Dutchess County resident Brett M. Marinaccio, 33, of Hopewell Junction, was arrested on Monday, Jan. 4, by New York State Police, said Trooper AJ Hicks.
According to Hicks, an investigation determined Marinaccio utilized hidden GPS tracking devices with audio capabilities to eavesdrop (similar to this) on the victim while an order of protection was in place issued by the Dutchess County Family Court to protect the victim. moreThursday, January 7, 2021
Court Order Doesn't Stop Man from Eavesdropping & GPS Tracking
Leaked Phone Call Cautionary Tale: Trump’s Phone Call With Georgia Election Officials
The president pressured Secretary of State Brad Raffensperger to overturn the results of the election in an hour-long phone conversation. Here is a transcript of the audio recording.
Chilling.
Covert recording of your phone calls is easy. There are smartphone apps, push-button recording features on business desk phones, and cheap add-on gadgets (1) (2) (3) which do the job very well. Everyone with an inclination to record your call, can. Instantly. And post it to social media, news media, or twist your arm with it, just as quickly. Also chilling.
You can mitigate the possibility of your call being leaked (by the party to whom you are speaking). Just think before you speak.
Thwarting someone spying on your call requires some technical assistance. Contact a Technical Surveillance Countermeasures (TSCM) consultant. Their specialty is inspecting workplaces, residences, vehicles, and off-site meeting locations for wiretap, bugs, and covert video surveillance devices.
UPDATE
The fact that the Jan. 2 call was recorded and leaked to the news media also spurred a claim that Raffensperger "faces espionage charges."
The claim was made in a widely shared Facebook post that was flagged as part of Facebook’s efforts to combat false news and misinformation on its News Feed.
Legal experts told us it would not be illegal for anyone on either
end of the call to record it, or to disseminate the recording.
Furthermore, the conversation did not bear on sensitive national
security matters covered by the federal Espionage Act. more
Friday, January 1, 2021
How Spying Works in Real Life
We took a deep dive into the sub surface world of intelligence as we discussed SIGINT, HUMINT and IMINT with James Olson. James knows what he’s talking about. He is currently a Professor of Practice at the Bush School of Government of Texas A&M.
He’s also the FORMER CHIEF OF COUNTERINTELLIGENCE AT THE CIA and has 31 YEARS of experience doing espionage and covert action work undercover work for the CIA.
Ticketmaster Fined $10 million in Corporate Espionage Scheme
Zeeshan Zaidi, the former head of artist services at Ticketmaster, pled guilty to conspiring to commit computer intrusions and wire fraud in October 2019...
In the computer intrusion scheme detailed in the agreement, Ticketmaster tried to steal both a client and design ideas from a competitor by logging into the competitor’s back-end system. The former employee also stole the competitor’s fee calculation system in the form of an Excel spreadsheet. more
Convicted Spy Granted Citizenship
Jonathan Pollard, 66, triumphantly kissed the ground as he disembarked from the aircraft after it landed in Ben Gurion International airport near Tel Aviv. more
ET's Phone Home Frequency Might Be 982.02 MHz
Nobody believes it was ET phoning, but radio astronomers admit they don’t have an explanation yet for a beam of radio waves that apparently came from the direction of the star Proxima Centauri...
“It’s some sort of technological signal. The question is whether it’s Earth technology or technology from somewhere out yonder,” said Sofia Sheikh, a graduate student at Pennsylvania State University leading a team studying the signal and trying to decipher its origin...
The radio signal itself, detected in spring 2019, is in many ways the stuff of dreams for alien hunters. It was a narrow-band signal with a frequency of 982.02 MHz as recorded at the Parkes Observatory in Australia...
The Parkes telescope — which once relayed communications to the Apollo astronauts — is notorious for false alarms, Dr. Werthimer says. In one recent example, he said, astronomers thought they had discovered a new astrophysical phenomenon.
“It
was very exciting until somebody noticed the signals only appeared at
the lunch hour,” he said. They were coming from a microwave oven. more
Tuesday, December 29, 2020
Security Director Alert: DHS Warns US Businesses of China’s Data-Collection Practices
Chinese law requires Chinese businesses and citizens, including in academia, to “take actions related to the collection, transmission and storage of data that runs counter to principles of U.S. and international law and policy,” DHS said in a press release.
The department urged U.S. firms to “minimize the amount of at-risk data being stored and used” in China, or in places accessible to Chinese authorities. more
Need help. Click here.
There is a New Kind of Bug Comin' to the UK, Mate
The Bug is a nano-Unmanned Aerial Vehicle (UAV) weighing 196g – similar to the weight of a smartphone – with 40 minute battery life and a 2km range.
It boasts a stealthy low visual profile and the ability to fly even in strong winds of more than 50mph...
The teams are now working on the next developments on the nano-UAV, exploring sensing equipment and capabilities which could be added, as well as how the Bug could be integrated with other military equipment. more
Check Your Holiday Rental for Hidden Surveillance Cameras
Australia - There's something unsettling about the idea of being watched while you and your loved ones kick back on holidays. If you've searched online to find whether holiday rental landlords spy on their guests, there's plenty to feed your paranoia...
Still, if something feels off or you want to sweep the house, there are some steps you can take. Although without professionals and high-tech gear involved, it can't be 100 per cent accurate...
Julian Claxton, a counter-espionage specialist, recommended a hidden camera detector — small devices that project a light that will reflect off the lens of a covert camera... "The reality is, that's how a lot of these cameras can be found — through anomalies. Things that just don't look right within an environment," he explained.
Tips:
- Inspect what's on the Wi-Fi network... Many cameras sold in consumer electronic stores need an internet connection so they can be viewed remotely from a computer or app. This could provide a clue.
- Try to spot the camera lens... Julian Claxton, a counter-espionage specialist, recommended a hidden camera detector — small devices that project a light that will reflect off the lens of a covert camera.
- Check the power points... Hidden cameras need ongoing power, so Mr Claxton suggested looking at what's connected to power points.
- Look for oddly placed objects... Hidden cameras can be built into just about anything, but for the lay person, Mr Claxton suggested using "a bit of common sense". more
Also, consider taking a one-hour, on-line, video Spycam Detection Training course.
Tuesday, December 22, 2020
Industrial Espionage and IP Theft in the Manufacturing Threat Landscape
via Rob Acker...
Today, the manufacturing industry promotes innovation, productivity
and trade to capitalize on opportunities created by changing demand and
technological advancements. However, the move towards connected
manufacturing has introduced sophisticated threats to data, intellectual
property (IP) and operations.
Industrial Espionage and IP Theft
Manufacturing organizations invest heavily in IP development. It’s
often an organization’s most valuable asset and its theft is among the
most damaging of manufacturing cyber-threats. Recently, manufacturing executives cited IP protection as their primary concern...
Although manufacturing organizations are reasonably advanced in their awareness of the cyber and information security risks they face, preparedness varies. A certified ISO 27001 Information Security Management System (ISMS), paired with independent testing, detection and response services, provides a transparent solution. more
Chinese Spies: from Chairman Mao to Xi Jinping (book)
Roger Faligot, an investigative journalist who specializes in studying intelligence agencies, first published Chinese spies in French. It proved so successful that he recently had a significantly expanded version translated into English - Chinese spies: from Chairman Mao to Xi Jinping.
Faligot’s ambitious book spans a century of Chinese espionage, from the beginnings of the Chinese Communist Party to the Xi Jinping era...
Faligot’s ground-breaking book is essential reading for both
intelligence professionals and generalists seeking to understand the
reach of China’s hidden hand. Given rapid technological developments,
one can only hope that Faligot is working on a follow-up volume. more
Russian Spy Crank Yanked into Confessing
Poisoned Kremlin critic Alexei Navalny duped a Russian spy into confessing to the botched assassination attempt — revealing that nerve agent had been smeared on his underpants, according to a report.
The 44-year-old opposition leader posed as a senior official from Russia’s National Security Council demanding an urgent debriefing about why the poisoning in August failed, according to a recording shared with CNN.
In a sting where he used a number disguised to look like it was from
the headquarters of Russia’s Federal Security Service (FSS), Navalny
tricked Konstantin Kudryavtsev into revealing key details about how he
had been poisoned with Novichok in August, CNN said. more
Yet Another Air-Gapped Computer Hack
Academics from an Israeli university have published new research today detailing a technique to convert a RAM card into an impromptu wireless emitter and transmit sensitive data from inside a non-networked air-gapped computer that has no Wi-Fi card.
Named AIR-FI, the technique is the work of Mordechai Guri, the head of R&D at the Ben-Gurion University of the Negev, in Israel.
Over the last half-decade, Guri has led tens of research projects that investigated stealing data through unconventional methods from air-gapped systems.
These types of techniques are what security researchers call "covert data exfiltration channels." They are not techniques to break into computers, but techniques that can be used to steal data in ways defenders aren't expecting. more
Friday, December 18, 2020
The Ultimate Spy, or Better Learn How to Say "Yes, Master"
via Sundance...
This fascinating and visually stimulating documentary examines simulation theory—the idea that this world we live in might not be entirely real. The theory is as old as Plato's Republic and as current as Elon Musk's Twitter feed and A Glitch in the Matrix traces its genesis over the years, from philosophical engagements by the ancient Greeks to modern explorations by Philip K. Dick, the Wachowskis, and game theorists.
A new trailer for the upcoming documentary A Glitch in the Matrix gives a haunting look at the theory that we are all living in a giant simulation. The title alludes to the Wachowskis’ popular Matrix franchise, which is perhaps the most significant cultural exploration of the trippy thought experiment.
A Glitch in the Matrix will premiere at the 2021 Sundance Film Festival in the Midnight Section line-up. After Sundance, A Glitch in the Matrix will be in theaters and on demand on February 5, 2021."Solarwinds" Attack Announcement (AA20-352A) from CISA
Advanced Persistent Threat Compromise of Government Agencies, Critical Infrastructure, and Private Sector Organizations
The Cybersecurity and Infrastructure Security Agency (CISA) is aware of compromises of U.S. government agencies, critical infrastructure entities, and private sector organizations by an advanced persistent threat (APT) actor beginning in at least March 2020. This APT actor has demonstrated patience, operational security, and complex tradecraft in these intrusions. CISA expects that removing this threat actor from compromised environments will be highly complex and challenging for organizations...
CISA has determined that this threat poses a grave risk to the Federal Government and state, local, tribal, and territorial governments as well as critical infrastructure entities and other private sector organizations. CISA advises stakeholders to read this Alert and review the enclosed indicators. more
Note: In addition to cybersecurity, a quality TSCM program is required to protect against multiple other attack vectors.