Monday, August 4, 2025
Quote of the Week: "Nobody with Sensitive Information is Immune to Espionage"
He said foreign intelligence agencies were “aggressively targeting” three key areas: science and technology, particularly advanced technology; public and private sector projects to gain a commercial advantage; and Antarctic research, green technology, critical minerals, and rare earths extraction and processing.
What information are spies taking?
Mr Burgess warned this meant “nobody with sensitive information is immune” and gave examples of recent operations investigated by ASIO. more
Monday, March 24, 2025
Dr. Seuss on Surveillance
Dr. Seuss wrote a story about a Hawtch-Hawtcher Bee-Watcher who had a rather peculiar job. He was tasked with keeping an eye on his town’s only lazy bee.
The idea was that if a bee is watched, it’ll work harder, right?
Well, guess what? That didn’t seem to work at all! So, they decided to assign another Hawtch-Hawtcher to watch the first one, and then another to watch the second… and so on. Before you know it, the entire town was watching each other watch a bee!
Wednesday, December 11, 2024
Security Director Alert: Latest Electronic Surveillance of Corporate Executives
• Espionage claims arise as boardroom battle continues.
According to a report by The Times, three current and former executives of Boohoo are believed to be the victims of stalking and surveillance. The alleged espionage is said to have been committed against Boohoo’s co-founder and executive chair Mahmud Kamani, chief executive Dan Finley and former CEO, John Lyttle.
The allegations were brought to light after the company informed the Information Commissioner’s Office (IOC) of a related incident taking place outside of its Manchester headquarters. The report was confirmed by the IOC in a statement to the press, which read: “We can confirm that Boohoo Group has made us aware of concerns regarding the discovery of surveillance equipment outside its head office.”
In a more recent update, the Times has now reported that police in Manchester and Kent are investigating the claims, with Greater Manchester Police stating to the media outlet that it was looking into allegations “involving serious distress”. No arrests have been made, so far. more
Tuesday, December 3, 2024
Cautionary Tale for Traveling Executives - A Case of Spy Tradecraft...
...five Bulgarian nationals who are accused of spying in Britain as part of a ring co-ordinated by Jan Marsalek, the former chief operating officer of Wirecard.
![]() |
Bulgarian national Katrin Ivanova (Elizabeth Cook/PA) |
She said: “These images were extremely important as they showed Christo Grozev together with others of interest to Russia, Eliot Higgins.
She showed off her “tradecraft” by relaying images, using covert recording equipment and capturing Mr Dobrokhotov’s iPhone PIN number, Mr Morgan said. more
Tuesday, March 12, 2024
Singapore Sting: How spies Listened in on German General
But how were spies able to eavesdrop?
The answer we've been given so far boils down to a case of human error. According to German authorities, the "data leak" was down to just one participant dialing in on an insecure line, either via his mobile or the hotel wi-fi. more
- Are the numbers and passcodes for your conference calls distributed via email?
- Do you or your assistants post these at their desks?
- Are the numbers and passcodes ever changed?
Friday, January 19, 2024
Corporate Espionage: A Very Basic Cautionary Tale
Like the hare, the United States had long enjoyed a substantial lead in developing defense-industrial sectors and innovating dual-use technologies. However, Washington has since rested on its laurels and exposed itself to theft through its lax counterintelligence posture.
Wednesday, October 18, 2023
Yet Another USB Cautionary Tale
Mr Burgess (ASIO Director General Mike Burgess) referenced an unnamed Australian company that found global success making a product "similar to a motion detector" before their sales suddenly dropped.
"A little while later, their product started being returned to the factory because they were broken," he said.
"When they opened their branded products, they discovered they weren't their branded products, because the components were inferior, they were exact knock-offs."
The problem was eventually traced to an international conference, where someone had offered to share information with one of the company's employees by plugging a USB into their laptop.
"That USB downloaded malware onto that laptop, which later on, when they were connected back to their corporate network, was used to steal their intellectual property," he said.
"That intellectual property was passed from the intelligence services to state-owned enterprise that mass-produced the goods and sold them on the market that undercut them." more
• USB – Hacked Charging Cables
• USB – Malicious Spy Cable Detector Instructions
• USB – General Memory Stick Warning
• USB – NSA Type Cable Bug – $6.74
Extra USB Spy News - Government entities in the Asia-Pacific (APAC) region are the target of a long-running cyber espionage campaign dubbed TetrisPhantom. "The attacker covertly spied on and harvested sensitive data from APAC government entities by exploiting a particular type of secure USB drive, protected by hardware encryption to ensure the secure storage and transfer of data between computer systems," Kaspersky said in its APT trends report for Q3 2023. more
Wednesday, October 4, 2023
If Ants Can be Tricked, What Chance do Corporations Have?
In a study in the journal Science, researchers report that blue butterfly caterpillars infiltrate red ant colonies and grub food by mimicking the raspy sound of the ant queen.
It’s good to be the Queen. You get fed and cared for and generally treated like royalty. But if you’re a blue butterfly caterpillar, you can get the same benefits by just pretending to be queen. Because these crafty caterpillars trick ants into feeding them—by mimicking the sound of their queen.
Ants are social creatures whose colonies contain a queen ant, and hordes of worker ants who feed the queen and take care of all her young. Blue butterfly caterpillars have come up with clever ways to exploit that system. These parasitic caterpillars take up residence in the nests of red ants. And they mooch free meals in part by waggling their heads to beg for food like all the other ant grubs.
- Your company is filled with hard-working, innocent, social creatures.
- Anyone bent on corporate espionage knows they just have to blend in.
- They will listen to your sounds.
- They will exploit your system.
- They will imitate loyalty.
- They will eat your lunch.
- Fight back.
Monday, September 25, 2023
Legacy Systems Threaten Security in Mergers & Acquisitions
We have seen two primary trends throughout 2023:
– Threat groups are closely following news cycles, enabling them to quickly target entire portfolios with zero-day attacks designed to upend aging technologies — disrupting businesses and their supply chains.
– Corporate espionage cases are also on the rise as threat actors embrace longer dwell times and employ greater calculation in methods of monetizing attacks. more
Saturday, June 17, 2023
A Tale of High-Stakes Corporate Espionage... a cautionary tale.
Thursday, June 8, 2023
Cautionary Tale: Commercial Espionage - Bugging of Business Meetings
Friday, March 10, 2023
How to Spot a Chinese Spy on Social Media
There are a few things to look out for if you think you’re being targeted on social media.
- Urgency: Be cautious of anyone who connects on social media and makes it seem like they need information quickly.
- Do your research: Be skeptical of anyone who claims to be part of a company or think tank where there is little or no information available on the organization.
- Probing questions: Be wary of social media accounts that connect and follow up with a lot of questions pertaining to industry specifics.
Both experts said it’s best to follow the old adage: if the offer sounds too good to be true, then it probably is. more
Thursday, January 19, 2023
Attorney's Wiretap Claims Against Old Firm To Continue
Plaintiff Daniel Alholm timely filed his state and federal wiretapping claims against the law firm, Judge Mary M. Rowland of the US District Court for the Northern District of Illinois said Tuesday.
Rowland rejected the firm’s argument that Alholm filed the wiretapping claims after the two-year statute of limitations had run, and denied its motion to dismiss as to those claims. She also dismissed Alholm’s fraud claims against the firm, but affirmed that the court would exercise supplemental jurisdiction over his state law misappropriation of likeness claims.
Alholm alleged that the firm surveilled employees in both its Chicago and Nashville offices, recorded conference calls and employees’ individual calls, and made unethical management and financial decisions. more
Wednesday, January 18, 2023
Cautionary Tale: Secreted Cell Phones
Wednesday, December 7, 2022
PI Surveillance of Hand Injury Plaintiff Becomes 30.1 Billion Lawsuit
$11M settlement sparks $13.1B suit against American Family Insurance
A new lawsuit seeking billions of dollars in punitive damages claims AmFam and other parties illegally surveilled the plaintiff and her family...
“The AmFam defendants’ directions to the Martinelli Investigations Defendants included the mandate to have the investigators do whatever they needed to do to get surveillance of the plaintiff,” it said. “This direction was passed on to the Martinelli Investigations defendants by the Baker Donelson defendants.”
The PI defendants “unlawfully entered” Mezquitals’ property and “placed various electronic devices” on her property and two vehicles “to unlawfully record the activities of Plaintiff and her minor children. The electronic devices included at least one hidden video camera and multiple GPS tracking devices.”
The complaint said the PI team strapped a Spypoint Link-Dark “trail cam” digital camera, which is to a tree positioned to “capture plaintiff’s house, vehicles, and a portion of Plaintiff’s driveway. “The view provided by the Spypoint Link-Dark camera is not possible to obtain from a public road or from any other public property, it said. The “unlawful recordings were made without the consent of all persons observed and included photographs, videos, and electronic recordings of the activities of plaintiff and her minor children in a private place that was out of public view.”
The complaint includes claims for invasion of privacy, trespass to realty, trespass to personality, intentional infliction of emotional distress, negligence and punitive damages and seeks joint and several liability for all the defendants. more (Spypoint camera sales video)
Tuesday, August 16, 2022
Be Careful What You Fish For
Friday, October 16, 2020
Woman Allegedly Hacked Ex’s Alexa to Scare off New Girlfriend
Double Feature!
An IoT Cautionary Tale...
A Crazy Ex Tale...
A jilted London woman allegedly hacked into her ex-boyfriend’s Amazon Alexa device and used it to scare off his new girlfriend, a report said.
Philippa Copleston-Warren, 45, was accused in a London court of using the virtual assistant to flash the lights inside her former boyfriend’s house on and off and tell his new sweetie to scram after he ended their relationship of two years, The Sun reported.
“The defendant spoke through the Alexa account to tell the complainant’s friend in the property to leave and to take her stuff,” prosecutor Misba Majid told Westminster Magistrates’ Court, according to the newspaper.
“This so distressed the girlfriend, it caused her to cry and she left.”
Copleston-Warren (inset), a management consultant, controlled the device from London, about 130 miles from her businessman ex-beau’s house in Lincolnshire, the paper reported.
She is also accused of hacking her ex’s Facebook account and uploading nude pictures of him. more
Spybuster Tip # 721: Learn how to adjust ALL the features of your digital assistant. This could have been prevented.
Friday, August 28, 2020
Security Management: Which Type of Employee Do You Inspire

Sudhish Kasaba Ramesh, who worked at Cisco from July 2016 to April 2018, admitted in a plea agreement with prosecutors that he had deliberately connected to Cisco's AWS-hosted systems without authorization in September 2018 – five months after leaving the manufacturer.
He then proceeded to delete virtual machines powering Cisco's WebEx video-conferencing service... According to prosecutors, Ramesh's actions resulted in the shutdown of more than 16,000 WebEx Teams accounts for up to two weeks, which cost Cisco roughly $1.4m in employee time for remediation and over $1m in customer refunds. more
OR...
Earlier this week, the FBI arrested a 27-year-old Russian citizen for attempting to carry out a ransomware attack against a US company. It turns out that company was Tesla.
According to a complaint shared by the Department of Justice, in July, Egor Igorevich Kriuchkov traveled to the US and contacted a Russian speaking, non-US citizen who was working at the Tesla Gigafactory in Sparks, Nevada.
After meeting with that individual, Kriuchkov allegedly proposed a deal. He would pay the employee $1 million to deliver malware to computer systems at the Gigafactory...The employee immediately informed Tesla, and the company contacted the FBI, which launched a sting operation. Agents arrested Kriuchkov in Los Angeles as he was attempting to leave the US. more
Loyal employees can be worth more than you think. Treat them fairly. Make them feel a part of the security effort, and you will have a security army working for you. ~Kevin
Friday, August 7, 2020
Satellite Comms Globally Open to $300 Eavesdropping Hack
Essentially what this means is that if they were able to perform an
interception, adversaries could eavesdrop on vast sections of the globe. more