Tuesday, October 27, 2015

What's in The Washington Post basement?

Nixon tapes and Cold War spy photos.

Deep in the basement of the Washington Post newsroom, national security reporter Walter Pincus is rediscovering 40 years worth of handwritten notes, White House telephone records and declassified spy photos. As the Post prepares to move into a new building in December, he’s digging up details on many of the historical stories he’s worked on. (Jorge Ribas and Jayne W. Orenstein / The Washington Post) more

Corporate Espionage that Flies Below the Radar

by Kevin G. Coleman, SilverRhino
Headlines about economic, corporate and industrial espionage have been in abundance lately and for good reason... Several subject matter experts agree that much of these espionage activities that target businesses are criminal-based.

Recently while on the executive floor of one large company a new twist to espionage tradecraft popped up.

Drone at office window story.
After entering a conference room, a note on the whiteboard caught my attention: “DO NOT ERASE.” Seeing that on a whiteboard filled with financial numbers, notes, diagrams and so on is not an uncommon occurrence. When I was looking out the windows, I saw a drone slowly fly by. Given the camera capabilities that are now available and becoming common on drones, it would not be difficult to capture what was on those whiteboards. The images are digitally captured, cropped, enhanced extracted and then sold...

Today economic, corporate and industrial espionage is big business. With significant money being made selling corporate secrets, this threat will only grow. more

His Spy Got Caught and was Arrested. The Handler Disavowes it as "Silly"

David Vitter calls spying arrest ‘silly’; Sheriff Newell Normand says Vitter would be ‘worst governor in Louisiana history’ 
 
Louisiana - The bungled political espionage that unfolded hours before Saturday’s election has exposed and perhaps deepened the enmity between U.S. Sen. David Vitter and Jefferson Parish Sheriff Newell Normand, fellow Republicans who traded barbs Monday as Vitter turned his attention to the gubernatorial runoff next month.

The animus between the two elected officials traces its roots to a similar split between Vitter and the late Harry Lee, Normand’s combative predecessor. And the relationship appears to have reached a nadir after Normand caught a private investigator hired by Vitter’s campaign secretly recording the sheriff’s regular coffee gathering at the Royal Blend cafe in Old Metairie. more

Monday, October 26, 2015

A Tale of Two Law Suits - Eavesdroppers Won, Targets Zero

Facebook Wins Dismissal Of $15 Billion Privacy Lawsuit
It’s been more than three years since a federal judge in California heard arguments in a large class-action lawsuit filed against Facebook over its questionable privacy practices. Finally, on Friday that judge sided with the social network and threw out the case — while leaving open the option for plaintiffs to revise and re-file their case.

The complaint involves Facebook’s tracking of users both while they are logged in as Facebook users and after they log off.

The plaintiffs argued that, in exchange for offering free access to Facebook, the company “conditions its membership upon users providing sensitive and personal information… including name, birth date, gender and e-mail address,” and requires that users accept numerous Facebook “cookies” on their web browsers that allow Facebook to track that a user’s Internet browsing history — which is then marketed to advertisers.

Of particular concern to the plaintiffs was Facebook’s continued tracking of users even after they had logged out of Facebook. more

ACLU lawsuit against NSA mass spying dropped in federal court
A federal district court on Friday dismissed a lawsuit brought by the American Civil Liberties Union against the National Security Agency over its mass surveillance program.

Ashley Gorski, a staff attorney with the ACLU national security project told The Guardian the mass spying program was innately harmful, arguing it violates “our clients’ constitutional rights to privacy, freedom of speech, and freedom of association, and it poses a grave threat to a free internet and a free society.” more

A Downer for Drones

There's recently been a run of new anti-drone systems introduced to deal with potential threats from UAVs, but these have been on the large and expensive side. To provide an affordable alternatives to plug the gap between shotguns and truck-mounted systems, national security research and development firm Battelle is introducing DroneDefender. Billed as the first portable, accurate, rapid-to-use UAV counter-weapon, it's a rifle-like raygun device that uses a radio beam to jam drone control systems and stop them in midair. more

Get Ready for Spectre - Battle of the Bonds Infographic

Bond Infographic no logo 01 Battle of the Bonds: Kisses, Cocktails, Kills, Cars & Cash
Battle of the Bonds: Kisses, Cocktails, Kills, Cars & Cash – An infographic by the team at GB Show Plates

Monday, October 5, 2015

Jealous Wives and Girlfriends Can Now Snoop on their Partner using a Spy Belt

Jealous wives and girlfriends can snoop on their fellas with a spy gadget disguised as a belt.

A tracking device hidden in the leather monitors the wearer’s location every 60 seconds. And it can be controlled remotely through Android and iPhone apps without the wearer noticing.

Unwary men could receive one as a present without knowing what they have let themselves in for.

The Belt Tracker, sold by Spymaster, in Marylebone, London, has a 12-hour battery life and can be used in 220 countries without incurring data roaming charges. It even has a flight safe mode to comply with airline regulations.

The GPS device was originally designed to monitor people working in dangerous environments, such as undercover police. And it can be used to track children and give peace of mind to parents. more

Scientist Pleads Guilty to Corporate Espionage

Researcher Xiwen Huang pleaded guilty Friday to one count of stealing trade secrets. But the legal battle over the punishment the former Charlotte resident receives already is underway.

Federal prosecutors say the 55-year-old chemical engineer stole proprietary technology and hundreds of pages of documents over the last decade from his government and civilian employers, including a company in Charlotte. Huang’s goal, according to court documents, was to aid both the Chinese government and his own company, which he started in North Carolina to do business in his Asian homeland.

Huang faces a maximum penalty of 10 years in prison and a $250,000 fine. He will be sentenced at a later date. Imprisonment is all but certain. more

Ai Weiwei Discovers Eavesdropping Devices in His Studio

Ai Weiwei has posted a number of pictures of what he says are listening devices found in his Beijing studio.

The Chinese dissident artist captioned one photo of a bug on Instagram with "There will always be surprises".

His friend Liu Xiaoyuan confirmed the bugs were found after the artist returned from a trip to Germany.

Xiaoyuan tweeted that they were found when redecoration started on Ai's home and were found in the office and a living room.

The artist also posted a video clip of firecrackers being set off in a metal bucket next to one of the devices. He wrote "Did you hear it?" next to the video. more


Gang Using Spy Cam, Bluetooth for Exam Paper Leaks Busted

India - Police have busted a New Delhi-based gang involved in assembling spy cameras and bluetooth devices in undergarments and shirts to facilitate question paper leaks in important competitive exams across the country.

...the accused used to assemble spy cams and bluetooth devices in shirts, briefs and vests, mobile hardware kits, and other equipment to get the question papers leaked out from the exam centres...

...the kit included an android smartphone which was connected with a spy cam in cuff of a shirt. The question paper was clicked by some candidate or a staff member through spy camp and smuggled outside the examination centre through drop box application.

The paper was then distributed through e-mails or WhatsApp to a team of six to eight teachers, who solved the paper. The candidates, who paid for the solved paper, were given a bluetooth ear device which did not require mobile handset and acted just as receiver. The accused had assembled a set with 40 mobile phones through which the answers were dictated to the candidates... more

Phone on Drone Hacks Wireless Printer

You might think that working on a secured floor in a 30-story office tower puts you out of reach of Wi-Fi hackers out to steal your confidential documents.

But researchers in Singapore have demonstrated how attackers using a drone plus a mobile phone could easily intercept documents sent to a seemingly inaccessible Wi-Fi printer. The method they devised is actually intended to help organizations determine cheaply and easily if they have vulnerable open Wi-Fi devices that can be accessed from the sky. But the same technique could also be used by corporate spies intent on economic espionage. more

Sunday, October 4, 2015

Operation Armchair - Son of The Thing, or...

...how a small Dutch company, helped the CIA to eavesdrop on the Russians.

"A small company from Noordwijk, Dutch Radar Research Station, worked for the CIA for decades. It built sophisticated listening devices that the Americans used against the Soviet Union. I came across this story when a schoolmate gave me papers of his grandfather. Along with intelligence expert, Cees Wiebes, I reconstructed in eighteen months the never told key role that this Dutch company played during the Cold War." ~ Maurits Martijn
(A long, but interesting story.) 

Friday, October 2, 2015

IP Protection: Don’t Expect Government Help

If actions – or in this case inaction – speak louder than words, the message from the U.S. government to the private sector regarding defense against cyber economic espionage by China is clear: “You’re on your own.”

That remains true, in the view of multiple experts, even after Chinese President Xi Jinping and U.S. President Barack Obama announced an agreement last week that, according to a White House press secretary Fact Sheet, “neither country’s government will conduct or knowingly support cyber-enabled theft of intellectual property, including trade secrets or other confidential business information, with the intent of providing competitive advantages to companies or commercial sectors.”

...the agreement refers only to the governments of both countries – not their private sectors...

Kevin Murray, director at Murray Associates, said the reality is that, “both leaders know economics comes first. “Waving an ‘agreement’ in the air may mollify some of their constituents,” he said, but the subtext of promising that “governments” won’t do it acknowledges the reality that they, “can't control all the rogue hackers out there. All they can say is that their governments are not behind it, and they don't condone it. Meanwhile, cutouts will manage the "consultants" who make money with their data-vacuums." more

Wednesday, September 30, 2015

In China Counterespionage is Everyone's Job... by law

Counter-espionage Law of the People's Republic of China (interesting highlights)
Adopted at the 11th meeting of the Standing Committee of the Twelfth National People's Congress on November 1, 2014.
  • Chapter I: General Provisions
  • Chapter II: Functions and Powers of State Security Organs in Anti-Espionage Efforts
  • Chapter III: The Duties and Rights of Citizens and Organizations 
Article 19: State organs, groups and other institutions shall educate their units' personnel on the maintenance of State security, and mobilize and organize them to prevent and stop espionage activity.

Article 20: Citizens and organizations shall facilitate and provide other assistance to anti-espionage efforts.

Article 25: Individuals and organizations must not illegally hold or use special-purpose spy equipment needed for espionage activities. Special-purpose spy equipment will by verified by the State Council department responsible for national security in accordance with relevant national provisions.
  • Chapter IV: Legal Liability
Article 31: Where state secrets relating to anti-espionage efforts are disclosed, the state security organs give 15 days of administrative detention; where it constitutes a crime, criminal liability is pursued in accordance with law.

Article 32: For those in unlawful possession of state secret documents, materials and other items, as well as those who unlawfully possess or utilize specialized spying equipment, state security organs may conduct a search of their person, items, residence and other relevant locations in accordance with law; and confiscate the state secrets documents materials and other items they unlawfully possessed, as well as the specialized spying equipment they possessed or utilized. Where the unlawful possession of state secrets documents, materials or other materials constitutes a crime, pursue criminal responsibility in accordance with law; where it does not constitute a crime, state security organs give warnings or administrative detention of up to 15 days.
  • Chapter V: Supplementary Provisions
Article 38: Espionage conduct as used in this law refers to the following conduct... more

Sunday, September 27, 2015

Bugged: Russian Roach Rampage (Warning: Sensationalist Reporting)

The terrifying cockroach robo-SPY that could soon perform reconnaissance missions for the Russian military...

  • Robot is fitted with photosensitive sensors to track its surroundings
  • The 4-inch (10cm) mechanical roach moves like the Blaberus giganteus
  • A sample of the robo-bugs is being planned for Russian armed forces
  • Future models will be able to camouflage themselves, spy on people with portable cameras and carry out reconnaissance missions
Move over James Bond, your job is under threat from an army of robo-spies that look and move like cockroaches.

Researchers have created insect bots, inspired by the Blaberus giganteus species of roach, capable of scanning rooms and tracking their surroundings.

Fitted with sensors, these mechanical bugs can cover 12 inches (31cm) a second and the technology has already piqued the interest of the Russian military.

Researchers have created a robotic cockroach (pictured main), inspired by the Blaberus family of roaches (B. craniifer shown on top of the robot), capable of scanning rooms and tracking its surroundings. The mechanical bug can cover 12 inches a second

The bionic cockroaches were designed by engineers Danil Borchevkin and Aleksey Belousov at Kaliningrad's Kant University.

Each robot is 4-inches (10cm) long and fitted with photosensitive sensors, as well as sensors that detect contact, meaning they can constantly look out for obstacles. more