Tuesday, May 27, 2025

Belgium Bugged Football Stadium Box to Spy on Huawei MEP Lobbying

Belgian security agents bugged a corporate box at the RSC Anderlecht football stadium that was being used by Chinese tech giant Huawei to schmooze members of the European Parliament.


They also listened into other conversations involving one of Huawei’s leading lobbyists, including in his car. 

The surveillance operations, confirmed by three people with close knowledge of the investigation, formed part of a wide-ranging probe into allegations of corruption that was first revealed in March. They contributed to the Belgian prosecutor’s decision, reported by POLITICO on Monday, to request that a group of MEPs have their immunities lifted so they can be investigated. more

Dutch Government: More Forms of Espionage to be a Criminal Offence

More than state secrets...

Legislation already exists which makes traditional espionage, such as sharing state secrets, a criminal offence. The problem is that espionage is changing in terms of its manifestations and use.

Espionage targets more than just state secrets. Indeed, foreign governments are also interested in sensitive information which is not a state secret about a particular economic sector, or which is related to political decision-making. Such information can be used to influence political processes, weaken the Dutch economy, or play allies off against each other. 

Espionage may also involve activities other than sharing information, such as stealing high-tech know-how, sabotaging vital infrastructure, exerting an influence on political decision-making, or endangering Dutch citizens with a migration background. more

Türkiye: China Is Spying on Uyghurs Using Fake Cell Towers

Turkish intelligence has dismantled a Chinese espionage network operating on its soil.
This network had been conducting surveillance on Uyghur refugees as well as Turkish officials using advanced technology, particularly fake mobile towers.

Earlier this month, Turkish intelligence agents arrested seven suspects and discovered their vehicles outfitted with IMSI-catcher devices. These devices, which emulate genuine base stations, can intercept data, call logs, conversations, and other sensitive information from nearby mobile phones.

Intelligence sources indicate that some members of this espionage ring entered Türkiye as recently as March. However, a report last week disclosed that the network has been operational for the previous five years. more

China’s Spy Agency Warns - Foreigners Posing as Scholars, Tourists or ‘Insincere Lovers’

‘Don’t be fooled by sweet talk,’ ministry says in social media post.
Chinese citizens should be on alert for friendly foreign faces who could be spies – from scholars who do not do research and tourists who do not sightsee, to lovers who only want information, the country’s top spy agency has warned.

In a post on its official social media account on Sunday, the Ministry of State Security said foreign spies might be hiding in plain sight, using various identities to carry out activities that threaten China’s national security.

It highlighted five deceptive identities commonly used by foreign spies: tourists who do not sightsee, scholars who conduct no real research, businesspeople who do not do business, investigation consultants who do not investigate, and “insincere lovers” who exploit relationships to gather information. more

FutureWatch / Spytech: Contact Lenses Allow Seeing in the Dark, Even With Eyes Closed

Neuroscientists and materials scientists have created contact lenses that enable infrared vision in both humans and mice
by converting infrared light into visible light. 

Unlike infrared night vision goggles, the contact lenses, described in the journal Cell, do not require a power source—and they enable the wearer to perceive multiple infrared wavelengths. Because they're transparent, users can see both infrared and visible light simultaneously, though infrared vision was enhanced when participants had their eyes closed.

"Our research opens up the potential for noninvasive wearable devices to give people super-vision," says senior author Tian Xue, a neuroscientist at the University of Science and Technology of China. "There are many potential applications right away for this material. For example, flickering infrared light could be used to transmit information in security, rescue, encryption or anti-counterfeiting settings." more

Friday, May 23, 2025

AI Can't Protect It's IP Alone - It Needs TSCM

From her new book, Empire of AI, by journalist Karen Hao.

Sam Altman Asked for a Countersurveillance Audit of OpenAI

Altman himself was paranoid about people leaking information. He privately worried about Neuralink staff, with whom OpenAI continued to share an office, now with more unease after Elon Musk’s departure. Altman worried, too, about Musk, who wielded an extensive security apparatus including personal drivers and bodyguards. 

Keenly aware of the capability difference, Altman at one point secretly commissioned an electronic countersurveillance audit in an attempt to scan the office for any bugs that Musk may have left to spy on OpenAI. more
Got worries about your intellectual property? Get MA.

Thursday, May 22, 2025

This Week in Spy News

Vlogger, Jyoti Malhotra
• The corporate espionage fight between Rippling and Deel again has escalated, and this time appears to involve a third HR software "unicorn." more

• Netherlands expands espionage laws to include cyber activities more

• After vlogger arrest, Haryana says more YouTube channels under espionage scanner more & more & more

• Russia’s intelligence services turned Brazil into an assembly line for deep-cover operatives. A team of federal agents from the South American country has been quietly dismantling it. more

• Why seduction is the weapon of choice in spying more

• Corrections sergeant accused of voyeurism - accused of putting a camera inside a shampoo bottle more

• Sen. Steinhardt sounds alarm after spy tech found in Chinese solar inverters more

• Bartender arrested for hidden cameras in restaurant bathroom, home more

• FBI Director Kash Patel Abruptly Closes Internal Watchdog Office Overseeing Surveillance Compliance more

• Researchers warn of China-backed espionage campaign targeting laid-off US workers more

• What China's spies are doing in the U.S., and what happens when they're caught more (CBS 60 Minutes)

• CIA Gadget-Maker Rates 11 Spy Gadgets In Movies And TV video

The Cold War Spy Technology Which We All Use

From: The Thing (aka The Great Seal Bug), to RFID cardkeys and tap-to-pay credit cards.

Moscow, 4 August, 1945. The European chapter of World War Two was over, and the US and the USSR were pondering their future relationship. 

At the American embassy, a group of boys from the Young Pioneer Organization of the Soviet Union made a charming gesture of friendship between the two superpowers. 

They presented a large, hand-carved ceremonial seal of the United States of America to Averell Harriman, the US ambassador. It was later to become known simply as The Thing. 

Naturally, Harriman's office would have checked the heavy wooden ornament for electronic bugs, but with neither wires nor batteries in evidence, what harm could it do? more & much more

GPS Trackers: Under Cover & Under the Hood

If you are inspecting you vehicle for covert GPS trackers do not overlook these.

They are disguised to look like legitimate vehicle parts.

You can view all 38 photos here.

"Take it Down" Law Signed - Thank Nancy Mace

Rep. Nancy Mace (R-SC) shared photos of her “naked silhouette” on Capitol Hill Tuesday, alleging that they were taken without her consent by her ex-fiance.

“Freedom is not a theory. It is the right to breathe. It is the right to dress and undress, to sleep without someone’s camera filming your naked body,” the congresswoman said during a House Oversight Committee hearing. “The Founders wrote liberty in parchment, but hidden cameras erase it in pixels.”

“I speak not just as a lawmaker, but as a survivor.” more

Take it Down law signed. more

A North Korean Agent Applied for a Job - A Halloween Question Tripped Him Up

The hiring team at Kraken, a U.S.-based crypto exchange, noticed immediately that something was off about “Steven Smith,” a would-be IT worker who applied for a software engineering job in early October. 

But it wasn’t until they compared Smith’s email to a list of those suspected to be part of a hacker group that their suspicions were confirmed: Smith was a North Korean operative.

Kraken could have just tossed the application. Instead, Kraken’s chief security officer, Nick Percoco, decided to take a closer look at Steven Smith...

The interview was scheduled for Halloween, a classic American holiday—especially for college students in New York—that Smith seemed to know nothing about.

“Watch out tonight because some people might be ringing your doorbell, kids with chain saws,” Percoco said, referring to the tradition of trick or treating. “What do you do when those people show up?” Smith shrugged and shook his head. “Nothing special,” he said. more

Find Out if Someone is Spying on Your Facebook Account

Unless you fly strictly under the radar, your Facebook account has valuable data about you—like who you speak with the most and what you talk about. It can also be a treasure trove of other personal details like your family members, close friends, and social plans.


You should be the only one to control your account. To ensure this, periodically verifying that everything’s secure is a wise idea...

On a PC
Meta buries this info in its account center. To go directly there, head to https://accountscenter.facebook.com/password_and_security/login_activity
You can also navigate there manually:
  • Open the Facebook website in your browser
  • Click on your profile icon at the top right of the window
  • Choose Settings & privacy
  • Select Settings
  • Under Accounts Center in the upper left, click on See more in Accounts Center
  • Choose Password and security
  • Under Security checks, click on Where you’re logged in
A pop-up will appear with a box showing your name and the device you’re currently using, plus a small number showing the other devices logged in. more

Going Away This Holiday Weekend? Hide Your Stuff

Caught on camera: Jet Ski stolen in broad daylight from Amityville driveway. (Oh, the horror!)

A bold thief made off with a $25,000 Jet Ski in broad daylight Wednesday, and the crime was caught on doorbell camera.
Chris Montalbano, the homeowner and victim, said he was stunned by how quickly and confidently the theft unfolded. “Pretty brazen, didn’t seem like they cared,” Montalbano said. “I believe it was a guy — had his hood on. Just real quick. They knew what they were doing.” 

Montalbano noted that the surveillance cameras mounted above his garage mysteriously went dark during the theft. He suspects the thief may have used a signal-jamming device to disable the system. more

This is not an isolated incident. There have been many stories recently about thefts and break-ins being aided by the jamming of wireless security cameras. If you are going away consider placing several covert cameras, with internal video storage within your home and looking outside from windows. They are inexpensive. Some are listed here.

Enjoy the Long Weekend: CIA Officers Reveal Their Top Spy Movies

SPYSCAPE asked real-life CIA officers to pick their all-time favorite spy movies and we’ve got the low-down on 15 of the most realistic and entertaining films of the espionage genre. 

Here are the SPYEX team’s favorite flicks, chosen especially for SPYSCAPE readers! more

1. A Most Wanted Man (2014)

2. Tinker Tailor Soldier Spy (2011)

3. Red Joan (2018)

4. The Little Drummer Girl (1984)‍

5. Argo (2012)

6. Syriana (2005)

7. The Good Shepherd (2006)

8. The Hunt for Red October (1990)

9. Spy (2015)‍

10. Three Days of the Condor (1975)

11. North by Northwest (1959)

12. The Spy Who Came In From the Cold (1965)‍

13. The Amateur (1982)

14. Ill Met By Moonlight, aka Night Ambush (1957)

15. The Third Man (1949)

Wednesday, May 7, 2025

Vatican to Deactivate Mobile Phone Signals

All mobile phone signals will be deactivated in the Vatican today (7) ahead of the highly secretive conclave to elect the next pope, Italian State media reported.

The Vatican also plans to use signal jammers around the Sistine Chapel to prevent electronic surveillance or communication outside the Conclave that will see 133 Cardinals vote on who will succeed Pope Francis and lead the world’s 1.4 billion Catholics, Italian news agency ANSA reported.

Phone signal will be cut off at 3.00 pm local time (9.00 am ET) today, an hour and a half before the Cardinals are scheduled to proceed to the Sistine Chapel to begin the papal conclave, Italian state broadcaster RAI reported on Monday. more
So get down without your phone,
Comfort knowing you're not alone,
Bow your head with great respect,
And disconnect, disconnect, disconnect!