It’s this second type of potential “probe” that has attracted the attention of scientists, including Harvard astronomer Avi Loeb. In addition to suggesting that Oumuamua might have been an alien spaceship, Loeb, who holds a Ph.D. in plasma physics, has also searched the bottom of the ocean for evidence of alien visitors. These ideas, however, are not widely accepted in the greater scientific community. more
Thursday, February 15, 2024
Aliens Could Be Spying On Us
It’s this second type of potential “probe” that has attracted the attention of scientists, including Harvard astronomer Avi Loeb. In addition to suggesting that Oumuamua might have been an alien spaceship, Loeb, who holds a Ph.D. in plasma physics, has also searched the bottom of the ocean for evidence of alien visitors. These ideas, however, are not widely accepted in the greater scientific community. more
Monday, December 26, 2022
FutureWatch: More Progress on the Electronic Dog Nose - TSCM Potential
Recap #2: Specially trained dogs have been used to sniff out covert electronic items, like cell phones in prisons, for quite a while now. The secret to detection is the device's electronic circuit boards. They contain these compounds: triphenylphosphine oxide (TPPO) and hydroxycyclohexyl phenyl ketone (HPK). This second compound is also found on CDs, DVDs, Blu-Rays, the old tech floppy disks. (5/18/2021) more
Researchers use biomimicry to enhance particle detection 16-fold by sniffing like dogs. more
FutureWatch: Technical Surveillance Countermeasures (TSCM) professionals have many types of technologies at their disposal for detecting illegal electronic surveillance devices. To name a few... Non-Linear Junction Detection, Infrared Thermography, and Radio-frequency Spectrum Analysis. We are now well on our way to adding EDN to our kit.
Wednesday, June 2, 2021
New X-Ray Inspection and Analysis Service Detects Eavesdropping Devices Secreted in Everyday Objects
Click to enlarge. |
Planting bugs, spy cameras, and other illegal surveillance devices is easy. Most come pre-disguised as fully functional everyday objects. They are being built into wall clocks, power strips, USB chargers, and even desktop calculators, for example.
Competent Technical Surveillance Countermeasures (TSCM) consultants have a variety of very effective ways to detect electronic surveillance devices. But, when the stakes are high enough—and the opposition is sophisticated enough—a Murray Associates TSCM X-ray deep clean is the logical option. This new service offers the most assurance that room objects are not bugged.
------
Kevin D. Murray, Director, relates an interesting cautionary tale, “There are also times when a TSCM X-ray deep clean is just smart due diligence. The classic example of a lack of due diligence is the KGB bugging of American typewriters during the Cold War.”
Popular Mechanics explains… “The Cold War spy drama that played out between the U.S. and the Soviet Union was the source of much ingenious spy technology. One of the most ingenious devices fielded by both sides was a typewriter designed to spy on the user, quietly transmitting its keystrokes to KGB listeners. The technology was an early form of keylogging but done entirely through hardware—not PC software.”
A total of 16 bugged typewriters were used at the U.S. Moscow embassy for over eight years before discovery. Had a TSCM X-ray inspection been conducted before the typewriters were installed, no secrets would have been lost.
Keep the KGB typewriters in mind when bringing in a new phone system, keyboards, mice or other office items. This is the ideal time to sneak a bug in, and for a TSCM X-ray deep clean.
------
Murray Associates TSCM can economically inspect all your new arrivals at one time, at your location, or ours. And, discretely security seal your items at no extra charge—before you start using them.
When should a TSCM X-ray inspection be conducted?
- When the stakes are high.
- When the opposition is formidable.
- When the areas being inspected with regular TSCM methods are especially sensitive.
- Whenever you bring new tech into the workplace en masse. New desk phones, new computer equipment, new gifts, for example.
How often should an a TSCM X-ray deep clean be conducted?
- Once per year during the quarterly, proactive TSCM inspections. (Quarterly inspections are the norm for most businesses.)
- Whenever there are active suspicions of illegal electronic surveillance.
- Upon the discovery of a listening device or other suspicious object.
Counterespionage Tip: If one bug is discovered, keep searching. Professionals will plant multiple devices, with one being easy to find. Their strategy… to thwart further searching by inexperienced TSCM technicians.
Types of X-ray analysis services offered:
- On-site, when we are conducting a Technical Surveillance Countermeasures (TSCM) inspection for you.
- On-site, to inspect multiple new items entering your environment, such as new telephones, keyboards, computer mice, etc.
- Objects may also be mailed to the Murray Associates TSCM lab for X-ray analysis. Contact them directly for details.
Wednesday, April 7, 2021
Spy History: KGB Spy in 1961 Used X-Ray to Crack U.S. Top-Secret Lock
In October of 1961 he received a specially manufactured X-ray device from Moscow that he was instructed to place over the final lock in the vault; KGB technicians could then deduce what combination unlocked the vault by studying the cogs inside the locking mechanism...
On 15 December 1962, Johnson accessed the vault for the first time and
looted its contents. The operation, extensively rehearsed beforehand,
went exactly as planned and by 03:15 the following morning some of
America’s most sensitive cryptographic and military information—some of
it classified higher than top secret—was on its way to Moscow. more
Friday, December 18, 2020
TSCM Tech Alert: If You Detect a Signal at 9.65 GHz You're Being Watched
A New Satellite Can Peer Inside Buildings, Day or Night
A few months ago, a company called Capella Space launched a satellite capable of taking clear radar images of anywhere in the world, with incredible resolution — even through the walls of some buildings.
And unlike most of the huge array of surveillance and observational satellites orbiting the Earth, its satellite Capella 2 can snap a clear picture during night or day, rain or shine...a capability that will only get more powerful with the deployment of six additional satellites next year. Is that creepy from a privacy point of view? Sure...
The satellite beams down a powerful 9.65 GHz radio signal toward its
target, and then collects and interprets the signal as it bounces back
up into orbit...
Possibilities abound. Train two SAR satellites on the same target and they can actually image targets in three dimensions down to minute differences in height. more
Tuesday, May 5, 2020
Air-Gapped PC Power Supplies Spills the Screens
In February this year, it was reported that hackers can steal data from air-gapped PC using screen brightness and now the same can be done through their power supply.
Mordechai Guri, a cybersecurity researcher from the Israeli Ben Gurion of the Negev University has conducted an experiment that shows how power supply units (PSUs) can be exploited to extract information from both an air-gapped & audio-gapped computer.
Termed as POWER-SUPPLaY; the malware exploits the PSU using it as an “out-of-band, secondary speaker with limited capabilities”. The data that can be extracted includes different files & information of the user’s keystrokes transmittable up to 1 meters away along with passwords and encryption keys that the attacker could receive with a device that is five meters away from such as a smartphone...
The research does not deal with the question of how the malware will be implemented in the first place. The technique is very clever nonetheless. more
Wednesday, January 22, 2020
FutureWatch: Mind-Reading Called Brain-Hacking - Food for Thought
Speaking at the World Economic Forum in Davos, Harari predicted a future where governments and corporations will be able to gather enough data about citizens around the world that, when combined with computational power, will let them completely predict – and manipulate – our decisions. Harari calls this concept "brain-hacking".
"Imagine, if 20 years from now, you could have someone sitting in Washington, or Beijing, or San Francisco, and they could know the entire personal, medical, sexual history of, say, every journalist, judge and politician in Brazil," said Harari.
"You could control a whole other country with data. At which point you may ask: is it an independent country, or is it a data colony?" more Previous mind-reading posts.
Monday, November 18, 2019
The Invisible Man - 122 Years in the Making
It even blocks thermal imaging! more
Thursday, August 29, 2019
A Golf Ball Right Out of Spy vs. Spy
As a proof of concept, the carmaker unveiled a video on Tuesday, whereby a toddler taps a ball with his club and makes a putt that would make Tiger Woods’ jaw drop. Here’s how it works... more
Monday, June 17, 2019
Apple-knocker Forensic Advancement - iOS & Android are No Longer Secure.
Cellebrite, the largest player in the mobile-forensics industry, unveiled its UFED Premium last Friday. Along with the announcement came the bombshell: that it can now get into any Apple iOS device, and many of the high-end Android devices.
“An exclusive solution for law enforcement to unlock and extract data from all iOS and Android devices,” the company said in a tweet.
Those devices have historically been the toughest to crack... more
Friday, May 10, 2019
Smokin' - New Camera Can See 28 Miles - Through Smog
Developed in China, the lidar-based system can cut through city smog to resolve human-sized features at vast distances...
Zheng-Ping Li and colleagues from the University of Science and Technology of China in Shanghai show how to photograph subjects up to 45 km (28 miles) away in a smog-plagued urban environment.
Their technique uses single-photon detectors combined with a unique computational imaging algorithm that achieves super-high-resolution images by knitting together the sparsest of data points...
Click to enlarge. |
The team set up the new camera on the 20th floor of a building on Chongming Island in Shanghai and pointed it at the Pudong Civil Aviation Building across the river, some 45 km away...
The entire device is about the size of a large shoebox and so is relatively portable. more
Friday, March 15, 2019
The New 'Cone of Silence', or The Death of Acoustical Ducting
"Today's sound barriers are literally thick heavy walls," says Ghaffarivardavagh. ...they are a clunky approach not well suited to situations where airflow is also critical...
They calculated the dimensions and specifications that the metamaterial would need to have in order to interfere with the transmitted sound waves, preventing sound—but not air—from being radiated through the open structure. The basic premise is that the metamaterial needs to be shaped in such a way that it sends incoming sounds back to where they came from, they say.
As a test case, they decided to create a structure that could silence sound from a loudspeaker. Based on their calculations, they modeled the physical dimensions that would most effectively silence noises... The metamaterial, ringing around the internal perimeter of the pipe's mouth, worked like a mute button. more
Thursday, September 13, 2018
FutureWatch: The AI Eye of Providence, or Silcon Santa Surveillance
Powered by artificial intelligence and automation, NICE Actimize’s Intelligent eComms Surveillance solution is a comprehensive platform for automating employee surveillance and investigations. The solution provides a single platform for monitoring 100 percent communications across all communication channels, including voice, so analysts can easily uncover hidden conduct risks, collusion, and insider trading...
...it supports hundreds of data types and can connect to, ingest and index data from storage vaults containing emails, instant messages, chat room communications, social media threads, text messages and voice calls...
NICE Actimize’s Intelligent eComms Surveillance solution uses Natural Language Understanding (text analytics and linguistics), machine learning and intelligent analytics (all fine-tuned for financial markets) to comprehend the true context of conversations and accurately identify risk...
This systematic approach enables firms to identify suspicious communications with unprecedented accuracy... more
Keep in mind, the financial world had the initial need and means to develop this. Once evolved and rolled-out you can bet it will be customized for other uses. Eventually... click here. ~Kevin
Sunday, July 1, 2018
Could Your Smartphone Battery Spy on You? (unlikely, but...)
The researchers who authored a paper [PDF] on the subject of smartphone batteries capable of spying on people pointed out that this hack would be quick to implement and difficult to detect. They say smartphone owners may even participate in helping the hacks happen by installing malicious batteries themselves.
It could happen in a scenario where a hacker sets up an online store and entices users with promises of extra-long battery life and low prices, sends a purchaser the battery and waits for it to become installed in the phone to begin the tracking segment of the hack.
Plus, the battery could be capable of continuous monitoring, giving hackers the opportunity to see almost all the things the targets do with their phones, whether that’s browsing the internet, typing on the phone’s keyboard or receiving calls. more
A bug made to look like a cell phone battery...
Thursday, June 14, 2018
X-Ray Vision Using Wi-Fi
Click to enlarge. |
Inverse recently caught up with project’s leader Dina Katabi, a 2013 MacArthur “Genius Grant” Fellow who teaches electrical engineering and computer science at MIT, to talk about how the new tech may be used... more
Wednesday, September 6, 2017
"So, we created a picture of our suspect from DNA sweat found on the bugging device."
Identification of Individuals by Trait Prediction Using Whole-genome Sequencing Data
Researchers from Human Longevity, Inc. (HLI) have published a study in which individual faces and other physical traits were predicted using whole genome sequencing data and machine learning. This work, from lead author Christoph Lippert, Ph.D. and senior author J. Craig Venter, Ph.D., was published in the journal Proceedings of the National Academy of Sciences (PNAS).
Click to enlarge. |
Tuesday, August 22, 2017
Spying Using Acoustic Imaging Via Smart Devices
The University of Washington research team behind the technology, known as CovertBand, tested it using a 42-inch Sharp TV in five different Seattle homes.
They found that the method is able to track the physical movements of multiple people to within 18 centimeters of accuracy, and even differentiate between particular gestures and motions. The tech can also track people, though less accurately, through walls.
They also demonstrated that listeners couldn’t distinguish between songs containing the hidden sonar signals, and those without it. ...and all CovertBand needs to work is a speaker and a microphone. more
Friday, April 14, 2017
Spy Camera in a USB Charger — Scam or Slam?
Monday, February 6, 2017
Weird TSCM Science - Tuning Windows to Block Radio Frequency Eavesdropping
Though still very much at the working prototype stage, the researchers intend to further their research by analyzing the effects of different materials, physical arrangements, and semiconductor properties in an attempt to create materials that absorb light at different wavelengths for use in a variety of applications.
The results of this research were recently published in the journal Proceedings of the National Academy of Sciences. more
Sunday, November 27, 2016
Turn Any Computer Into an Eavesdropping Device
In a paper titled "SPEAKE(a)R: Turn Speakers to Microphones for Fun and Profit," the researchers this week described malware they have developed for re-configuring a headphone jack from a line-out configuration to a line-in jack, thereby enabling connected headphones to work as microphones.
The exploit works with most off-the-shelf headphones and even when the computer doesn’t have a connected microphone or has a microphone that has been disabled, according to the researchers. more
Spoiler Alert: It ain't easy to do, or likely to happen to you. ~Kevin