If you know where to look, plenty of secrets can be found online. Since the fall of 2021, independent security researcher Bill Demirkapi has been building ways to tap into huge data sources, which are often overlooked by researchers, to find masses of security problems. This includes automatically finding developer secrets—such as passwords, API keys, and authentication tokens—that could give cybercriminals access to company systems and the ability to steal data.
Wednesday, August 14, 2024
Thousands of Corporate Secrets Were Left Exposed
If you know where to look, plenty of secrets can be found online. Since the fall of 2021, independent security researcher Bill Demirkapi has been building ways to tap into huge data sources, which are often overlooked by researchers, to find masses of security problems. This includes automatically finding developer secrets—such as passwords, API keys, and authentication tokens—that could give cybercriminals access to company systems and the ability to steal data.
Increase Your Spy Resistance - Dumb Down Your Mobile Phone
Pakistan's Former Spy Chief Arrested
FutureWatch: The AI Polygraph, or Who's Zoomin' You
How it Works
PolygrAI is a fusion of advanced computer vision algorithms and extensive psychological research designed to discern the validity of human expressions. The software meticulously analyzes a spectrum of physiological and behavioral indicators correlated with deceit. For instance, when a person tells a lie, they might unconsciously exhibit decreased blinking or an erratic gaze—these are the tell-tale signs that PolygrAI detects.
The system vigilantly computes a ‘trustfulness score’ by monitoring and interpreting subtle changes in facial expressions, heart rate variability, and eye movement patterns. This score is adjusted in real-time, offering a dynamic gauge of credibility.
Furthermore, PolygrAI assesses the voice for sudden shifts in tone and pitch—parameters that could betray an individual’s composure or reveal underlying stress. more Lifetime access ($100) for beta testers.
Click to enlarge. |
History: How to Build a Bugging Device in 1917
Want to build a bug; known as a Detectograph back in 1917?
Just write to a magazine, like The Electrical Experimenter, and they would tell you. Things were pretty simple back then, but the parts were not cheap. The average full-time worker's wage was $13.21 per week.
Security Camera Catch: Checking Her Mate... with poison
Amina Abakarova, a 40-year-old chess coach from Makhachkala in the Russian Republic of Dagestan, is accused of trying to poison her rival, 30-year-old Umayganat Osmanova...
Wednesday, August 7, 2024
How to Fight a Corporate Espionage Accusation
What Constitutes Corporate Espionage Fraud?
Corporate espionage fraud involves illegally obtaining confidential business information from a competitor to gain an unfair advantage. This can include:
- Stealing trade secrets or proprietary technology
- Hacking into computer systems to access sensitive data
- Using deception to obtain confidential documents
- Bribing or blackmailing employees to reveal inside information
- Industrial sabotage to damage a competitor’s operations
1. Lack of Intent
2. Information Was Not Actually a Trade Secret
4. Public Availability
5. Whistleblower Protections
6. Statute of Limitations
Key Legal Precedents in Corporate Espionage Cases
- United States v. Hsu (1999): Established that attempted corporate espionage is prosecutable, even if no actual trade secrets were obtained.
- United States v. Chung (2011): Clarified that the government must prove the defendant knew the information was a trade secret, not just confidential.
- United States v. Aleynikov (2012): Found that software source code did not qualify as a trade secret under the Economic Espionage Act (later overturned).
- United States v. Nosal (2016): Ruled that the Computer Fraud and Abuse Act applies to theft of trade secrets by former employees.
- Challenging the evidence:
- Scrutinize how the evidence against you was obtained and push to suppress any improperly gathered information.
- Negotiating with prosecutors
- Presenting alternative explanations:
- Demonstrating lack of economic benefit
- Highlighting inadequate security measures
- Leveraging expert witnesses
- Pursuing civil resolutions
Russian Spy Parents Reveal Identity to Their Children
Among those swapped were Anna Dultseva and Artyom Dultsev, Russian spies who had been posing as an Argentinian couple in Slovenia. Not even their school-age children, who spoke Spanish with their parents, knew their true origins — until the parents revealed their identities after their release on the plane to Russia. more
How to Boost an Auction - Mention the Word Spy
Doc Boners: Recording Patients with Hidden Cameras
Doc Boner II: MA - The owner of a Peabody chiropractic business is facing charges that he recorded nude visitors in his clinic after a hidden spy camera was found in a bathroom last week. more
FutureWatch: Eavesdropping on YOU, by Looking at Your Face
Though Kosinski says his research should be seen as a warning, his work can feel more like a Pandora Box. Many of the use cases for his research seems pretty bad (like AI security scanners and robcops), and simply publishing about them may inspire new tools for discrimination. (Oops, forget what I just said.)
There's also the issue that the models aren't 100 percent accurate (yet), which could lead to people getting wrongly targeted. (e.g. Being a treehugger is not a sexual preference.) more
Clickbait of the Week: How to Build a (Code Cracking) Photonic Quantum Computer
- No. This is not an https://www.instructables.com/ article.
- Yes, the title is a lie.
Friday, August 2, 2024
Greenbrier Hotel Up for Public Auction
So, why is this news?
One of the great vestiges of the Cold War is the Greenbrier bunker, a facility built to house all 535 members of Congress in the event of a nuclear attack.
Greenbrier was chosen because of its location—relatively close and accessible to Washington, but far enough away to be safe from an atomic bomb—and because of its prior relationship with the United States government. During World War II, Greenbrier had served as an internment facility for Japanese, Italian, and German diplomats and then as a military hospital, where Eisenhower himself was at one time a patient. Although it returned to its original function as a hotel after the war, government officials occasionally held conferences at Greenbrier. more
Free TSCM AI Knowledge Wiki
The website, counterespionage.net, provides a comprehensive range of resources related to Technical Surveillance Countermeasures (TSCM), which can be considered as a knowledge wiki for several reasons:
- Informative Articles: It features detailed articles explaining what TSCM is and its importance in protecting corporate privacy and intellectual property. For example, the article on What Is TSCM? outlines the holistic approach needed for effective TSCM evaluations.
Free Resources: The site offers free TSCM security reports, publications, and videos that educate users about various aspects of surveillance and counter-surveillance techniques. You can find these resources in the TSCM Information section.
Guides and Tips: It includes practical guides such as the Security Director’s Guide to Discussing TSCM with Management and tips for businesses on counterespionage, which serve as valuable educational tools.
Case Studies and Testimonials: The website also shares case studies and client testimonials that provide real-world examples of TSCM applications, enhancing the learning experience for users.
FAQs and Expert Insights: The presence of a FAQ section allows users to get quick answers to common questions about TSCM, further contributing to its role as a knowledge base.
A $500 Open Source Tool Lets Anyone Hack Computer Chips With Lasers
At the Black Hat cybersecurity conference in Las Vegas next week, Sam Beaumont and Larry “Patch” Trowell, both hackers at the security firm NetSPI, plan to present a new laser hacking device they're calling the RayV Lite.