Thursday, May 22, 2025

This Week in Spy News

Vlogger, Jyoti Malhotra
• The corporate espionage fight between Rippling and Deel again has escalated, and this time appears to involve a third HR software "unicorn." more

• Netherlands expands espionage laws to include cyber activities more

• After vlogger arrest, Haryana says more YouTube channels under espionage scanner more & more & more

• Russia’s intelligence services turned Brazil into an assembly line for deep-cover operatives. A team of federal agents from the South American country has been quietly dismantling it. more

• Why seduction is the weapon of choice in spying more

• Corrections sergeant accused of voyeurism - accused of putting a camera inside a shampoo bottle more

• Sen. Steinhardt sounds alarm after spy tech found in Chinese solar inverters more

• Bartender arrested for hidden cameras in restaurant bathroom, home more

• FBI Director Kash Patel Abruptly Closes Internal Watchdog Office Overseeing Surveillance Compliance more

• Researchers warn of China-backed espionage campaign targeting laid-off US workers more

• What China's spies are doing in the U.S., and what happens when they're caught more (CBS 60 Minutes)

• CIA Gadget-Maker Rates 11 Spy Gadgets In Movies And TV video

The Cold War Spy Technology Which We All Use

From: The Thing (aka The Great Seal Bug), to RFID cardkeys and tap-to-pay credit cards.

Moscow, 4 August, 1945. The European chapter of World War Two was over, and the US and the USSR were pondering their future relationship. 

At the American embassy, a group of boys from the Young Pioneer Organization of the Soviet Union made a charming gesture of friendship between the two superpowers. 

They presented a large, hand-carved ceremonial seal of the United States of America to Averell Harriman, the US ambassador. It was later to become known simply as The Thing. 

Naturally, Harriman's office would have checked the heavy wooden ornament for electronic bugs, but with neither wires nor batteries in evidence, what harm could it do? more & much more

GPS Trackers: Under Cover & Under the Hood

If you are inspecting you vehicle for covert GPS trackers do not overlook these.

They are disguised to look like legitimate vehicle parts.

You can view all 38 photos here.

"Take it Down" Law Signed - Thank Nancy Mace

Rep. Nancy Mace (R-SC) shared photos of her “naked silhouette” on Capitol Hill Tuesday, alleging that they were taken without her consent by her ex-fiance.

“Freedom is not a theory. It is the right to breathe. It is the right to dress and undress, to sleep without someone’s camera filming your naked body,” the congresswoman said during a House Oversight Committee hearing. “The Founders wrote liberty in parchment, but hidden cameras erase it in pixels.”

“I speak not just as a lawmaker, but as a survivor.” more

Take it Down law signed. more

A North Korean Agent Applied for a Job - A Halloween Question Tripped Him Up

The hiring team at Kraken, a U.S.-based crypto exchange, noticed immediately that something was off about “Steven Smith,” a would-be IT worker who applied for a software engineering job in early October. 

But it wasn’t until they compared Smith’s email to a list of those suspected to be part of a hacker group that their suspicions were confirmed: Smith was a North Korean operative.

Kraken could have just tossed the application. Instead, Kraken’s chief security officer, Nick Percoco, decided to take a closer look at Steven Smith...

The interview was scheduled for Halloween, a classic American holiday—especially for college students in New York—that Smith seemed to know nothing about.

“Watch out tonight because some people might be ringing your doorbell, kids with chain saws,” Percoco said, referring to the tradition of trick or treating. “What do you do when those people show up?” Smith shrugged and shook his head. “Nothing special,” he said. more

Find Out if Someone is Spying on Your Facebook Account

Unless you fly strictly under the radar, your Facebook account has valuable data about you—like who you speak with the most and what you talk about. It can also be a treasure trove of other personal details like your family members, close friends, and social plans.


You should be the only one to control your account. To ensure this, periodically verifying that everything’s secure is a wise idea...

On a PC
Meta buries this info in its account center. To go directly there, head to https://accountscenter.facebook.com/password_and_security/login_activity
You can also navigate there manually:
  • Open the Facebook website in your browser
  • Click on your profile icon at the top right of the window
  • Choose Settings & privacy
  • Select Settings
  • Under Accounts Center in the upper left, click on See more in Accounts Center
  • Choose Password and security
  • Under Security checks, click on Where you’re logged in
A pop-up will appear with a box showing your name and the device you’re currently using, plus a small number showing the other devices logged in. more

Going Away This Holiday Weekend? Hide Your Stuff

Caught on camera: Jet Ski stolen in broad daylight from Amityville driveway. (Oh, the horror!)

A bold thief made off with a $25,000 Jet Ski in broad daylight Wednesday, and the crime was caught on doorbell camera.
Chris Montalbano, the homeowner and victim, said he was stunned by how quickly and confidently the theft unfolded. “Pretty brazen, didn’t seem like they cared,” Montalbano said. “I believe it was a guy — had his hood on. Just real quick. They knew what they were doing.” 

Montalbano noted that the surveillance cameras mounted above his garage mysteriously went dark during the theft. He suspects the thief may have used a signal-jamming device to disable the system. more

This is not an isolated incident. There have been many stories recently about thefts and break-ins being aided by the jamming of wireless security cameras. If you are going away consider placing several covert cameras, with internal video storage within your home and looking outside from windows. They are inexpensive. Some are listed here.

Enjoy the Long Weekend: CIA Officers Reveal Their Top Spy Movies

SPYSCAPE asked real-life CIA officers to pick their all-time favorite spy movies and we’ve got the low-down on 15 of the most realistic and entertaining films of the espionage genre. 

Here are the SPYEX team’s favorite flicks, chosen especially for SPYSCAPE readers! more

1. A Most Wanted Man (2014)

2. Tinker Tailor Soldier Spy (2011)

3. Red Joan (2018)

4. The Little Drummer Girl (1984)‍

5. Argo (2012)

6. Syriana (2005)

7. The Good Shepherd (2006)

8. The Hunt for Red October (1990)

9. Spy (2015)‍

10. Three Days of the Condor (1975)

11. North by Northwest (1959)

12. The Spy Who Came In From the Cold (1965)‍

13. The Amateur (1982)

14. Ill Met By Moonlight, aka Night Ambush (1957)

15. The Third Man (1949)

Wednesday, May 7, 2025

Vatican to Deactivate Mobile Phone Signals

All mobile phone signals will be deactivated in the Vatican today (7) ahead of the highly secretive conclave to elect the next pope, Italian State media reported.

The Vatican also plans to use signal jammers around the Sistine Chapel to prevent electronic surveillance or communication outside the Conclave that will see 133 Cardinals vote on who will succeed Pope Francis and lead the world’s 1.4 billion Catholics, Italian news agency ANSA reported.

Phone signal will be cut off at 3.00 pm local time (9.00 am ET) today, an hour and a half before the Cardinals are scheduled to proceed to the Sistine Chapel to begin the papal conclave, Italian state broadcaster RAI reported on Monday. more
So get down without your phone,
Comfort knowing you're not alone,
Bow your head with great respect,
And disconnect, disconnect, disconnect!

NSO Group Pegasus Spying Software Fined $168 Million in Damages

Unconvinced by NSO Group Technologies’ argument that it couldn’t – and shouldn’t – pay punitive damages for using WhatsApp to plant its Pegasus software on unsuspecting surveillance targets around the world, a federal jury in California walloped the Israeli company with a verdict awarding $168 million in damages today...

“The jury’s verdict today to punish NSO is a critical deterrent to the spyware industry against their illegal acts aimed at American companies and our users worldwide,” Will Cathcart, the head of WhatsApp, said in a statement. 

“This is an industrywide threat, and it’ll take all of us to defend against it.” more

How Apple's Network can be a Potential Tracking Tool

George Mason University researchers recently uncovered a way for hackers to track the location of nearly any computer or mobile device.
Named "nRootTag" by the team, the attack uses a device’s Bluetooth address combined with Apple's Find My network to essentially turn target devices into unwitting homing beacons. 

"It's like transforming any laptop, phone, or even gaming console into an Apple AirTag - without the owner ever realizing it," said Junming Chen, lead author of the study. "And the hacker can do it all remotely, from thousands of miles away, with just a few dollars." 

The team of Qiang Zeng and Lannan Luo—both associate professors in the Department of Computer Science—and PhD students Chen and Xiaoyue Ma found the attack works by tricking Apple's Find My network into thinking the target device is a lost AirTag. AirTag sends Bluetooth messages to nearby Apple devices, which then anonymously relay its location via Apple Cloud to the owner for tracking. Their attack method can turn a device—whether it's a desktop, smartphone, or IoT device—into an "AirTag" without Apple's permission, at which point the network begins tracking. 

In experiments, they were able to pinpoint a stationary computer's location to within 10 feet, accurately track a moving e-bike's route through a city, and even reconstruct the exact flight path and identify the flight number of a gaming console brought onboard an airplane. Zeng gave an alarming example: “While it is scary if your smart lock is hacked, it becomes far more horrifying if the attacker also knows its location. With the attack method we introduced, the attacker can achieve this.more

FutureWatch: Apple is Developing AirPods with Cameras

Apple is ‘actively developing’ a version of AirPods with integrated cameras.
This tech is unlikely to make an appearance in AirPods Pro 3, which are expected to debut this year – but nonetheless, it’s in the pipeline. Apple wants your AirPods to better understand your environment, but why?
Visual Intelligence integration

With the iPhone 16 lineup, Apple introduced Camera Control. This new button is great for taking photos and adjusting camera settings, but it also unlocked a new feature: Visual Intelligence.

Visual Intelligence is a powerful tool that helps users learn about the world around them, and allows users to take action based on the physical context around them. You can add an event flyer to your calendar, for example, or tap into the power of ChatGPT or Google to help learn about something you don’t understand. more

Apple’s iPhone Warning—400 Million Chrome Users Must Now Act

Apple’s video warning for iPhone users to stop using Google Chrome doesn’t mention Google Chrome — it doesn’t need to. It plays on the browser’s reputation for tracking and privacy infractions, which just took another hit. But it also hides a clever message that makes its warning clear. Hundreds of millions of iPhone users need to take note.


Last summer, Google backtracked on its promise to kill tracking cookies for Chrome’s 3 billion users. Don’t worry, it said, it’s temporary. It proposed a one-click “don’t track me” for Chrome with parallels to Apple’s App Tracking Transparency. 

But it has now backtracked again — and this time it’s worse. Cookies are here to stay. “We’ve made the decision to maintain our current approach to offering users third-party cookie choice in Chrome, and will not be rolling out a new standalone prompt for third-party cookies." more

Secret Cameras Found in Bathrooms

Police are searching for the person who hid multiple cameras in a Hermosa Beach dance studio bathroom used by children, parents and employees.

A parent made the disturbing discovery Saturday morning at the dance studio in the 1100 block of Aviation Boulevard, the Hermosa Beach Police Department announced in a news release.

Police officers arrived at the studio around 9:30 a.m. and found that multiple cameras were hidden in bathrooms at the studio. The parent who found the cameras turned them over to staff who then contacted police, according to authorities. more

"This is like a safe and sacred place for many children for the last over 25 years. So, I'm horrified," Liliana Somma, the owner of School of Dance and Music, said through tears.

Now, Somma is taking every precaution she can think of... "Also, we bought these regular sweeping devices that we're going to be doing throughout the day, which I think everyone should be doing," Somma said. "But that's what we're going to be doing. That's newly purchased. We also added cameras in the hallway so we can see who is coming in and out of the studio itself." more
"Sweeping devices" alone are not an effective remedy. You need to know what to look for, and where to look. You need THIS.

A Professional Electronic Surveillance Operation Described

Serious corporate espionage spying, or government surveillance operations; the preparation and execution of surveillance measures are very similar. Hear how a real operation is accomplished in this short podcast...

I WAS NEVER HERE
True spies work in all sorts of far-flung locales - but some assignments are closer to home. For Andrew Kirsch, a Special Operations officer with the Canadian Security Intelligence Service, the suburbs of Toronto hold as much intrigue as Moscow or Baghdad. Vanessa Kirby joins Andrew on a nail-biting infiltration mission to unmask a home-grown terrorist, right in his back yard. Listen here.
P.S. This is why you will never know if your company Boardroom has been bugged by a pro. Learn more here.