser the battery and waits for it to become installed in the phone to begin the tracking segment of the hack.

Plus, the battery could be capable of continuous monitoring, giving hackers the opportunity to see almost all the things the targets do with their phones, whether that’s browsing the internet, typing on the phone’s keyboard or receiving calls. more

A bug made to look like a cell phone battery...

Thursday, June 14, 2018

X-Ray Vision Using Wi-Fi

The Machines now have X-ray vision. A new piece of software has been trained to use wifi signals — which pass through walls, but bounce off living tissue — to monitor the movements, breathing, and heartbeats of humans on the other side of those walls. The researchers say this new tech’s promise lies in areas like remote healthcare, particularly elder care, but it’s hard to ignore slightly more dystopian applications.

Click to enlarge.
 While it’s easy to think of this new technology as a futuristic Life Alert® monitor, it’s worth noting that at least one member of the research team at the Massachusetts Institute of Technology behind the innovation has previously received funding from the Pentagon’s Defense Advanced Research Projects Agency (DARPA). Another also presented work at a security research symposium curated by a c-suite member of In-Q-Tel, the CIA’s high-tech venture capital firm.

Inverse recently caught up with project’s leader Dina Katabi, a 2013 MacArthur “Genius Grant” Fellow who teaches electrical engineering and computer science at MIT, to talk about how the new tech may be used... more

Wednesday, September 6, 2017

"So, we created a picture of our suspect from DNA sweat found on the bugging device."

Damn interesting...
Identification of Individuals by Trait Prediction Using Whole-genome Sequencing Data

Researchers from Human Longevity, Inc. (HLI) have published a study in which individual faces and other physical traits were predicted using whole genome sequencing data and machine learning. This work, from lead author Christoph Lippert, Ph.D. and senior author J. Craig Venter, Ph.D., was published in the journal Proceedings of the National Academy of Sciences (PNAS).
Click to enlarge.
The authors believe that, while the study offers novel approaches for forensics, the work has serious implications for data privacy, deidentification and adequately informed consent. The team concludes that much more public deliberation is needed as more and more genomes are generated and placed in public databases. more

Tuesday, August 22, 2017

Spying Using Acoustic Imaging Via Smart Devices

A team of student hackers have demonstrated a method for using music to turn smart devices into tools for spying. The system is based on sonar, and embeds an inaudible signal into songs played on a smartphone or TV. The system can then use the device’s microphone to listen to how the signal bounces, and track the movements of anyone near the audio source.

The University of Washington research team behind the technology, known as CovertBand, tested it using a 42-inch Sharp TV in five different Seattle homes.

They found that the method is able to track the physical movements of multiple people to within 18 centimeters of accuracy, and even differentiate between particular gestures and motions. The tech can also track people, though less accurately, through walls.

They also demonstrated that listeners couldn’t distinguish between songs containing the hidden sonar signals, and those without it. ...and all CovertBand needs to work is a speaker and a microphone. more

Friday, April 14, 2017

Spy Camera in a USB Charger — Scam or Slam?

You decide...

Hummmm, wait until August and pay through the nose, or... buy it now, on eBay!



Monday, February 6, 2017

Weird TSCM Science - Tuning Windows to Block Radio Frequency Eavesdropping

A new flexible material developed by engineers at the University of California, San Diego (UCSD) is claimed to be able to tune out various portions of the electromagnetic spectrum while allowing others to pass through, such as being opaque to infra-red but transparent to visible light, for example. This material has the potential to vastly improve the efficiencies of solar cells, or create window coatings that not only let in visible light and keep out heat, but also stop electronic eavesdropping by blocking electromagnetic signals.

Though still very much at the working prototype stage, the researchers intend to further their research by analyzing the effects of different materials, physical arrangements, and semiconductor properties in an attempt to create materials that absorb light at different wavelengths for use in a variety of applications.

The results of this research were recently published in the journal Proceedings of the National Academy of Sciences. more

Sunday, November 27, 2016

Turn Any Computer Into an Eavesdropping Device

Researchers at Israel’s Ben-Gurion University of the Negev have devised a way to turn any computer into an eavesdropping device by surreptitiously getting connected headphones or earphones to function like microphones.

In a paper titled "SPEAKE(a)R: Turn Speakers to Microphones for Fun and Profit," the researchers this week described malware they have developed for re-configuring a headphone jack from a line-out configuration to a line-in jack, thereby enabling connected headphones to work as microphones.

The exploit works with most off-the-shelf headphones and even when the computer doesn’t have a connected microphone or has a microphone that has been disabled, according to the researchers. more

 Spoiler Alert: It ain't easy to do, or likely to happen to you. ~Kevin