Saturday, November 18, 2023
Smart Toys Spying on Children
In its Trouble in Toyland" report released Thursday, the organization explained that smart toys "can incorporate various technologies, like cameras, microphones and sensors, as well as artificial intelligence capabilities and connectivity through the internet or Bluetooth." It specifically flagged some risks that it said parents and their children could see arise. more
How We Got This Way - The effect of kids being influenced by their spy toys.
Wednesday, November 15, 2023
Why You Really Need a Technical Information Security Consultant
by R. Mark Halligan
For years, there has been a debate whether “confidential” information is analogous to a “trade secret.” It is not. Information is either protected as a “trade secret” or not protected as a “trade secret.” Any other characterization of “confidential” information undermines the protection of trade secret assets and interferes with lawful and fair business competition.
There is no such thing as non-trade secret “confidential” information.
There is no such thing as “confidential” information that does not rise to the level of a trade secret.
There is no middle ground: Either the information is a “trade secret” (and protectable) or not a trade secret (and not protectable).
A “trade secret” is an intellectual property asset that requires reasonable measures to protect the information as a “trade secret” and proof that such information derives an actual or potential economic advantage from the secrecy of the information. more
Sunday, November 12, 2023
Professor Accused of Wiretapping Other Professors
According to the affidavit, the devices were being held in place by a substance. The ULM professor was in his office when one of the devices fell on the floor. The second device was found after the graduate assistant searched the door area of the office.
ULM Police then stationed themselves and conducted surveillance, identifying the suspect as Chad Allen Lewing, who is also a professor at the university. On November 8, 2023, at 5:30 AM, Lewing was detained by authorities while allegedly attempting to remove the devices.
Police learned that Lewing arrived at work two hours early and he was the only person in the building, besides two ULM police officers. Lewing was transported to the university’s police station and refused to talk with authorities...
Officers went on to find two more devices in the office spaces of two other ULM professors. more
AirTags: The New Go-to Tool for Cops
Court: Automakers Can Record & Intercept Owner Text Messages
The Seattle-based appellate judge ruled that the practice does not meet the threshold for an illegal privacy violation under state law, handing a big win to automakers Honda, Toyota, Volkswagen and General Motors, which are defendants in five related class action suits focused on the issue. One of those cases, against Ford, had been dismissed on appeal previously. more
NJ Jury Finds Attorney Illegally Recorded Ex-Son-In-Law
NSA Unveils "Artificial Intelligence Security Center"
“The AI Security Center will become NSA’s focal point for leveraging foreign intelligence insights, contributing to the development of best practices guidelines, principles, evaluation methodology, and risk frameworks for AI security, with an end goal of promoting the secure development, integration, and adoption of AI capabilities within our national security systems and our defense industrial base,” Nakasone said...
The news about the center comes as the NSA also plans to establish a new “innovation pipeline” focused on China. more
Friday, November 3, 2023
Weekend Read: “Spymaster’s Prism: The Fight Against Russian Aggression”
When the book was first published in the middle of the pandemic in 2021, there was only an emergent acknowledgement of the real threat posed by Russian "active measures" and espionage to Western interests. Though I devoted an entire section to Ukraine called "New Berlin", I could not have foretold how much the world would change only a year later, on 24 February 2022...
Wednesday, November 1, 2023
The CIA Teaches You How to Speak Like a Spy
Example: Rolled-up - when an undercover operation goes bad and is raided by opposing forces, resulting in agents or assets being arrested.
Shady Things You Can Do With a Flipper Zero
You can use a Flipper Zero to control your TV, cheat your Nintendo, replace your work ID, open your hotel room door, and more. I’m sure you could see where the “evil” part could comes in. But on the other hand, it’s just a tool, and its ability to commit crimes is... more
Wednesday, October 18, 2023
Utah Lawyer Charged with Voyeurism...
There were also recordings of women employed by Judd using the bathroom. When the recordings were recovered, employees examined the vent in the video but found the camera had been removed, according to documents...
The same employee said that one duty she performed at work was to order items for Judd on an Amazon account they both had access to. “The account history showed that several small spy cameras had been ordered beginning February 2021, and continuing through that year,” documents state. more
Is This a Bug?
This question comes from Reddit, where someone answered correctly.
We have a collection of many other "Is This a Bug?" photos and explanations.World Spy News Roundup
CA - The Five Eyes countries' intelligence chiefs came together on Tuesday to accuse China of intellectual property theft and using artificial intelligence for hacking and spying against the nations, in a rare joint statement by the allies. more
USA - Ethical hacker helps prevent a potential espionage disaster for CIA. A glitch on X, formerly known as Twitter, could have opened a can of worms for the Central Intelligence Agency (CIA) had an ethical hacker on the microblogging website not sprung to action. more
Survey - 53% of employees in the Middle East, Turkiye, and Africa region fear spying from drones... Corporate spies and hackers use drones to get trade secrets, confidential information, and other sensitive data from corporations and data centers. A drone can carry a device for hacking into corporate networks – for instance, a smartphone, a compact computer (e.g., Raspberry Pi), or a signal interceptor (e.g., Wi-Fi Pineapple [1]), and hackers use these devices to access corporate data and disrupt communications. All wireless communication (Wi-Fi, Bluetooth, RFID, etc.) is vulnerable to drone attacks. more
Finland - Dead man's estate and firm fined €5m in shipyard espionage case. A man who worked for the Meyer Turku shipyard copied files from the shipyard and a shipping company onto a hard drive and transferred them to his own consulting firm – but then died while the investigation was underway. more
Yet Another USB Cautionary Tale
Mr Burgess (ASIO Director General Mike Burgess) referenced an unnamed Australian company that found global success making a product "similar to a motion detector" before their sales suddenly dropped.
"A little while later, their product started being returned to the factory because they were broken," he said.
"When they opened their branded products, they discovered they weren't their branded products, because the components were inferior, they were exact knock-offs."
The problem was eventually traced to an international conference, where someone had offered to share information with one of the company's employees by plugging a USB into their laptop.
"That USB downloaded malware onto that laptop, which later on, when they were connected back to their corporate network, was used to steal their intellectual property," he said.
"That intellectual property was passed from the intelligence services to state-owned enterprise that mass-produced the goods and sold them on the market that undercut them." more
• USB – Hacked Charging Cables
• USB – Malicious Spy Cable Detector Instructions
• USB – General Memory Stick Warning
• USB – NSA Type Cable Bug – $6.74
Extra USB Spy News - Government entities in the Asia-Pacific (APAC) region are the target of a long-running cyber espionage campaign dubbed TetrisPhantom. "The attacker covertly spied on and harvested sensitive data from APAC government entities by exploiting a particular type of secure USB drive, protected by hardware encryption to ensure the secure storage and transfer of data between computer systems," Kaspersky said in its APT trends report for Q3 2023. more
Monday, October 16, 2023
The CARVER Mindset: How to Think Like a Spy - FREE
Luke Bencie (Mr. Carver Mindset), is a really smart guy. His book, Among Enemies: Counter-Espionage for the Business Traveler which first introduced me to him is excellent. Check out his other books, too. His Monday morning emails are always inspiring. I look forward to receiving them. Great way to start the week. The sign-up is at the bottom of this page.
CARVERCON 2023 is coming November 1st (Day of the Dead).