Tuesday, May 31, 2022
The CIA Shares How to Travel Like a Spy
Arrested for Gifting Women Make-up Mirrors with Built-in Spycams
The man, whose surname is Zhang, is the owner of an online hidden camera store, and has reportedly sold over 200 similar spycam devices as the one he had gifted.
The female coworker, surnamed Li, stated that Zhang had told her to keep the mirror on for 24 hours a day, otherwise the circuit board would catch on fire...
“One of the recordings on a memory card was marked ‘2019’ so I realized I was probably not the first victim,” Li wrote... more more
50 Spy Movies That’ll Keep You On The Edge Of Your Seat
I Would be Shocked if I am Not Being Spied On: Elon Musk
"I would be shocked if I am not being spied on haha. My only ask is that anyone spying on me please not affect call quality too much or I cannot hear what is being said!" Musk said in a reply to the user. more
Corporate Espionage is Entering a New Era
In May a jury awarded Appian, whose headquarters are in McLean, Virginia, a whopping $2bn in damages after it had accused Massachusetts-based Pegasystems of illegally snooping on it to gain a competitive edge.
The trial revealed that Pegasystems executives had referred to a contractor hired to obtain some of the ingredients of Appian’s secret sauce as “our spy” in internal documents, and had dubbed the overall spying effort “Project Crush”...
The episode illustrates how interest in business espionage, and learning how to foil it, has broadened. Snooping is no longer mostly centred on a few “sensitive” industries that have long been vulnerable, such as defence and pharmaceuticals. It is increasingly used to target smaller companies in surprising sectors, including education and agriculture. It has, in short, become more of a general business risk. more
Thursday, May 26, 2022
‘American Idol’ Winner Accused of Bugging LSU Student’s Dorm
The Associated Press reported that Hardy’s ex-girlfriend and her roommate found the alleged listening device, which looked like a phone charger, in their dorm room on April 6. She reported it to LSUPD the next day, and officers noted in a police affidavit acquired by the AP that they found recordings from a 10-day span in February. more
New Countermeasure Against Unwanted Wireless Surveillance
To prevent possible surveillance of the movement profile within one’s home, researchers from the Max Planck Institute for Security and Privacy, the Horst Görtz Institute for IT Security at Ruhr-Universität Bochum and the Cologne University of Applied Sciences have developed a novel system for protecting privacy in wireless communication.
Almost all Internet-of-Things devices, such as voice assistants, locks and cameras, rely on wireless connections based on high-frequency radio signals... passive eavesdroppers can still exploit sensitive information from intercepted radio frequency signals... Attackers can perceive such effects from a distance and, by applying simple statistical methods, conclude, for example, that a person is currently moving in the monitored room... this method known as “adversarial wireless sensing”...
With their approach, the researchers are the first in the world to propose IRS as a practical countermeasure against passive wireless eavesdropping attacks. more
Why Casinos Are Spying on Their Ultra-Rich Clients
Clients, for their part, accept this Orwellian scrutiny as necessary to enhance their experience. “It’s the expectation,” says Ryan Best, the surveillance and security manager at the casino who set up its facial-recognition system up in 2018.
Researchers Developing Anti-Eavesdropping Quantum Network
While quantum computers offer many novel possibilities, they also pose a threat to internet security since these supercomputers make common encryption methods vulnerable. Based on the so-called quantum key distribution, researchers at TU Darmstadt have developed a new, tap-proof communication network.
The new system is used to exchange symmetric keys between parties in order to encrypt messages so that they cannot be read by third parties. In cooperation with Deutsche Telekom, the researchers led by physics professor Thomas Walther succeeded in operating a quantum network that is scalable in terms of the number of users and at the same time robust without the need for trusted nodes.
In the future, such systems could protect critical infrastructure from the growing danger of cyberattacks. In addition, tap-proof connections could be installed between different government sites in larger cities. more
Monday, May 16, 2022
Series: Types of Industrial Espionage
Industrial espionage refers to various activities performed to gain an unfair competitive advantage, rather than for national security purposes. As we discussed in a previous article, the ways in which industrial espionage can affect a company are numerous and include theft of trade secrets and disruption to operation.
Section 1832 of the Economic Espionage Act of 1996 (the “Act”) criminalizes the theft of trade secrets “intended for use in interstate or foreign commerce, to the economic benefit of anyone other than the owner.” The trade secret owner is required to take “reasonable measures” to keep the information secret.
Sunday, May 15, 2022
Ex-Coca-Cola Chemist Sentenced for Stealing $120 Million Trade Secret
“Stealing technology isn’t just a crime against a company,” Acting Assistant Director Bradley S. Benavides of the FBI’s Counterintelligence Division said in a release. “It’s a crime against American workers whose jobs and livelihoods are impacted.” more
U.S. Spy Chief Reiterates ‘Overclassification’ Concerns
“Overclassification is a national security problem,” said Haines, testifying before the Senate Armed Services Committee alongside Defense Intelligence Agency Director Scott Berrier.
“This is a challenge as you ideate from a democratic perspective but also a challenge from the national security perspective,” Haines continued in an exchange with Sen. Elizabeth Warren, D-Mass. “It’s a very challenging issue.” more
Chinese CCTV Cameras on British Streets Contain Hidden Microphones
Things Often Mistaken for Eavesdropping Bugs
Usually the answer is, “I understand why you are asking is this a bug. Some bugs do look similar to this. But, here is what you actually found.”
Real electronic eavesdropping devices are getting smaller. So are lots of other little electronic bits which are part of our everyday lives. Distinguishing between the two can be tricky.
Saturday, May 7, 2022
The Colorful Side of Eavesdropping & Wiretaps
In one regiment, one Russian soldier allegedly said they’ve been pouring sand into the tanks’ fuel systems to clog them up.
“I don't follow stupid orders, I simply refuse,” one fighter can be heard telling a comrade. “The motherf*cker sent me to tanks, motherf*cking piece of shit. I f*cked it up and that's it.”
When the fellow Russian soldier on the other end of the line heard the unit wasn’t punished for the insubordination, he indicated he might repeat the tactic later in his own unit...