“Stealing technology isn’t just a crime against a company,” Acting Assistant Director Bradley S. Benavides of the FBI’s Counterintelligence Division said in a release. “It’s a crime against American workers whose jobs and livelihoods are impacted.” more
Sunday, May 15, 2022
Ex-Coca-Cola Chemist Sentenced for Stealing $120 Million Trade Secret
“Stealing technology isn’t just a crime against a company,” Acting Assistant Director Bradley S. Benavides of the FBI’s Counterintelligence Division said in a release. “It’s a crime against American workers whose jobs and livelihoods are impacted.” more
U.S. Spy Chief Reiterates ‘Overclassification’ Concerns
“Overclassification is a national security problem,” said Haines, testifying before the Senate Armed Services Committee alongside Defense Intelligence Agency Director Scott Berrier.
“This is a challenge as you ideate from a democratic perspective but also a challenge from the national security perspective,” Haines continued in an exchange with Sen. Elizabeth Warren, D-Mass. “It’s a very challenging issue.” more
Chinese CCTV Cameras on British Streets Contain Hidden Microphones
Things Often Mistaken for Eavesdropping Bugs
Usually the answer is, “I understand why you are asking is this a bug. Some bugs do look similar to this. But, here is what you actually found.”
Real electronic eavesdropping devices are getting smaller. So are lots of other little electronic bits which are part of our everyday lives. Distinguishing between the two can be tricky.
Saturday, May 7, 2022
The Colorful Side of Eavesdropping & Wiretaps
In one regiment, one Russian soldier allegedly said they’ve been pouring sand into the tanks’ fuel systems to clog them up.
“I don't follow stupid orders, I simply refuse,” one fighter can be heard telling a comrade. “The motherf*cker sent me to tanks, motherf*cking piece of shit. I f*cked it up and that's it.”
When the fellow Russian soldier on the other end of the line heard the unit wasn’t punished for the insubordination, he indicated he might repeat the tactic later in his own unit...
KeyTap3 Exploit Knows What You Type Keyboard Eavesdropping
It then analyzes those clusters and utilizes statistical information about the frequency of the letter n-grams in the supposed language of the text.
Air Force Officer Spycam'ed Kids in Family Member’s Bathroom
An Air Force officer is going to prison after federal prosecutors say he used a hidden spy camera to record children using the bathroom and bathing at his family member’s home, according to the U.S. Attorney’s Office for the District of Maryland...
In October 2020, the Onondaga County Sheriff’s Office in New York was notified by an adult woman, who has not been named, that Ort put a round, “black spy camera in (her) bedroom while visiting (her) home,” the news release said. Ort visited this adult’s home in Syracuse to visit her family, according to the plea agreement.
This woman found the hidden camera with an SD card, and after reviewing the card, she “discovered a video of a minor female using the bathroom... Then, Ort was seen “entering the bathroom and adjusting the camera.” more
Your Password-less Future
In celebration of 2022 Word Password Day, Apple, Google and Microsoft announced plans to expand support for a sign-in standard from the FIDO alliance and the World Wide Web Consortium (W3C) that aims to eliminate passwords altogether.
The passwordless sign-in involves the use of a FIDO credential called passkey, which is stored on a phone. When signing into a website, users would need to have their phone nearby, as they will have to unlock it for access.
“Once you’ve done this, you won’t need your phone again and you can sign in by just unlocking your computer. Even if you lose your phone, your passkeys will securely sync to your new phone from cloud backup, allowing you to pick up right where your old device left off,” Google explains. more
Sunday, April 24, 2022
New Algorithm to Shield Conversations from Eavesdropping AI
The thought that our gadgets are spying on us isn't a pleasant one, which is why a group of Columbia University researchers have created what they call "neural voice camouflage."
This technology won't necessarily stop a human listener from understanding someone if they're snooping (you can give recordings a listen and view the source code at the link above). Rather, this is a system designed to stop devices equipped with microphones from transmitting automatically transcribed recordings. It's quiet – just above a whisper – but can generate sound specifically modeled to obscure speech in real time so that conversations can't be transcribed by software and acted upon or the text sent back to some remote server for processing...
According to Vondrick, the algorithm his team developed can stop a
microphone-equipped AI model from interpreting speech 80 percent of the
time, all without having to hear a whole recording, or knowing anything
about the gadget doing the listening. more
Man Accused of Hiding Cameras at Gym... again
A Shelby Township man accused two years ago of hiding cameras to spy on people at a tanning salon is at it again, Wayne County prosecutors allege.
Brian Michael Maciborski, 40, allegedly placed a camera in the ceiling grate of a gym's tanning bed area to record a 24-year-old Westland woman on Feb. 23, according to the Wayne County Prosecutor's Office. more
9 Potential Signs of Corporate Espionage
(summary - full text here)
1. Unexplained or sudden changes in practices
2. Changes in business relationships
3. Unusual computer activity
4. Becoming defensive or secretive about work
5. Equipment or files go missing
6. Unexplained drops in sales or profits
7. Employees quitting suddenly
8. Accessing computer files without permission
9. Corporate secrets leaked to the press
Spybuster Tip #823 – Investigative Steps
1. Hire a competent professional corporate counterespionage consultant.
2. Have them conduct a Technical Surveillance Countermeasures (TSCM) bug sweep. You need to eliminate the possibility of electronic surveillance before you start accusing people.
3. Follow your consultant's advice about how to proceed. The investigative process will be customized from this point on.
Investigating Corporate Espionage - Quiz & Worksheet
Quiz Question 1 of 3
What is corporate espionage?
A. Using illegal activities to discover proprietary, internal information about a company, its actions, and its products.
B. Using legal activities to discover proprietary, internal information about a company, its actions, and its products.
C. Looking through public records for information about a competitor.
D. Examining federal regulations to find out what a company can legally claim about a product.
Worksheet
1. What is competitive intelligence?
A. Information gained through ethical, legal means about a competitor, the market, and federal regulations
B. Information gained through unethical, illegal means about a competitor, the market, and federal regulations
C. Any information that can be used against a competitor.
D. Racing competitors to find information.
2. What are trade secrets?
A. All public information about a company's product
B. Information about a company's external procedures
C. Proprietary information about a company's products, processes, and procedures that can only be obtained internally.
D. All answers are correct.
Wednesday, April 13, 2022
Caught on Camera: ‘Peeping Tom’ Seen Spying into Home
According to the report, the alleged ‘Peeping Tom’ was captured on video surveillance taking photographs/ and/or video of the inside of an occupied residence in the 3000 block of Robert Street with his cellular device.The video, which appears to be from a ‘Ring’ doorbell camera, is time-stamped at 11:19 p.m. on Wednesday, April 6.
The NOPD is seeking the public’s help in identifying the accused suspect. more
Google Searches for Eavesdropping Up 47% in Past Week
Google searches for eavesdropping up 47% in past week - Worldwide
Wednesday, April 6, 2022 - Tuesday, April 12, 2022.
Videoconferencing Apps May Listen Even When Mic is Off
Kassem Fawaz's brother was on a videoconference with the microphone muted when he noticed that the microphone light was still on—indicating, inexplicably, that his microphone was being accessed...
Fawaz and graduate student Yucheng Yang investigated whether this "mic-off-light-on" phenomenon was more widespread. They tried out many different videoconferencing applications on major operating systems, including iOS, Android, Windows and Mac, checking to see if the apps still accessed the microphone when it was muted.
"It turns out, in the vast majority of cases, when you mute yourself, these apps do not give up access to the microphone," says Fawaz. "And that's a problem. When you're muted, people don't expect these apps to collect data."...
Turning off a microphone
is possible in most device operating systems, but it usually means
navigating through several menus. Instead, the team suggests the
solution might lie in developing easily accessible software "switches"
or even hardware switches that allow users to manually enable and
disable their microphones. more