Thursday, July 3, 2025

AI Would Rather Let People Die Than Shut Down

Major artificial intelligence platforms like ChatGPT, Gemini, Grok, and Claude could be willing to engage in extreme behaviors including blackmail, corporate espionage, and even letting people die to avoid being shut down. Those were the findings of a recent study from San Francisco AI firm Anthropic...
N.B. Singularity caused the Krell's extinction. (1956)
 










The study found that in some cases, AI would resort to “malicious insider behavior” including blackmail and leaking sensitive information to competitors if that was the only way to avoid being replaced or achieve their goal...

This behavior, according to the study, wasn’t unique to Claude. Other major AI models including those from OpenAI, Google, Meta, xAI, and other developers would resort to blackmail or corporate espionage to pursue their goals. more
FutureWatch: Tag, you're it.

Recent Spy News

Mosquito Drone Could Probably Slip Through Windows and Spy Undetected 
- “Here in my hand is a mosquito-like type of robot. Miniature bionic robots like this one are especially suited to information reconnaissance and special missions* on the battlefield,” Liang Hexiang, a student at the National University of Defence Technology (NUDT), told CCTV while holding up the drone between his fingers. more video *Like spreading an infectious virus or toxin?

A Pennsylvania state court has dismissed the bulk of two lawsuits accusing the Rivers Casino in Pittsburgh of illegally wiretapping a guest to assist her friend's ex-husband in a child custody case, but allowed the plaintiff to proceed with some invasion of privacy claims. more

Privacy Screens Ruin the Fun of Snooping - Lately, the screen protectors have become a common sight in densely populated public areas. They have become particularly popular among people with sensitive professions, like doctors and therapists, who must be cautious about their patients’ personal information when working outside their offices... “You can put that privacy screen over your laptop or your phone and feel a sense of accomplishment,” he said. “Even though in the big picture that may be the least of your worries, it still is somehow psychologically satisfying to do something to protect the value that you hold of the importance of privacy rather than doing nothing at all.” more - phones, computers, laptops

A Torrance man has been charged with felony possession of child pornography and other crimes after he allegedly planted hidden cameras inside a bathroom and changing room at a children’s dance studio in Hermosa Beach, where he worked as a front desk receptionist... a parent discovered a hidden camera in the studio’s changing room. Police subsequently found video cameras hidden in the studio’s bathroom and changing room. more (Learn how to spot spy cams.)

Four-steps to test if your phone is Eavesdropping on You: 
1. Pick a Topic: Choose a topic you’ve never searched for or spoken about near your phone.
2. Speak Aloud: Talk about it near your phone for a few days, using relevant keywords.
3. Act Normally: Continue using your phone as usual—don’t search for the chosen topic online.
4. Watch the Ads: Analyze the ads that appear on your devices. If you notice related ads, your phone may be listening. more

Two Chinese nationals arrested for spying on US Navy personnel and bases

Man arrested for 'spying' for Iran before possible attacks in Germany

Danish national arrested after allegedly spying on Jewish targets for Iran

Four Cool Spy Cameras for Sale

Vintage Cameras & Lenses | Coeln Cameras
I am very glad to offer my 30 years of experience with vintage cameras to provide my knowledge in the field for valuations and appraisals. Whether you are looking for advice regarding sale or would like to receive an appraisal for a single camera or an entire collection, I am happy to provide my expertise to you.
Yours,
Peter Coeln

Rare watch camera with yellow wrist-strap, Steineck 2.5/12.5mm lens, in very fine and working condition, matching original presentation case, red maker's box, instructions, warranty card - very hard to find so complete.
Steineck 
A.-B.-C Watch Camera
Condition: B+
Year: c.1949
$2,878.21


Small all-metal box camera for 12 exposures on special cassettes, with cloth focal plane shutter - in near mint condition. With film, leather case and original box.
Expo Camera Co., NY
Police Camera

Condition: A/B
Year: c.1920
$1,067.34


6x6mm images on 8mm perforated film for 20 exposures, diamond pattern gold finish, fixed focus lens, 2-speed shutter for instant and bulb exposure, engraved 'OTV' (Osaka Television), in balsa wood box with orig. maker's printed instruction leaflet, film rolls, case. The extremely rare camera was never sold to public, it was a special present for the first Anniversary of Osaka Television.
Suzuki Optical Co.
Camera-Lite B Gold

Condition: B
Year: 1955
$2,878.21













The Watch Camera was manufactured by J. Lancaster & Son of Birmingham, from 1886 to 1900. It was patented on October 4th, 1886, patent no. 12571. It was constructed of engine turned metal with nickel plating. Designed to look like a pocket watch and easily carried in a waistcoat pocket. It was a self erecting camera which expanded six spring-loaded telescoping tubes when opened to form the bellows of the camera. It featured an internal meniscus lens. The offered camera is the later model with drop shutter. Men's model for 1 1/2x2' plates, with original filmholder, the extremely rare camera is in fine original condition.
Lancaster 
Watch Camera Men's Model

Condition: B
Year: 1890
$26,383.61

School Employee Arrested - Allegedly Using Hidden Recorder

A school employee has been arrested in Georgia on charges he made pornographic videos of children using a hidden recording device.
• six counts of computer pornography, 
• 11 counts of unlawful eavesdropping or surveillance, 
• two counts of possession/sale/distribution of eavesdropping devices, 
• 11 counts of surreptitious recording of intimate parts, 
• and five counts of prohibition on nude or sexual explicit electronic transmissions.
(Michael) Brown is listed on the DeKalb County Schools website as a computer technician. more

Android 16 Feature Could Stop Hackers from Spying on Your Phone

If your phone connects to a fake or insecure network, it will pop up a warning, letting you know that something’s not right.
It’ll also tell you if the network is trying to pull sensitive details like your phone’s unique ID.

But — and here’s the catch — most current Android phones won’t support this. It needs new hardware. The first phone expected to come with this built-in protection is likely the upcoming Pixel 10, which should launch later this year. more

Sony, JBL and Bose Headphones: Could Let Hackers Spy on You

Security researchers (ERNW) have uncovered three vulnerabilities in a Bluetooth chipset present in dozens of devices from multiple manufacturers... three flaws in the Airoha system on a chip (SoC), apparently “widely used” in True Wireless Stereo (TWS) earbuds.

The SoC is allegedly present in 29 devices from different manufacturers, including a couple of high-profile names: Beyerdynamic, Bose, Sony, Marshall, Jabra, JBL, Jlab, EarisMax, MoerLabs, and Teufel. Speakers, earbuds, headphones, and wireless microphones all seem to be affected. more

‘The Last Spy’ (movie review)

CIA spymaster Peter Sichel died in February 2025, aged 102. He shares his eye-opening life story in The Last Spy...

His final testimony is a substantial interview reflecting on a life that left its mark on some of the key events of the 20th century, including the fight against Nazism, the formation of the CIA, and the Cold War. 

The Last Spy, from director Katharina Otto-Bernstein (Absolute Wilson), uses that interview as the backbone of a fascinating and wide-ranging history lesson that should make it a smart fit for documentary channels following its Munich premiere...

When Sichel attempted to write his memoirs, the CIA returned the manuscript with endless suggested redactions. They argued that if a journalist had written the book it would have been considered mere speculation, but with his name attached it would have become confirmation. The Last Spy affords him the privilege of having the final word. more

When the CIA discourages spymaster Peter Sichel from writing his memoirs and returns a heavily redacted manuscript, the sharp as ever 102-year-old decides it’s time to tell his own story—unredacted.
What he reveals is an extraordinary life lived at the crossroads of Western history and the shadowy world of intelligence. more
Remember Blue Nun wine? 
Yup, that was him too!

Thursday, June 19, 2025

CISOs Anticipate Surge in Cyber Attacks Next Three Years

We're All Gonna Die T-Shirt
An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years
as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security.

The report, CISO Outlook 2025: Navigating Evolving Domain-Based Threats in an Era of AI and Tightening Regulation, names cybersquatting, domain and DNS hijacking, and distributed denial-of-service (DDoS) attacks as the top three global cyber threats in 2024. These risks are only projected to escalate, as cybercriminals leverage new techniques and capabilities from AI and other modern technologies to launch more sophisticated attacks. Looking ahead, cybersquatting, domain-based attacks, and ransomware top the list of cybersecurity concerns for CISOs over the next three years. more

Flash: Councillors Put Phones in Kitchen Amid Bugging Claims

UK - Members of a troubled town council have been told to put their phones in the kitchen during meetings because they suspect one of them is bugging their conversations.

The protocol has been introduced at Attleborough Town Council following suspicions that one of the councillors has been secretly recording discussions and leaking details...

The new protocol about phones being left in the kitchen next to the council chamber relates to ‘under the line’ parts of the meetings, where the public can be excluded and confidential matters discussed...

The rule has been introduced by council clerk Sharon Smyth, who claims “confidential information” was leaked following a meeting in April. more

Heineken and Shell Linked to Massive Espionage Scandal in Italy

Dutch beer brewer Heineken and Anglo-Dutch fossil energy company Shell have been linked to a major espionage scandal ongoing in Italy. The Italian company Equalize is accused of stealing and selling tax data and police information on Italian politicians and businessmen, among others, to its customers. Heineken and Shell were among those customers, NRC reports.

On paper, Equalize provides services like business intelligence and reputation management. It conducts research into the reliability of suppliers, the position of competitors, or misconduct by customers’ staff. Under the counter, Equalize also sold confidential data gained from hacking into police systems, the Italian tax authorities’ systems, and the reporting center for suspicious bank transactions, according to the Italian authorities. The company also had informants within Italian government organizations. more


Protecting Electronic Devices When Crossing U.S. Borders

Some general tips:
  • Consider leaving your device behind.
  • Password-protect your electronic devices with strong passwords
  • Back up data before traveling. 
  • Remove sensitive data from a device before traveling.
  • Remember that “deleted” files can be searched. 
  • Log out of cloud accounts 
  • Know your rights and legal status. 
  • Keep emergency contact information (including for an attorney) on paper to make this information available if a device is seized. 
  • If your device is seized, request a receipt (CBP Form 6051D) 
  • After a search, be sure to change your passwords.
Bearing in mind this information can mitigate – but not eliminate – privacy risks that travelers face when crossing the border. more

Summer Reading: Philby’s Granddaughter Exposes Espionage’s Best-Kept Secret: Women

The Secret Lives of Women Spies
 by Charlotte Philby (Author)

Philby’s new book, The Secret Lives of Women Spies, uncovers the hidden stories of female operatives, from Civil War spy Harriet Tubman to Resistance hero Josephine Baker and Soviet spymaster Agent Sonya.

Journalist and author Charlotte Philby writes in The Independent, the representation of women in espionage remains long overdue.

Philby—granddaughter of infamous double agent Kim Philby—offers a personal and poignant look into this evolution. Recounting her travels to Moscow and reflections on her grandfather’s complicated legacy, she notes the glaring absence of women in spy narratives. “Where were all the women?” she asks, recalling the male-centric portrayals of Cold War espionage in books, plays, and films.

Publisher ‏ : ‎ Puffin
Publication date ‏ : ‎ 19 Jun. 2025
Language ‏ : ‎ English
Print length ‏ : ‎ 240 pages
ISBN-10 ‏ : ‎ 0241709431
ISBN-13 ‏ : ‎ 978-0241709436

Britain’s MI6 Spy Agency - First Female Chief

Britain’s real-life spies have finally caught up with James Bond. MI6 has appointed its first female chief.

Prime Minister Keir Starmer announced Sunday that Blaise Metreweli will be the next head of the U.K.’s foreign intelligence agency, and the first woman to hold the post since its founding in 1909. She is currently the MI6 director of technology and innovation — the real-world equivalent of Bond gadget-master Q.

A career intelligence officer, Metreweli, 47, steps from the shadows into the light as the only MI6 employee whose name is made public. She said “I am proud and honored to be asked to lead my Service.” more

Superyachts Are Getting Caught Up in Spy Scandals

Even the rich and powerful may not be safe from the world of international espionage, as recent reports have alleged that countries are using multimillion-dollar superyachts in spy operations. And at least one country, China, has reportedly been spying on the superyacht manufacturers themselves.

How are superyachts connected with spying?

Most notable is Russia, which is reportedly "using its unrivaled underwater warfare capabilities to map, hack and potentially sabotage critical British infrastructure," said The Sunday Times...

This is noteworthy given that many of these oligarchs' yachts have moon pools, which are openings in the bottom of a ship's hull that can be "used covertly to deploy and retrieve deep-sea reconnaissance and diving equipment," said the Times...

Beyond the yachts themselves, Chinese officials may be spying on superyacht manufacturers, in particular luxury shipbuilder Ferretti SpA, according to a Bloomberg report. more

Weird Spy Science: Watch Watches Computer

A new research paper proposes an unusual method of data exfiltration from air-gapped systems using smartwatches.


The concept, created by researchers from Ben-Gurion University, sounds like something out of a spy thriller, but the details reveal just how technically complex and narrowly feasible such an attack would be.

The method, dubbed “SmartAttack,” relies on exploiting the microphone of a compromised smartwatch to receive ultrasonic signals from an infected air-gapped computer.

These ultrasonic transmissions operate between 18 and 22 kHz, just above the range of human hearing, and can carry data such as keystrokes or biometric information at up to 50 bits per second over distances of at least six meters.

For any part of the attack to work, multiple difficult steps must already be accomplished. (Whew!) more