Friday, June 7, 2024

Book: Dark Wire - "Secure Cell Phone" courtesy FBI

The Incredible True Story of the Largest Sting Operation Ever...


...in which the FBI made its own tech start-up to wiretap the world, shows how cunning both the authorities and drug traffickers have become, with privacy implications for everyone.

In 2018, a powerful app for secure communications called Anom took root among organized criminals. They believed Anom allowed them to conduct business in the shadows. Except for one thing: it was secretly run by the FBI. (Tip of the hat to N.C.)

Backdoor access to Anom and a series of related investigations granted American, Australian, and European authorities a front-row seat to the underworld. Tens of thousands of criminals worldwide appeared in full view of the same agents they were trying to evade. International smugglers. Money launderers. Hitmen. A sprawling global economy as efficient and interconnected as the legal one. Officers watched drug shipments and murder plots unfold, making arrests without blowing their cover. more

New Wireless Eavesdropping Vulnerability - Beam Deflection

A research team led by Rice University’s, Edward Knightly, has uncovered an eavesdropping security vulnerability in high-frequency and high-speed wireless backhaul links, widely employed in critical applications such as 5G wireless cell phone signals and low-latency financial trading on Wall Street.

Contrary to the common belief that these links are inherently secure due to their elevated positioning and highly directive millimeter-wave and sub-terahertz “pencil-beams,” the team exposed a novel method of interception using a metasurface-equipped drone dubbed MetaFly. Their findings were published by the world’s premier security conference, IEEE Symposium on Security and Privacy, in May 2024.


“The implications of our research are far-reaching, potentially affecting a broad spectrum of companies, government agencies and individuals relying on these links,” said Knightly, the Sheafor-Lindsay Professor of Electrical and Computer Engineering and professor of computer science. more

Wiretap Published: A spy from Kosovo calls BIA official. They make plans...

The wiretapping is published: The spy from Kosovo calls the BIA official, they make plans to ignite tensions in the North.


An audio recording is published in which Srdjan Rosic and Bedri Shabani are heard speaking, the latter arrested in Kosovo as a collaborator of the Serbian secret services.

Although the audio is censored in places, it is clear that Bedri Shabani, who is suspected of collaborating with Serbian intelligence, asks the BIA to help him and his men do a job. more & audio of the wiretap

------

In Other Spy Wiretap News...
Recently, an intelligence service in Russia intercepted a Webex call involving four high-ranking officers from the Air Force. The audio was made public, revealing discussions on potential deployment scenarios for the Taurus missile in Ukraine if it were to be transferred there. This incident sparked discussions in Germany and beyond back in March. It was also revealed that a Bundeswehr general committed a blunder in Singapore...

The Inspector General of the Air Force, Ingo Gerhartz, will face a disciplinary action over a recorded conversation about the Taurus missile with Russia. The General Lieutenant will have to pay a fine as a consequence, wrapping up the issue, confirms the German Press Agency. more

Sky Spy: Out of This World Espionage

Russian satellite is caught spying on another satellite... The French company Aldoria Space, which tracks objects in orbit using a network of ground-based telescopes, has published a very revealing record. It demonstrates how the Russian Luch-2 inspection satellite approaches other spacecraft.

The rendezvous took place on April 12, 2024, in geostationary orbit. After that, Aldoria Space gave a warning to satellite operators about the sudden maneuvers of the Russian spacecraft.

Aldoria Space didn’t report which satellite was spied on by Luch-2. 

Such maneuvers are not uncommon for Russian and Chinese spacecraft, which have been repeatedly caught spying on other satellites.  more

The rendezvous of the Russian spy satellite Luch-2 with another spacecraft. 

AirTag Goes to Court

The District Court for the Eastern District of Pennsylvania, United States of America
says a native of Tajikistan, Ibodullo Muhiddinov, is charged with the intent to injure, harass, intimidate, and place under surveillance another person, that is, S.K.

Ibodullo Muhiddinov, reportedly linked to a Russian human smuggling network, has tracked his ex-wife in the United States using the AirTagmore

Friday, May 31, 2024

2378 Cybersecurity Tools and Resources

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your cybersecurity domain. more



Chinese Drone Photographer Charged Under US Espionage Act

While on leave from his graduate studies at the University of Minnesota, Fengyun Shi flew to Virginia on January 5, 2024. While in Virginia, he rented a car and drove to a shipyard where United States military personnel build nuclear submarines. 

An affidavit filed later in January by FBI special agent Sara Shalowitz claims that a shipyard security officer saw Shi and told the Naval Criminal Investigative Service. Shalowitz alleges that on January 6, Shi was flying his drone in poor conditions, and it got stuck in a tree on a neighboring property.

Shi approached the property owner, requesting help retrieving his drone...The unnamed individual captured images of Shi, his rental car’s license plate, and Shi’s identification. They then called the police.

When law enforcement arrived on the scene, Shi was understandably “very nervous,” and failed to provide a reasonable explanation for why he was there and flying a drone. The police explained to Shi that the fire department would need to retrieve the drone and that Shi should stay there until they arrived. Instead, Shi left the area entirely, abandoning his drone in the process. more

Cybersecurity Labeling for Smart Devices

Consumer labels designed to help Americans pick smart devices that are less vulnerable to hacking
could begin appearing on products before the holiday shopping season, federal officials said Wednesday.

Under the new U.S. Cyber Trust Mark Initiative, manufacturers can affix the label on their products if they meet federal cybersecurity standards. The types of devices eligible for labels include baby monitors, home security cameras, fitness trackers, refrigerators and other internet-connected appliances. more

Spy Rock Mystery (probably) Solved.

Last week we reported on a mystery spy rock planted in a suburban neighborhood. No one knew why. This week, there is a likely solution. The same day, about 40 miles away...

On May 20, 2024, at approximately 10:31 p.m., the Glendale Police Department arrested four Colombian national burglary suspects in the Emerald Isle area of Glendale.

During the vehicle search, officers found a video surveillance device with a battery pack charging system camouflaged with leaves. This evidence, combined with the finding of freshly disturbed dirt in a planter in the cul-de-sac, led Glendale detectives to believe that the suspects had strategically placed the camera in the planter. 

This method allowed them to create a sophisticated method to gain a view of residences and know when homeowners would leave.

Officers also located a construction hard hat and a vest, which can be used as a ruse to approach homes with minimal suspicion...During that pursuit, the suspects discarded stolen items, including a WiFi signal jammer to disable home security systems. more

Florida Mother Finds Hidden Cameras After Ex-Boyfriend Moved Out

A concerned mother called the police because she found a small hidden camera in an electrical outlet in her young adult daughter's bathroom. According to the Ocala Police Department, an officer who went to the home to investigate took the small camera from behind the bathroom electrical outlet...Police added that the outlet was directly facing the shower and toilet.

Two days later, police were called to the home again because another camera had been found inside the residence. This time, police say the camera was disguised as a Wi-Fi repeater in the daughter's room.

The woman told police that the router was installed by her ex-boyfriend...who lived with the mother and daughter for a time. more

What TSCM techs know that police don't... "If you find one surveillance device, keep searching."

In other spy cam news...
The Gray's Creek Fire Department fire chief was arrested Thursday after allegedly placing a camera in the fire station's vent. more

A 39-year-old man has been arrested after officials with the Osceola County Sheriff’s Office say he used a hidden camera disguised as a "phone charger" to spy live on an alleged victim. We’re told years went by before she noticed the live feed on his phone. “Perverts and sick people are going to be creative and try to find a way to invade your privacy,” Sheriff Marco Lopez said... He’s encouraging people to check for hidden cameras in their homes, vacation homes, and hotel rooms. more

Kid's Jewelry - Ankle Bracelet for the Wrist


Google announced the Fitbit Ace LTE, a surveillance-forward ("Know where your wild things are") smartwatch featuring all the features youngsters love, such as having their location and habits constantly under observation by adult customers of the world's largest advertising company. 

It's about 45mm across and a little over 13mm thick, comes with 4G LTE and GPS/GNSS, allows calling and messaging up to 20 contacts, and has NFC so yer littluns can buy stuff too. 16 or more hours of battery life is promised on a charge and there's an array of sensors. more

Tuesday, May 28, 2024

Recent Spycam News - Disturbing Trend

• Washougal man charged with voyeurism, accused of recording women in bathroom.
Police say he hid cellphone in home he was hired to clean. more

• A voyeurism suspect returned to court Monday after admitting to planting a phone inside a bathroom at a Northern Kentucky medical facility and secretly recording victims in bathrooms for “years” for the “thrill,” police records show. more

• Victoria police have released a surveillance photo of a man suspected of taking pictures or video of a woman using a change room at a downtown store Wednesday afternoon. The suspect, who fled when confronted by the staff member, is described as having thick black hair and wearing a plaid jacket with a red-and-yellow logo on the backmore

• Jail for serial voyeur who took upskirt photos, videos of over 100 women in 10 years. more

• Cruise Ship Worker Accused of Hiding Cameras in Bathrooms to Spy on Guests more

• A Traverse City restaurant owner accused of hiding a camera in the women's bathroom of his business has pleaded no contest to all charges against him, including three felonies...A Traverse City police officer got in touch with the employee, and she said she believed there was a potential spy camera installed in a wall outlet in the women's bathroom at the business. more

• Police arrested a Harrisburg man they said allegedly took videos of various people in bathrooms at Arkansas State University...Police said upon examination of the devices, officers were about to find digital evidence of video voyeurism recorded in restrooms at Arkansas State University with at least 34 victims being recorded. more

• A new report gives detail on an 18-year-old who was arrested on a video voyeurism charge Wednesday after a video went viral showing customers in a Jacksonville Marshalls store confronting the teen they said was recording women in the restroom...Titus McDonell, 18, told police while he was detained in the same shopping center where the incident occurred a week prior that he was "just bored that day." more
Notice a trend? ...bathrooms... You don't have to be a victim. Click here... Learn how to spot spycams.

A Tom Lehrer Gift

Tom Lehrer (96) gifted the world his brilliant satirical music. In his own words...

I, Tom Lehrer, individually and as trustee of the Tom Lehrer Trust, hereby grant the following permissions: All copyrights to lyrics or music written or composed by me have been permanently and irrevocably relinquished, and therefore such songs are now in the public domain....In short, I no longer retain any rights to any of my songs. So help yourselves, and don’t send me any money.  
NOTICE: THIS WEBSITE WILL BE SHUT DOWN AT SOME DATE IN THE NOT TOO DISTANT FUTURE, SO IF YOU WANT TO DOWNLOAD ANYTHING, DON’T WAIT TOO LONG.
Tom Lehrer

You can download the recordings and lyrics here... https://tomlehrersongs.com/
or...

Q. OK, Kevin, so what does this have to do with spying?
A. Lehrer was drafted into the U.S. Army from 1955 to 1957, working at the National Security Agency (NSA). Lehrer has stated that he invented the Jello shot during this time, as a means of circumventing a naval base's ban on alcoholic beverages.

Chinese Language Phone Keyboard Exploits Leave One Billion Users Exposed

We analyzed the security of cloud-based pinyin keyboard apps from nine vendors — Baidu, Honor, Huawei, iFlytek, OPPO, Samsung, Tencent, Vivo, and Xiaomi — and examined their transmission of users’ keystrokes for vulnerabilities.

Our analysis revealed critical vulnerabilities in keyboard apps from eight out of the nine vendors in which we could exploit that vulnerability to completely reveal the contents of users’ keystrokes in transit. Most of the vulnerable apps can be exploited by an entirely passive network eavesdropper...


Given the scope of these vulnerabilities, the sensitivity of what users type on their devices, the ease with which these vulnerabilities may have been discovered, and that the Five Eyes have previously exploited similar vulnerabilities in Chinese apps for surveillance, it is possible that such users’ keystrokes may have also been under mass surveillance.

Recommendation: We urge users to install the latest updates to their keyboard apps and that they keep their mobile operating systems up to date. We also recommend that at-risk users consider switching from a cloud-based keyboard app to one that operates entirely on-device. more

Monday, May 27, 2024

FutureWatch: New AI Headphones Have Spy Potential

Appear to be listening to music, while zeroing in on a particular person's conversation...

What if you only want to hear what a single person is saying in a room full of other people? The experts over at the University of Washington have developed an AI-driven kit for headphones that lets you look at a person for three to five seconds as a directional signal*, and the headphones will only allow their voice to pass through. The team calls it "Target Speech Hearing" and it works even if the listener is moving around and no longer sitting directly in front of the speaker.

"In this project, we develop AI to modify the auditory perception of anyone wearing headphones, given their preferences. With our devices you can now hear a single speaker clearly even if you are in a noisy environment with lots of other people talking," says Professor Shyam Gollakota from the Paul G. Allen School of Computer Science & Engineering. more
* This could easily be adjusted so looking at the person is not necessary. Looking forward could signal AI to focus in on the person behind you, or any angle. ~Kevin