Showing posts with label find. Show all posts
Showing posts with label find. Show all posts

Tuesday, October 17, 2017

How the All Blacks Bugging Story Ends

The security consultant who escaped conviction in a bugging case is reportedly back working with the All Blacks in Australia.

Adrian Gard, 52, was placed on a one-year good behaviour bond last month for breaching his security licence when organising a sweep of the Sydney hotel where the All Blacks were staying ahead of a test match against Australia in August of last year. more

Friday, October 13, 2017

Google Home Mini Caught 'Spying' on Owner

A flaw has been discovered in the new Google Home Mini that allows the device to secretly record without the user knowing and sending the information to Google.

The flaw was discovered last week by tech blogger Artem Russakovskii and written about on Android Police. Russakovskii, who was given a free sample device before the official launch later this month, first noticed the device continually turned on and off on its own. Later, when he checked the activity logs, he saw that the device was recording without being prompted.

"My Google Home Mini was inadvertently spying on me 24/7 due to a hardware flaw," Russakovskii wrote.

In a letter to Google, he added: "Needless to say, if a listening device records almost every minute of every day and stores it remotely, we're talking about a huge privacy violation." Google then sent out an engineer to pick up and examine the next day. They then said the problem stemmed from a a glitch on the device's touch pad.

Friday, August 18, 2017

TSCM News: All Blacks Bugging Case Settled

Australia - Adrian Gard, the security consultant at the centre of the All Blacks bugging case, had his public mischief charge dismissed by a Sydney court on Friday.

Gard was accused of making a false statement to police about a listening device found in the All Blacks’ hotel meeting room before the August 2016 match against Australia in Sydney.

The magistrate was unable to rule out that someone else could have planted the bug.

Gard was found guilty of a second charge relating to carrying out a security operation without a license.

The matter, dubbed “bug-gate”, caused much friction between the Australian and New Zealand Rugby unions when it was revealed last year. more

Moral of the story... This all could have been avoided if the All Blacks spent the money to hire a real, reputable (and licensed) technical security consultant. ~Kevin

Tuesday, July 11, 2017

The Great Seal Redux - Former Minister Admits to Installing a Video / Audio Bug

Ghana - The former Minister of Lands and Natural Resources, Alhaji Inusah Fuseini, has said that he installed the spying device retrieved from the office of the current Minister, John Peter Amewu...

According to him, the hue and cry over the incident was not necessary as the device was not even fully installed... (it appears fully installed)

The device was planted in the huge Coat of Arms plaque hanging in the far left corner of the Minister’s office.

The device included a camera, a storage unit and another device suspected to be a transmitter. It was neatly housed in a black metal box and used batteries.* more

* This description is not totally accurate, based on what's seen in the photo. 
For more on the original Great Seal Bug click here

UPDATE #1
It has emerged that, the secret audiovisual recording device planted at the Lands and Natural Resource Minister’s office was discovered by an Israeli national and not National Security operatives as widely speculated.

According to the Public Relations Officer of the Lands Ministry, Abraham Otabil, the Israeli national [name withheld], who had called on the minister to discuss some private matters when he surprisingly detected the ‘spying’ gadget...

He added that, the detective and his team discovered the bugged device after a brief inspection was carried out at the office. Though the said Israeli national, could not tell the minister how long the device had been planted, National Security operatives were alerted to pick up the matter for further investigations. more

UPDATE #2
Following the bugging of the office of the Minister of Lands and Natural Resources by a former minister under the out-gone National Democratic Congress (NDC) administration – Inusah Fuseini, the Majority Leader in Parliament, Osei Kyei-Mensah-Bonsu, has suggested to all ministers and deputy ministers in the current regime to have their offices screened and swept by the Bureau of National Investigations (BNI).

He said personally, he was going to ask the security agencies to also screen and sweep his office. more

UPDATE #3
The Member of Parliament for Kumbungu, Ras Mubarak, has admitted bugging the office and vehicle of the current acting Chief Executive of the National Youth Authority, Mr Emmanuel Asigiri. more

Tuesday, February 7, 2017

All Blacks Bugging: Man Charged

A man, understood to be a security consultant for New Zealand's All Blacks rugby team, has been charged over a listening device found in the team's Sydney hotel room during last year's Bledisloe Cup.

The device — described as similar to that used by law enforcement and spy agencies — was found inside a chair during a routine security search of the team's meeting room at the Intercontinental Hotel at Double Bay ahead of a Bledisloe Cup match against Australia last year.

Adrian Gard, 51, is understood to be a consultant for BGI Security which was contracted by the All Blacks during their Bledisloe Cup campaign.

He has been charged with public mischief over the bugging incident. more

Sunday, January 15, 2017

State Insurer Caught up in Eavesdropping Scandal

Chinese insurance regulator said that a state insurer used an iPhone and a voice recorder to eavesdrop on inspectors.

China Insurance Regulatory Commission Shandong bureau said Saturday that the eavesdropping devices were found at the Weifang office of Yingda Taihe Property Insurance.

The regulator had been inspecting the Shandong branch.

On Jan. 6, inspectors found the iPhone and voice recorder taped under their chairs. Neither Yingda nor the regulator elaborated on how the tapping devices were found.

"Their purpose was to listen in on the discussions, so that they could obstruct and thwart inspections," sources with the insurance regulator said. more

This is why accounting firms who conduct on-site audits often have their dedicated offices swept for bugs. Smart. ~Kevin

Wednesday, December 21, 2016

Recorder Found Hidden in the End of a Flashlight

via John Van de Luijtgaarden

"I was just asked to confirm a finding... Got a message with a bad picture of a round black "thingie" inside the end part of a Mag-Lite.

I immediately recognized this one as the EDIC type 16 recorder (B30 model). It is now to wait for the exact type and how much it has been recording. It's memory capacity can run up to a 300 hours sadly the battery cannot.



A great hiding place for a naughty tool in a strategic place !! The Security main office / control room... Keeping you informed"

Thursday, December 8, 2016

TSCM Team Finds "Plug Bug" Eavesdropping Device

Japan - An eavesdropping device was found in a waiting room for conservative members of the Mito Municipal Assembly, local city government officials and other sources told the Mainichi Shimbun on Dec. 7.

Example of a "Plug Bug"
Ibaraki Prefectural Police seized the device and are investigating the case which they suspect could constitute trespassing into the building and violation of the Radio Act.

According to Mito Government officials, it was tipped off about the bug on Dec. 6.

Specialized workers hired by the local government began searching for the device from the evening of Dec. 7 and found it in a waiting room for three assembly members from "Suiseikai" -- a conservative parliamentary group -- on the first floor of the temporary two-story prefabricated assembly building. The bug plugs into an electric outlet. more

The example shown operates like a cell phone, but looks (and also operates) as a USB charger. It is powered 24/7, and may be called from a cell phone anywhere in the world. BTW, it can  also automatically call the eavesdropper when it detects sound. Available on eBay for $14.79. 

Don't you think its time to have your offices and conference rooms checked? ~Kevin

Thursday, November 10, 2016

Business Espionage: Bugger Caught in the Act

UK - A camera recording with audio was found under a chair during a private meeting of MPs. 

British sportswear company Sports Direct was being paid an unannounced visit by members of the House of Commons’ Business Select Committee. The MPs were there to insure that good working practices were being upheld by the company.

The MPs gave Sports Direct a one-hour warning before arriving, part of a long-running investigation into conditions at the company. During their visit, they were having a private meeting over lunch to discuss their findings. It was then that Labour MP Anna Turley spotted a staff member hiding a camera in the room where they were meeting. 

Turley says a woman came into the room to bring sandwiches to the MPs, then she crouched down to hide a camera under a chair. “I saw her trying to arrange it to get the best angle so that they could video us up at the board table and listen to what we were saying.” more

The device was identified as a small Go-Pro camera, which records excellent audio as well as video. ~Kevin

Sunday, August 21, 2016

TSCM Find: Bug Discovered in Hotel Meeting Room Used by New Zealand Rugby Team

New Zealand Rugby says a Sydney hotel room where the All Blacks held meetings was bugged before their first Bledisloe Cup match against Australia.

The New Zealand Herald reported that a "sophisticated" listening device found on Monday had been hidden in a chair...

The paper reported that hiding the bug "was a highly skilled and meticulous act and whoever put it there would have needed a significant amount of time to have pulled off such an accomplished job".

Indications are that the device was working and would have transmitted conversations about the All Blacks' strategy for Saturday's match. more

The Herald understands the foam of the seat appeared to have been deliberately and carefully cut to make way for the device and then sewn or glued back together to be almost undetectable. more


Monday, August 3, 2015

Down Under News - Spy Camera Found in Toilet at Shopping Center

Australia - Detectives are investigating how a small camera came to be hidden inside a smoke alarm in a public toilet at a suburban Perth shopping centre.

Its discovery by a worker, understood to be an electrician, on Friday prompted management at Belmont Forum to conduct a “thorough sweep” of all its facilities to ensure there were no other devices.

WA Police are examining the contents on the camera.

A man posted on Facebook on Friday that he was working at Belmont Forum and when he went to the toilet he noticed the smoke alarm flashing. He said he pulled the smoke alarm cover off the ceiling and found a cordless camera inside.

The man said the discovery made him feel sick. He urged people to be vigilant about anything “dodgy” and to check for “domestic battery-operated smoke alarms” in public toilets.

Images posted on Facebook of what looks like a hidden camera, discovered in a smoke detector.

A spokeswoman for Belmont Forum said: “The device was immediately handed into centre management and subsequently turned over to WA Police.

“Belmont Forum is assisting WA Police with the investigation and has conducted a thorough sweep of all the facilities in the shopping centre. No further devices have been found.” more 

Interesting... This is the same camera I featured in the Basic Cameras chapter of my on-line Spycam Detection training course. Even more interesting... the camera also transmits a wireless signal directly to a smartphone. You can preview the Basic Cameras chapter for FREE. https://www.udemy.com/spycam-detection/ (scroll down to Basic Cameras)

Wednesday, December 17, 2014

Norway - Eavesdropping Devices Found - UPDATE

Stingray mobile phone surveillance equipment estimated to cost up to £200,000 has been found hidden near the Norwegian parliament, believed to be snooping on legislators.

Following a two week investigation, Norway's Aftenposten newspaper reported to the Norwegian National Security Authority (NSM) that it had discovered IMSI-catchers (International Mobile Subscriber Identity) of a type believed sold by Harris Corporation, located inside fake mobile phone stations near government and parliamentary buildings in Oslo. At least six devices were found, each about the size of a suitcase. Potential targets within a radius of one kilometre of the equipment include the prime minister's office, the ministry of defence, Stortinget (parliament) and the central bank, Norges Bank, ministers, state secretaries, members of parliament, state officials, the American and Israeli embassies as well as many private businesses...

Initially IMSI-catchers only collect data from the sim-card but the intrusion can escalate, as the Aftenposten report explains: The most advanced versions can register several hundred numbers in just a few minutes. Once a mobile phone has been detected by a fake base station, the IMSI-catcher can enter an active mode to eavesdrop on certain conversations. Then it will transmit the conversation to the real GSM-system acting as a ‘man-in-the-middle.

The fake base station can even register SMS-messages and install spyware enabling its operator to switch on the microphone so that the mobile phone can be used to bug rooms and meetings. (more)

Thursday, October 23, 2014

Ask the Consultant - Spycam Question Received this Week

"Have you ever been called upon by a client to check for unauthorized or hidden cameras?
And to that end, is there some technology available to security professionals (not what the Secret Service uses) that can identify wireless cameras?"
 


Yes. The video voyeurism craze had prompted requests from corporate clients, country clubs, private schools and religious institutions (usually in response to an incident), and occasionally pro-actively, for due diligence purposes.

DIY detecting cameras in situ can be accomplished in several ways...

Spycam finds courtesy Murray Associates.
  1. Physical inspection - If you know where a spycam is likely to be looking (bathroom, bedroom, office, etc.), stand there and do a 360º turn. The camera will be in your line-of-sight (take into account mirrors).
  2. Look for the lens - This may be accomplished with this device, or with this app. Neither solution is 100% effective, however.
  3. If the device is not recording internally, but broadcasting a FM radio-frequency signal, there are these detectors 1 2 . Neither solution is 100% effective, however.
  4. If the camera is transmitting to the Internet via Wi-Fi (popular with the baby monitors), detection options 1 & 2 are the best bet for the amateur sleuth. A professional TSCM team will be able to conduct a Wi-Fi analysis to absolutely detect the transmitter.
  5. Thermal imaging is also very effective for finding "live" cameras (as opposed to the battery powered ones that just snap photos upon sensing movement). This has become affordable this year with the introduction of this iPhone add-on.
  6. Call us. In addition to Wi-Fi analysis, we also use Non-Linear Junction Detection (NLJD), more sensitive thermal imaging, and spectrum analysis detection techniques.
You may also want to read this.

by Kevin D. Murray CPP, CISM, CFE

Sunday, September 7, 2014

Spy Rule 1 - If you find a bug, don't touch it.

Israel remotely detonated a spying device planted in south Lebanon, killing a member of the Lebanese militant Hezbollah in the explosion, the group said Friday.

Hezbollah Al-Manar TV said Hassan Ali Haidar was killed after army intelligence spotted a "strange device" in the village of Adloun. A jet detonated the device remotely after it was discovered, killing Haidar, it said.
 

The device was planted on the militant group's telecommunications network. (more)

Wednesday, May 21, 2014

Herbalife Ltd. Claims to have Discovered Bugs in its Los Angeles Headquarters

Charlie Gasparino, Fox News, on reports Herbalife found listening devices at its headquarters in Los Angeles. (video)

Monday, May 19, 2014

Today in Eavesdropping History

1964 - American officials have discovered a network of 40 microphones buried for 11 years deep in the walls of four floors of the U.S. embassy in Moscow, the State Department said today [May 19]. ‘‘It must be assumed that at least some of them were in operating condition when discovered,’’ said a State Department statement. State Department officials described the discovery as the ‘‘worst case’’ of ‘‘bugging’’ found so far in U.S. posts behind the Iron Curtain. They said they were found in the ‘‘eighth, ninth and tenth floors and in apartments below.’’ Ambassador Foy D. Kohler’s office is on the ninth floor of the buff-colored, ten-story structure on Tchaikovsky Street. The offices of the U.S. military attachés are on the tenth floor. (more)

Friday, April 18, 2014

The Süleyman Shah Tomb Bugging Case - Solved

Turkey - Investigations carried out by the MÄ°T concluded how the recordings were made and exposed, and who was responsible for them. It appears that a lower-level official working at the Ministry of Foreign Affairs and affiliated with the Gülen Movement placed a bugging device in a phone located in DavutoÄŸlu's office and removed it immediately after the meeting concluded.  


The issue will reportedly be taken to the courts once all the details are finalized by the MÄ°T's investigation. (more)

Saturday, April 12, 2014

SpyCams Found in Leeds United Stadium Boardroom... and Toilets

UK - Police have begun an investigation at Leeds United after spy cameras were apparently found at the Elland Road stadium in a security sweep ordered by controversial new boss Massimo Cellino.

West Yorkshire Police would not confirm details of their inquiry but, according to reports, officers were called to the ground on Wednesday after surveillance equipment was found in the boardroom and toilets.

The police inquiry centered around an allegation of theft, relating to the club funds apparently used to buy the cameras. (more)

Tuesday, February 25, 2014

Turkish Watergate - Surprise - The Guard Gets Blamed for Bugging the Place

Turkey - A police officer only known as S.D., allegedly responsible for placing a bugging device in Prime Minister Recep Tayyip ErdoÄŸan's study inside his Ankara residence, has reportedly been working as a bodyguard for Saudi Arabian businessman Yasin al-Qadi, the Taraf daily claimed on Tuesday.

“It has come out that S.D., who has been accused in connection with the bugging device discovered in Prime Minister ErdoÄŸan's Ankara house, was assigned to protect Yasin al-Qadi,” Emre Uslu wrote in his Taraf column, which was also the daily's headline story.

Four covert listening devices, as ErdoÄŸan explained in December 2012, had been discovered in the office of his Subayevleri home in Ankara, without detailing exactly when the devices had been found, adding that an investigation was being launched. (more)

Thursday, February 20, 2014

TSCM Find Confirmed - Three Bugs Found in Jakarta Governor's Home Office

Indonesia - Jakarta Governor, Joko `Jokowi` Widodo confirmed the bugging device findings at his home office... 

Jokowi stated that the findings of some bugging devices in his home office was found using a detector device in December 2013...

He described, those bugging devices were found in three different places, such as bedroom, private living room, and dining room used to hold meetings "Actually, I don`t want to talk about this. But in fact there are three devices in the home office found," he disclosed. (more)