Sunday, June 5, 2022

FutureWatch: An App to Find Wi-Fi Spycams & More

Hidden IoT devices are increasingly being used to snoop on users in hotel rooms or AirBnBs. We envision empowering users entering such unfamiliar environments to identify and locate (e.g., hidden camera behind plants) diverse hidden devices (e.g., cameras, microphones, speakers) using only their personal handhelds.

Imagine a user walking into an unfamiliar environment such as a hotel room or Airbnb. Nowadays, the user has to be wary of wireless Internet-of-Things (IoT) devices being used to spy on them. These devices could be installed by the owner or by a previous guest. This threat is not just hypothetical...

...we want to empower users so that as they enter an unfamiliar space, they can run an app on their personal handheld (e.g., phone or tablet). This app would report a list of detected and identified devices and their corresponding locations. 

“Detect,” here, means knowing that there is some device (i.e., binary notification), “identify” entails knowing what type of device it is (e.g., type=camera), and “localize” entails knowing the device’s location in the physical space (e.g., behind the plants). While cameras in particular are imminent privacy threats, in general we want to detect/identify and localize diverse hidden IoT devices, as these could also be potential threats for tracking users. more

Thursday, June 2, 2022

Kids Culture Child Care in Dover, NH Indicted on Wiretapping

An owner of the Kid's Culture childcare center is “vehemently” denying and disputing a state agency's report stating it used excessive disciplinary tactics and did not follow state staffing regulations, among other infractions...

According to the report, staff at first denied there were video cameras and denied the use of timeouts or other punishments of the children during visits by investigators on March 16, March 19 and April 6. When confronted with the videos, the report states, staff then denied the cameras were trained on the bathroom area, which the report states was also proven to be untrue. more

What Can a Private Investigator do for Your Business?

Businesses can go under for several reasons, sometimes they simply aren’t profitable whereas other times something sinister is happening underneath that most business owners aren’t aware of.

Corporate espionage is bigger than you may think and if you have a product or industry secret that your competitors would love to get their hands on then hiring a private detective can help. There are many ways your competitors may use to steal your business data, some of which could be installing malware on your company computers or bugging your office or meeting rooms.


A private detective can be hired to search your business for electronic bugs and get rid of them accordingly. If you think this is a work of fiction and it doesn’t happen you would be mistaken. Bugs are placed in businesses and private residents illegally all of the time. more

Researchers Develop Anti-Eavesdropping Algorithm for Smartphone Mics

At Columbia University, a team of researchers has successfully created a program that can block out audio spying through microphones found in smartphones and connected audio devices that require voice use.


This algorithm works by using predictive voice technology: that is, it can recognize human speech and instinctively generate audible background noise like muffling or whispers in order to camouflage the user’s words.

The technology works in real-time as the algorithm is able to create the obstruction while a person is speaking to a voice-controlled device or conversing with a friend.

But why create such an algorithm in the first place?

The problem stems from advertiser eavesdropping. While this is an issue that has not been proved or disproved, there is plenty of anecdotal evidence that backs it up. more

What You Should Know About Trade Secrets

A Webinar Series for Start-ups: Part I & II

Part I - Introductory Session

Partners Melanie Seelig and Mauricio Uribe kicked off a two-part, comprehensive discussion on trade secrets. The presentation served as an introduction to the topic and provided more general information.

View live presentation: Video Link

View on SlideShare: Knobbe Martens Webinar Series for Start-ups: What You Should Know About Trade Secrets - Part I

Part II - Detailed Discussion

Partners Melanie Seelig and Mauricio Uribe continued the two-part, comprehensive discussion on trade secrets. The presentation focused on a more detailed exploration of the topic and strategic implications for various scenarios.

View live presentation: Video Link

View on SlideShare: Knobbe Martens Webinar Series for Start-ups: What You Should Know About Trade Secrets - Part II

View and download the full presentation below. Knobbe Martens Webinar Series for Start-ups: What You Should Know About Trade Secrets - Part I and II

View more webinars on our Vimeo home page: Knobbe Martens on Vimeo

View more Knobbe Martens slide presentations here.

Tuesday, May 31, 2022

The CIA Shares How to Travel Like a Spy

Staying in a high-rise hotel on vacation this summer? ... The CIA is offering these tips and more to Americans... “Call it travel tradecraft,” the agency said, publishing the new advice on its website. 

“Whether you’re off to a bustling city or a secluded getaway this summer, we hope these CIA ‘travel tips’ help you journey with more confidence and safety.” 

Some of the guidance is standard practice for seasoned travelers... But some of their advice is more spook savvy...

“Don’t look like an easy target,” the guidance reads... “You’ll want to be alert and maintain situational awareness, especially in an unfamiliar country.”

Once you have arrived at your destination, the CIA suggests familiarizing yourself with the emergency escape routes. more  The CIA Tips

Arrested for Gifting Women Make-up Mirrors with Built-in Spycams

A man in China has been arrested after a small vanity mirror he gifted to a female coworker was discovered to have a hidden spycam built into it.

The man, whose surname is Zhang, is the owner of an online hidden camera store, and has reportedly sold over 200 similar spycam devices as the one he had gifted.

The female coworker, surnamed Li, stated that Zhang had told her to keep the mirror on for 24 hours a day, otherwise the circuit board would catch on fire...

A suspicious Li contacted the seller of the make-up mirror, who then told her to check for cameras. When she did, she found four high-definition pinhole cameras and five 32 GB memory cards inside.

“One of the recordings on a memory card was marked ‘2019’ so I realized I was probably not the first victim,” Li wrote... more  more

50 Spy Movies That’ll Keep You On The Edge Of Your Seat

As kids, all of us loved play-pretend games, and though there's a myriad of variations, one theme that was by far the most thrilling of them all - playing spies on a secret mission. 

Such secrecy and importance sure seemed thrilling, and emulating the super cool tricks we saw on the cinema screens felt like the best thing in the world. Naturally, most of us grew out of these play-pretend frolics, but the infatuation with everything spies hasn't gone anywhere. And what's a better way to relive these thrilling fantasies than by watching some of the best spy movies ever made? 

So, here we are with our list that'll cater to even the pickiest spy movie connoisseur and give you some pretty decent choices for your next adventurous viewing... more

I Would be Shocked if I am Not Being Spied On: Elon Musk

On the micro-blogging site Twitter, Musk posted a picture, which reads "Does anyone else feel like they are being watched?".

While replying to that, a user wrote "you are 24/7 on all your devices and online services, including your own Starlink. In your case it is not just mass surveillance. You are a priority target".

"I would be shocked if I am not being spied on haha. My only ask is that anyone spying on me please not affect call quality too much or I cannot hear what is being said!" Musk said in a reply to the user. more

Corporate Espionage is Entering a New Era

Companies need to take it more seriously...

In May a jury awarded Appian, whose headquarters are in McLean, Virginia, a whopping $2bn in damages after it had accused Massachusetts-based Pegasystems of illegally snooping on it to gain a competitive edge.

The trial revealed that Pegasystems executives had referred to a contractor hired to obtain some of the ingredients of Appian’s secret sauce as “our spy” in internal documents, and had dubbed the overall spying effort “Project Crush”...

The episode illustrates how interest in business espionage, and learning how to foil it, has broadened. Snooping is no longer mostly centred on a few “sensitive” industries that have long been vulnerable, such as defence and pharmaceuticals. It is increasingly used to target smaller companies in surprising sectors, including education and agriculture. It has, in short, become more of a general business risk. more

Thursday, May 26, 2022

‘American Idol’ Winner Accused of Bugging LSU Student’s Dorm

American Idol winner Laine Hardy has been accused of bugging his ex-girlfriend’s dorm room at Louisiana State University so he could listen in on her conversations, according to a warrant obtained by WBRZ. 

The 21-year-old country singer was arrested Friday on charges of interception and disclosure of wire, electronic or oral communication. Investigators allegedly found several recordings on the device, including some of Hardy’s “very distinguishable” voice. 

In a vague Twitter post, Hardy acknowledged on Thursday that he’d received a warrant over “allegations” and was “cooperating” with the cops. “I humbly ask for privacy at this time,” he wrote. more

The Associated Press reported that Hardy’s ex-girlfriend and her roommate found the alleged listening device, which looked like a phone charger, in their dorm room on April 6. She reported it to LSUPD the next day, and officers noted in a police affidavit acquired by the AP that they found recordings from a 10-day span in February. more

New Countermeasure Against Unwanted Wireless Surveillance

Smart devices are supposed to make our everyday lives easier. At the same time, however, they are a gateway for passive eavesdropping. 

To prevent possible surveillance of the movement profile within one’s home, researchers from the Max Planck Institute for Security and Privacy, the Horst Görtz Institute for IT Security at Ruhr-Universität Bochum and the Cologne University of Applied Sciences have developed a novel system for protecting privacy in wireless communication.

Almost all Internet-of-Things devices, such as voice assistants, locks and cameras, rely on wireless connections based on high-frequency radio signals... passive eavesdroppers can still exploit sensitive information from intercepted radio frequency signals... Attackers can perceive such effects from a distance and, by applying simple statistical methods, conclude, for example, that a person is currently moving in the monitored room... this method known as “adversarial wireless sensing”...

With their approach, the researchers are the first in the world to propose IRS as a practical countermeasure against passive wireless eavesdropping attacks. more

Why Casinos Are Spying on Their Ultra-Rich Clients

An integral part of how the casino lavishes services on its members is by monitoring their movements on the premises — with the help of facial-recognition cameras in recent years.

Of the 400 cameras in the building, 10 are linked to a face-scanning system. Whenever a member enters the building or one of its private gambling rooms, staff get pinged on their phones.

Clients, for their part, accept this Orwellian scrutiny as necessary to enhance their experience. “It’s the expectation,” says Ryan Best, the surveillance and security manager at the casino who set up its facial-recognition system up in 2018. 

Several luxury hotels in nearby Mayfair have recently introduced similar systems to alert everyone to arriving VIPs, he says. more

Researchers Developing Anti-Eavesdropping Quantum Network

While quantum computers offer many novel possibilities, they also pose a threat to internet security since these supercomputers make common encryption methods vulnerable. Based on the so-called quantum key distribution, researchers at TU Darmstadt have developed a new, tap-proof communication network.

The new system is used to exchange symmetric keys between parties in order to encrypt messages so that they cannot be read by third parties. In cooperation with Deutsche Telekom, the researchers led by physics professor Thomas Walther succeeded in operating a quantum network that is scalable in terms of the number of users and at the same time robust without the need for trusted nodes. 

In the future, such systems could protect critical infrastructure from the growing danger of cyberattacks. In addition, tap-proof connections could be installed between different government sites in larger cities. more

Monday, May 16, 2022

Series: Types of Industrial Espionage


Industrial espionage refers to various activities performed to gain an unfair competitive advantage, rather than for national security purposes.
As we discussed in a previous article, the ways in which industrial espionage can affect a company are numerous and include theft of trade secrets and disruption to operation.

Section 1832 of the Economic Espionage Act of 1996 (the “Act”) criminalizes the theft of trade secrets “intended for use in interstate or foreign commerce, to the economic benefit of anyone other than the owner.” The trade secret owner is required to take “reasonable measures” to keep the information secret. 

For individuals, convictions in violation of 18 U.S.C. § 1832 can result in a prison sentence of up to 10 years or a monetary penalty, or both. For organizations, the fine may be “not more than the greater of $5,000,000 or 3 times the value of the stolen trade secret . . . including expenses for research and design and other costs of reproducing the trade secret.” Section 1832 requires that the products be “produced for” or “placed in” interstate or foreign commerce. more

One excellent reasonable measure is the Technical Surveillance Countermeasures (TSCM) inspection, conducted periodically.