Monday, February 25, 2019
FutureWatch: Invisible-Light-Powered Eavesdropping Devices
›
Wi-Charge uses safe infrared light to deliver power from a distance. Our products provide enough power to charge a phone across a room, to p...
Electronic Footprint Army Boots Discovered
›
Hamas-run security forces at the Kerem Shalom crossing in the Gaza Strip have seized a shipment of army boots outfitted with tracking device...
Friday, February 8, 2019
Book - JUDGEMENT by Joe Finder - Fast-Paced Thriller with Technical Surveillance Overtones
›
Just Released JUDGEMENT by Joe Finder Excerpt... "It was nothing more than a one-night stand. Juliana Brody, a judge in the Sup...
Thursday, February 7, 2019
Ultrasonic Microphone Jammers — Do They Really Work?
›
It’s a question I get asked occasionally when one of our clients sees one of these devices being advertised on the internet. Who can blame...
FutureWatch: Smartphone Comes with Optical Spy Pen
›
Click to enlarge. Electronic pen device having optical zoom – Patent # US 10,198,649 – Feb. 5, 2019 Abstract The electric pen device...
Smart Light Bulbs May Not Be a Bright Idea
›
Your discarded smart lightbulbs reveal your wifi passwords, because they are stored in the clear. Not to mention, someone replacing your...
Wednesday, February 6, 2019
Business Espionage: The Case of the Broken Unbreakable Glass
›
In what sounds like a half-baked movie script about corporate espionage , an FBI sting conducted in collaboration with a specialized glass ...
This Week in Technical Surveillance
›
Ukraine - Head of the election headquarters of the presidential candidate of Ukraine, leader of the Civil Position Party Anatoliy Hrytsenko,...
Facilities Manager Alert: Your Smart Building May Start Doing Dumb Things
›
Researchers at enterprise security vendor ForeScout have warned that malware specifically targeting smart buildings is an inevitable next st...
Spybusters Tip #847: Stop Car Theft via Key Fob Signal Intercept
›
By simply wrapping your key FOB in aluminum foil you can prevent a thief from intercepting the signal. If you park your car outside at h...
Sunday, February 3, 2019
Hackers Now Banking on Two-Factor Authentication for Profit
›
Sophisticated hackers have long exploited flaws in SS7 , a protocol used by telecom companies to coordinate how they route texts and calls...
Friday, February 1, 2019
Book Review Request: Technical Surveillance Counter-Measures a Complete Guide
›
If any TSCM'er out there buys this book. Please send me a review. Technical Surveillance Counter-Measures a Complete Guide Th...
Evil Child Watch Spies
›
In late 2017, the Norwegian Consumer Council published its audit of kids' smart-watches , reporting that the leading brands allowed st...
Thursday, January 31, 2019
Business Espionage – A Cunning Protection Plan to Protect us and U.S.
›
We are bombarded with news stories and court trials tornado-ing around Chinese spies. They’re everywhere. Collecting everything. They are su...
Second Apple Pickin' Spy Caught in Last 6 Months
›
The United States FBI this week accused a Chinese citizen working for Apple of attempting to steal trade secrets that are related to the c...
‹
›
Home
View web version