Sunday, March 16, 2025

Book: In the Shadow of Giants: A true story of corporate espionage... by Liam Monclair

A true story of corporate espionage in the shadow of China’s rise.


At the heart of modern power struggles, In the Shadow of Giants follows the extraordinary journey of Liam Monclair, a security and strategy expert. This gripping narrative, blending memoir and thriller, opens the door to a unique and little-known universe—corporate espionage, geopolitical manipulations, and cultural tensions—spanning from the skyscrapers of Shanghai to the streets of Jakarta and the vast deserts of the Middle East.

From the escalation of a fierce conflict between Altéone Group—a French multinational—and Wang Industries, a Chinese giant led by the enigmatic Mr. Wang, to high-stakes missions in Iraq and the protection of a football star in dangerous zones, the author unveils the inner workings of a demanding world. 

Based on a true story, In the Shadow of Giants is both a tribute to those who work behind the scenes and an exploration of a life lived on the edge. Masterfully blending suspense and thought-provoking insights, it takes readers deep into the hidden reality of an extraordinary existence. more

The Atlas of Surveillance


The Atlas of Surveillance, which documents police surveillance technology across the US. See how your city is spending its money. 

FutureWatch: Acoustic Eavesdropping with Multi-Antenna mmWave Radar

Acoustic eavesdropping against private or confidential spaces is a significant threat in the realm of privacy protection. 

While the presence of soundproof material would weaken such an attack, current eavesdropping technology may be able to bypass these protections. 

This paper introduces mmEcho, a new acoustic eavesdropping method that utilizes millimeter-wave signals to sense vibration induced by sound precisely. Through signal processing techniques such as the intra-chirp scheme and phase calibration algorithm, mmEcho achieves micrometer-level vibration extraction without requiring target-related data. 

To improve the range of eavesdropping attacks while reducing noise, we optimize radar signals by leveraging the widespread availability of multiple antennas on commercial off-the-shelf radars. We comprehensively evaluate the performance of mmEcho in different real-world settings. 

Experimental results demonstrate that, with the aid of multi-antenna technology, mmEcho can more effectively reconstruct the audio from the target at various distances, directions, sound insulators, reverberating objects, sound levels, and languages. Compared to existing methods, our approach provides better effectiveness without prior knowledge, such as the speech data from the target. more

RIP: Mark Klein, AT&T Tech, NSA Check - 79

Mark Klein, a bona fide hero who risked civil liability and criminal prosecution to help expose a massive spying program that violated the rights of millions of Americans.

Mark didn’t set out to change the world. For 22 years, he was a telecommunications technician for AT&T, most of that in San Francisco. But he always had a strong sense of right and wrong and a commitment to privacy.

Mark not only saw how it works, he had the documents to prove it.

When the New York Times reported in late 2005 that the NSA was engaging in spying inside the U.S., Mark realized that he had witnessed how it was happening. He also realized that the President was not telling Americans the truth about the program. And, though newly retired, he knew that he had to do something. He showed up at EFF’s front door in early 2006 with a simple question: “Do you folks care about privacy?” more

RIP: Peter Sichel, Spy Turned Wine Guy -102

Peter Sichel was a shrewd observer, a skill that served him as both spy and marketing genius. 

As a U.S. intelligence officer in occupied Berlin in the aftermath of World War II, the German-Jewish immigrant put Western fears to rest when he concluded that the Soviet Union did not intend to launch a military invasion of West Germany. 

Later, after he’d grown disenchanted with espionage, Sichel took over his family’s wine business. Realizing that most Americans in the late 1950s had little knowledge of wine, he determined that they’d be drawn to something simple. He chose Blue Nun, a slightly sweet German white his family had been making since the 1920s, and the brand became ubiquitous. At its peak in 1984, it sold 30 million bottles... more

Tuesday, March 11, 2025

Hackers are Taking Aim at Board Directors

Well-known CEOs and executives aren’t the only potential victims of hacks and threats from criminals. Board directors also have to be vigilant, according to Jason Lish, the global chief information security officer at Cisco.

“Often times they’re targets, especially for public companies, where their profiles are out there,” he said during a virtual conversation on Thursday hosted by Fortune in partnership with Diligent for The Modern Board series.

Lish added that he’s even seen an increase in the mailing of physical ransom letters to board directors and company executives. “How do they stay protected in their personal lives?” he said. “Because threat actors will try to do reconnaissance.” more

TSCM is the corporate counterespionage measure you need.

Secret Commands Found in Bluetooth Chip - Used in a Billion Devices

A potential security issue has been discovered by cybersecurity researchers that has the capability to affect more than one billion devices.


According to researchers at the cybersecurity firm Tarlogic, a hidden command has been found coded into a bluetooth chip installed in devices around the world. This secret functionality can be weaponized by bad actors and, according to the researchers, used as an exploit into these devices.

Using these commands, hackers could impersonate a trusted device and then connect to smartphones, computers, and other devices in order to access information stored on them. Bad actors can continue to utilize their connection to the device to essentially spy on users. more

Chinese Spy Balloon Packed with American Tech

A Chinese spy balloon that crossed over the United States in 2023 was packed with American technology
that could have enabled it to spy on Americans, according to two sources with direct knowledge of a technical analysis conducted by the U.S. military.

The discovery of a satellite communication module, sensors and other tech from at least five American firms underlines the failure of U.S. efforts to restrict exports of technology that could have military uses to main adversary China as well as to countries such as Russia and Iran. It also raises questions over the role of private companies that sell their equipment globally in keeping control over the ultimate users of dual-use technology that can have defense applications as well as civilian uses.

A Chinese patent reviewed by Newsweek describes a communications system for exactly such a balloon as the one that crossed America, based on using a satellite transceiver from a U.S. company that the balloon’s controllers in China would use to communicate with it and that would send data back, and that is easily available online. more

1984 or 2025 - What the Flock?

Flock Safety, a maker of license plate-reading cameras, is said to be valued at $7.5 billion — a 56% increase from a year ago — in a funding round to be led by Andreessen Horowitz. The startup plans to raise $250 million. more

Not everyone is thrilled, and the courts have not weighted in yet. When they do, it will be boom or bust.

2025 Canadian Technical Security Conference (CTSC)

Conference Dates

Tuesday May 06, 2025 to Thursday May 08, 2025
Arrival Monday May 05, 2025

Conference Venue
Banff Centre for Professional Development
Kinnear Centre for Innovation
107 Tunnel Mountain Drive, Banff, Alberta Canada T1L 1H5

Conference Theme:
The Future of Technical Security: Adapting to a Changing Threat Landscape
Defensive resources, tools, countermeasures, and technologies are available. That is why, you need to attend the Canadian Technical Security Conference to hone an up-to-date awareness of the threat environment, countermeasures, tools and a better understanding how to make the best use of them. Moreover, not only will you learn from experts but you can become part of a community that pulls together against the threat operators to share information and best practices.

A very worthwhile event for TSCM colleagues. more

History: Spies and Informants | A 60 Minutes Marathon


From 2017, Scott Pelley’s interview with an FBI undercover agent who infiltrated Al Qaeda and helped thwart several terrorist attacks. 

From 2011, Anderson Cooper’s report on FBI agent Lin Vecchio, who helped put away several notorious Mafia leaders, but also faced murder charges due to his association with an informant. 

From 2017, Sharyn Alfonsi’s report on the use of jailhouse informants in Orange County, California. 

From 2015, Steve Kroft’s report on Jack Barsky, a KGB spy from the Soviet Union who lived for decades in the United States without being detected. 

From 2019, Pelley’s talk with a former American member of Al-Qaeda who provided valuable intelligence in order to avoid jail. 

From 2001, Lesley Stahl’s report on Robert Hanssen, an FBI agent who was convicted of spying for Russia. 

From 2024, Cecilia Vega’s report on the Americans spying for Cuba in the U.S. 

From 2015, Stahl’s investigation into the controversial use of young confidential informants by law enforcement in dangerous and sometimes deadly drug cases. 

From 2010, Pelley’s report on a Defense Department employee caught on tape selling secrets to a Chinese spy. 

From 2022, Jon Wertheim's story on the Ritchie Boys, the secret U.S. unit bolstered by German-born Jews who helped the Allies beat Hitler. 

From 2018, Cooper’s interview with Justice and FBI officials who reveal how they caught a former CIA officer spying for the Chinese. 

And from 2017, Kroft’s interview with British author John Le Carré who has written several best-selling spy thrillers under the pen name David Cornwell. more

Wednesday, February 19, 2025

Spy Cam News: 2024 Singapore Slings

• 519 voyeurism cases were reported last year — a 9% rise. 

• Over 30% of the incidents occurred in victims' own homes.

• Physical crime cases in Singapore remained stable in 2024.

Most cases at residential premises (124 cases or 76.5%) were committed by perpetrators known to the victims (such as boyfriends/ex-boyfriends, household members or fellow tenants). Cases at shopping complexes and on the public transport network typically involved perpetrators not known to the victims.

At public transport nodes, the SPF has started initiatives to display advisory messages on voyeurism prominently on floor decals at selected MRT stations. Anti-voyeurism messages are also broadcast at all MRT stations during peak hours. The SPF has also collaborated with the Restroom Association (Singapore) to introduce security design guidelines, enhancing safety in public toilets. more

Mom Hears a Stranger Talking to Child Through WiFi Baby Monitor

The monitor's camera was positioned directly above the crib. “Of course, he was crying a little bit, so I opened the app and turned on the audio just to keep an eye on him,” says the OP (original poster on reddit.com). “As soon as I turned on the audio, I hear a woman’s voice go, ‘Hello?’”

The OP asked their husband if there was anything in the room that talks or if the camera made noise when turning the audio on. The answers were no and no. “I go back upstairs, and as I’m opening the door to my son’s room I hear the same woman talking to my son through the camera,” the OP writes. “She said, ‘Hi baby! It’s OK!’ 

“Consumer Reports found that most of these models have pretty lax security and privacy and didn't earn a recommendation in our ratings,” explains Allen St. John, the content manager for baby monitors of Consumer Reports. more

A Spymaster Sheikh Controls a $1.5 Trillion Fortune. He Wants to Use It to Dominate AI

His real name is Sheikh Tahnoun bin Zayed al Nahyan. A bearded, wiry figure who’s almost never seen without dark sunglasses.

Tahnoun is the United Arab Emirates’ national security adviser—the intelligence chief to one of the world’s wealthiest and most surveillance-happy small nations. He’s also the younger brother of the country’s hereditary, autocratic president, Mohamed bin Zayed al Nahyan. But perhaps most important, and most bizarrely for a spymaster, Tahnoun wields official control over much of Abu Dhabi’s vast sovereign wealth. Bloomberg News reported last year that he directly oversees a $1.5 trillion empire—more cash than just about anyone on the planet...

But in recent years, a new quest has taken up much of Sheikh Tahnoun’s attention. His onetime chess and technology obsession has morphed into something far bigger: a hundred-billion-dollar campaign to turn Abu Dhabi into an AI superpower. And the teammate he’s set out to buy this time is the United States tech industry itself. more

An Extra Defense Against Keyless Car Theft

The rising amount of technology in our vehicles makes them increasingly vulnerable to hacking or theft. 

Battery Sleuth bypasses both the wireless communication that key fobs depend on and the standardized onboard communication network in today’s vehicles. Instead, it authenticates drivers by measuring voltage fluctuations in a vehicle’s electrical system. Drivers interact with it through a keypad device plugged into the auxiliary power outlet. Learn more in this video.


“The idea of measuring fluctuations in a car’s electrical system seems simple, but designing one device that can do it accurately on thousands of different vehicle models in varying environmental conditions gets quite complicated,” said Liang He , assistant professor of computer science and engineering at the University of Colorado, Denver and a researcher on the project. “We’re working to design a system that’s smart enough to measure the parameters of the vehicle it’s installed on and then customize itself to work effectively on that vehicle.” more