A new report by a U.S. government panel has called for staff members of Chinese state-run media groups in the U.S. to be made to register as foreign agents.
The U.S. China Economic and Security Review Commission alleged Wednesday that journalists at some Chinese media organizations engage in spying activities, feeding information back to the Chinese government.
The report comes just days after the production company behind the
American version of the Russian state-funded network RT officially filed
as a foreign agent following pressure from the Department of Justice. more
The concerns are justified. I've seen proof. ~Kevin
Monday, November 20, 2017
Wiretapper's "Suicide" - Update
Greek officials did not adequately investigate the death of a telephone company executive found hanging in his apartment a day before lawmakers and the prime minister learned their cellphones had been tapped, the European Court of Human Rights ruled Thursday.
Costas Tsalikidis, a Vodafone Greece executive, was found hanging in his Athens apartment...
An investigation into the wiretaps revealed another telecom had planted spyware into Vodafone’s equipment, and that Tsalikidis had allowed the spyware’s placement and met regularly with the other telecom. The wiretaps went live in June 2004 and were removed a day before Tsalikidis’ death.
Tsalikidis’ family refused to accept the man had taken his own life and hired their own investigators, who uncovered several inconsistencies to the suicide theory.
After years of investigating, the Greek government issued an international arrest warrant for a CIA official they believe was at the heart of the wiretapping affair while he was stationed in Athens. more
Remember The Fugs?
Costas Tsalikidis, a Vodafone Greece executive, was found hanging in his Athens apartment...An investigation into the wiretaps revealed another telecom had planted spyware into Vodafone’s equipment, and that Tsalikidis had allowed the spyware’s placement and met regularly with the other telecom. The wiretaps went live in June 2004 and were removed a day before Tsalikidis’ death.
Tsalikidis’ family refused to accept the man had taken his own life and hired their own investigators, who uncovered several inconsistencies to the suicide theory.
- a lack of injuries common during hanging, contradictions as to the rope marks on Tsalikidis’ neck,
- and an extremely complex sailing knot used for the noose that would have been quite impossible given Tsalikidis’ complete lack of sailing experience...
- Tsalikidis’ hyoid bone was broken – an indication he’d been strangled.
- Tsalikidis’ personality was not compatible with a suicide profile...
After years of investigating, the Greek government issued an international arrest warrant for a CIA official they believe was at the heart of the wiretapping affair while he was stationed in Athens. more
Remember The Fugs?
Quote of the Week – Bob Woodward on J. Edgar Hoover
"FBI director J. Edgar Hoover didn’t object to Nixon’s wiretapping because it was illegal, he objected because wiretapping was his job!" — legendary journalist Bob Woodward, who spoke Thursday night to a packed house at the University of Utah’s Kingsbury Hall.
Saturday, November 18, 2017
Corporate Espionage: Spies Have a Deep Black Bag of Tricks
A Toronto-based private equity firm is alleging that its employees were targeted in a covert corporate espionage operation involving an agency with operations in London, Paris and Tel Aviv staffed by former members of the Israeli Defense Force and former agents of intelligence agency Mossad.
The agency cited in court documents filed by West Face Capital Inc. is Black Cube, the same one reportedly retained on behalf of former Hollywood mogul Harvey Weinstein to investigate women who had accused him of sexual misconduct...
Some, including the former general counsel of West Face, were wined and dined, and flown to England on the false pretense that they were being courted for employment with international companies, the court documents allege...
The court documents filed by West Face Wednesday say different approaches were used for each employee or former employee approached, but that there were common elements, including “using false businesses, websites, identities, LinkedIn profiles, and business cards.” more
The agency cited in court documents filed by West Face Capital Inc. is Black Cube, the same one reportedly retained on behalf of former Hollywood mogul Harvey Weinstein to investigate women who had accused him of sexual misconduct...Some, including the former general counsel of West Face, were wined and dined, and flown to England on the false pretense that they were being courted for employment with international companies, the court documents allege...
The court documents filed by West Face Wednesday say different approaches were used for each employee or former employee approached, but that there were common elements, including “using false businesses, websites, identities, LinkedIn profiles, and business cards.” more
Wiretapper's "Suicide" Revisited for Foul Play
An appeals court prosecutor in Athens has asked to see the case file concerning the death of a telecoms engineer in 2005 shortly before the outbreak of a scandal involving the wiretapping of Greece’s political leadership...
The decision to revisit the case came after the European Court of Human Rights (ECHR) deemed on Thursday that Greece had failed to fully investigate the circumstances surrounding the death of former Vodafone employee Costas Tsalikidis, 38, who was found hanged in his apartment.
The investigating prosecutor at the time, Ioannis Diotis, had ruled out foul play, concluding that Tsalikidis had committed suicide.
Tsalikidis’s death occurred the day after the spyware planted in Vodafone’s network was removed...
The spyware diverted phone conversations made by Vodafone’s subscribers to 14 “shadow” pay-as-you-go mobile phones, allowing calls to be monitored. more sing-a-long
The decision to revisit the case came after the European Court of Human Rights (ECHR) deemed on Thursday that Greece had failed to fully investigate the circumstances surrounding the death of former Vodafone employee Costas Tsalikidis, 38, who was found hanged in his apartment. The investigating prosecutor at the time, Ioannis Diotis, had ruled out foul play, concluding that Tsalikidis had committed suicide.
Tsalikidis’s death occurred the day after the spyware planted in Vodafone’s network was removed...
The spyware diverted phone conversations made by Vodafone’s subscribers to 14 “shadow” pay-as-you-go mobile phones, allowing calls to be monitored. more sing-a-long
Spy Store Helps You Be Big Brother
You're not paranoid: Someone may be watching you. Friday's opening of Spysite.com's first New Jersey store, on Route 23, is the proof.
The new location specializes in covert surveillance. Got an overbearing boss? They'll sell you a pen that will secretly record him. Suspect your neighbors are stealing your packages? Owner Grant Huber can sell you a camera and tell you where to hide it so no one suspects...
Employees will show buyers how to use all the gadgets they sell. more
Fun fact: Radio Shack employees were not allowed to instruct customers how to spy using their merchandise. For the answer as to why, click here. ~Kevin
The new location specializes in covert surveillance. Got an overbearing boss? They'll sell you a pen that will secretly record him. Suspect your neighbors are stealing your packages? Owner Grant Huber can sell you a camera and tell you where to hide it so no one suspects... Employees will show buyers how to use all the gadgets they sell. more
Fun fact: Radio Shack employees were not allowed to instruct customers how to spy using their merchandise. For the answer as to why, click here. ~Kevin
Germany to Parents - Destroy Your Child's Smartwatch
Germany's regulatory arm for electricity, gas, telecommunications, post, and railway markets, has issued a ban on smartwatches designed for children over concerns that they can be used by parents to spy on their kids and teachers.
Furthermore, the regulatory office is urging parents to go a step further and physically destroy these smartwatches, should their children own one. The agency has also taken action against several firms that offer smartwatches designed for children.
"Via an app, parents can use such children's watches to listen unnoticed to the child's environment and they are to be regarded as an authorized transmitting system," said Jochen Homann, president of the Federal Network Agency. "According to our research, parents' watches are also used to listen to teachers in the classroom." more
Furthermore, the regulatory office is urging parents to go a step further and physically destroy these smartwatches, should their children own one. The agency has also taken action against several firms that offer smartwatches designed for children."Via an app, parents can use such children's watches to listen unnoticed to the child's environment and they are to be regarded as an authorized transmitting system," said Jochen Homann, president of the Federal Network Agency. "According to our research, parents' watches are also used to listen to teachers in the classroom." more
Wednesday, November 15, 2017
TSCM Security Tip: Check Hotel Ownership
Many hotels, conference centers and resorts are controlled or owned by governments engaging in business espionage. Checking the ownership before
booking your off-site meetings and general business travel can significantly reduce your risk of electronic surveillance.
From a New York Times article, Foiling Cyberspies on Business Trips...
Evan Anderson, chief executive of Invnt/IP, a group dedicated to combating nation-sponsored intellectual property theft...said he created a map of Chinese-owned hotels around the world in 2016 and was surprised by how many they were, including some in Silicon Valley where technology companies hold meetings. “Most people don’t realize that an individual Four Seasons hotel, Ritz-Carlton, or many other brands can be owned by a Chinese company with close ties to the Chinese government,” he said.
---
Checking venue ownership is the first step to reducing the risk of intellectual property theft. The second step is hiring a Technical Surveillance Countermeasures (TSCM) specialist. They will search for all types of electronic surveillance (i.e., audio bugging, video voyeurism, and data cybersecurity), before and during your stay.
Security directors from Fortune 1000 companies are invited to receive my free Off-Site Meeting Security Checklist — 25 recommendations / 5-page report. ~Kevin
![]() |
| Click for interactive map. |
Evan Anderson, chief executive of Invnt/IP, a group dedicated to combating nation-sponsored intellectual property theft...said he created a map of Chinese-owned hotels around the world in 2016 and was surprised by how many they were, including some in Silicon Valley where technology companies hold meetings. “Most people don’t realize that an individual Four Seasons hotel, Ritz-Carlton, or many other brands can be owned by a Chinese company with close ties to the Chinese government,” he said.
---
Checking venue ownership is the first step to reducing the risk of intellectual property theft. The second step is hiring a Technical Surveillance Countermeasures (TSCM) specialist. They will search for all types of electronic surveillance (i.e., audio bugging, video voyeurism, and data cybersecurity), before and during your stay.
Security directors from Fortune 1000 companies are invited to receive my free Off-Site Meeting Security Checklist — 25 recommendations / 5-page report. ~Kevin
Tuesday, November 14, 2017
Sports Espionage: Honduras Accuses Australia of Spying by Drone
Honduras accused Australia of spying on their training sessions with a drone on Monday, as tensions heated up ahead of Wednesday's decisive World Cup playoff match.
The Honduran National Football Federation (FENAFUTH) posed 18 seconds of footage of a drone flying above Sydney's Olympic Stadium, where the team trained on Monday after their long flight from central America.
"Australia spied on Honduras's official training session from a drone, causing discomfort among the Honduran team and delegation," FENAFUTH said on its Twitter feed. more
The Honduran National Football Federation (FENAFUTH) posed 18 seconds of footage of a drone flying above Sydney's Olympic Stadium, where the team trained on Monday after their long flight from central America.
"Australia spied on Honduras's official training session from a drone, causing discomfort among the Honduran team and delegation," FENAFUTH said on its Twitter feed. more
Industrial Espionage “can be done cheaply and at scale”
The admonitions to business travelers headed to other countries should be familiar by now: Keep your laptop with you at all times. Stay off public Wi-Fi networks. Don’t send unencrypted files over the internet...
“There’s a difficult intersection between convenience and security,” said Samantha Ravich, who studies cyber-enabled economic warfare at the Foundation for Defense of Democracies, a policy institute focusing on national security...
The problem of intellectual property theft is not new, but it is now much more widespread. “Placing listening devices in conference rooms, hotels and restaurants is traditional Espionage 101,” Ms. Ravich said. But with tools like tiny inexpensive cameras and microphones or compromised Wi-Fi networks, corporate or state-sponsored industrial espionage “can be done cheaply and at scale,” she said. more
“There’s a difficult intersection between convenience and security,” said Samantha Ravich, who studies cyber-enabled economic warfare at the Foundation for Defense of Democracies, a policy institute focusing on national security...
The problem of intellectual property theft is not new, but it is now much more widespread. “Placing listening devices in conference rooms, hotels and restaurants is traditional Espionage 101,” Ms. Ravich said. But with tools like tiny inexpensive cameras and microphones or compromised Wi-Fi networks, corporate or state-sponsored industrial espionage “can be done cheaply and at scale,” she said. more
Monday, November 13, 2017
How Pinkerton laid the foundation for the CIA and FBI
Allan Pinkerton, the grandaddy of American private eyes, has a “true detective” story made for the binge-watch era.
The organized investigation of suspicious behaviors has evolved in two directions. One is in the case of detective work, dealing with activities that endanger individual citizens. The other, integrally linked avenue is in intelligence, investigating threats to the state.
Flowing out of the same font, the modern incarnation of these entwined investigative avenues are largely the creation of two people.
In Europe, Eugene-Francois Vidocq may be considered the godfather of the former criminal turned secret agent who is largely responsible for the development of the modern, entwined arts of intelligence-gathering and criminal investigation. But stateside, his parallel, no less influential, was Lincoln’s spy master during the Civil War, Allan Pinkerton.
Born to an impoverished family in Glasgow in 1819... more
![]() |
| Pinkerton (left). Restored image. Click to enlarge. |
Flowing out of the same font, the modern incarnation of these entwined investigative avenues are largely the creation of two people.
In Europe, Eugene-Francois Vidocq may be considered the godfather of the former criminal turned secret agent who is largely responsible for the development of the modern, entwined arts of intelligence-gathering and criminal investigation. But stateside, his parallel, no less influential, was Lincoln’s spy master during the Civil War, Allan Pinkerton.
Born to an impoverished family in Glasgow in 1819... more
Saturday, November 11, 2017
Takeaway: Don't Spy on Your Girlfriend's Affair
MI - A 43-year-old man was shot Friday while spying on a woman as she had an affair on Detroit's west side, police said. The man was spying on the 28-year-old woman around 2:20 a.m. in the 12000 block of Winthrop Street when she got caught having an affair, according to officials.
Police said when the man tapped on the window, the woman opened the window and fired shots. The man was shot in the arm, police said. He drove himself about two miles to the 8500 block of Lauder Street, where he called police. more
Police said when the man tapped on the window, the woman opened the window and fired shots. The man was shot in the arm, police said. He drove himself about two miles to the 8500 block of Lauder Street, where he called police. more
Friday, November 10, 2017
Economic Espionage: Web of Brain Sucking Spiders
For Lt. Gen. Paul Nakasone, USA, commanding general, U.S. Army Cyber Command, one important perspective “is that our adversaries are antagonists,” he said. “Their capabilities are ever increasing.”
At first it was exploitation of data, then disruption and after that destruction. Before it was attacks on networks or a series of networks, now it also is data and critical infrastructure and key resources.
"I think that we are starting to see the trailers [preview] of the future war," Gen. Nakasone warned. Actors that the United States has not thought of, non-nation states, anonymous, proxy adversaries, will have an impact as antagonists against countries, the general predicted. They are not only going after military networks, they are going after the economic might of that nation. “They are going after the key terrain that they know is fundamental to how a country operates.” more
At first it was exploitation of data, then disruption and after that destruction. Before it was attacks on networks or a series of networks, now it also is data and critical infrastructure and key resources. "I think that we are starting to see the trailers [preview] of the future war," Gen. Nakasone warned. Actors that the United States has not thought of, non-nation states, anonymous, proxy adversaries, will have an impact as antagonists against countries, the general predicted. They are not only going after military networks, they are going after the economic might of that nation. “They are going after the key terrain that they know is fundamental to how a country operates.” more
Suspended Sentence for Swiss Spy Snooping
Rarely has a spy case attracted as much attention in Germany as that of Daniel M. The bungling double agent passed on troves of bank data to German tax officials while allegedly gathering info on them for the Swiss.
A German court has handed a suspended sentence of one year and 10 months to the former Zurich police detective for spying on the German state of North Rhine-Westphalia's (NRW) tax authority and some of its staff for nearly four years up to February 2015.
The regional court in Germany's financial capital, Frankfurt, also slapped a fine of €25,000 ($29,000) on the 54-year-old Swiss double agent. more
A German court has handed a suspended sentence of one year and 10 months to the former Zurich police detective for spying on the German state of North Rhine-Westphalia's (NRW) tax authority and some of its staff for nearly four years up to February 2015.
The regional court in Germany's financial capital, Frankfurt, also slapped a fine of €25,000 ($29,000) on the 54-year-old Swiss double agent. more
Thursday, November 9, 2017
Former Governor Wanted Wife Arrested for Eavesdropping
AL - The former director of the Alabama Law Enforcement Agency (Spencer Collier) said former Governor Robert Bentley wanted to know why his wife, Dianne shouldn't be arrested after he discovered she had been secretly recording his conversations with the aide suspected of being his mistress.
Collier said, "Once I become confident that Ms. Dianne was responsible for recording him, I told him and ended the investigation.
He wanted to know why she couldn't be arrested for planting an eavesdropping device.
I explained that in my opinion, no [District Attorney] in AL or the [Attorney General] was willing to prosecute a wife for recording her spouse caught in the act of adultery... He became upset and stated that if she or anyone disseminated the information that he would demand that they be arrested." more
Collier said, "Once I become confident that Ms. Dianne was responsible for recording him, I told him and ended the investigation.He wanted to know why she couldn't be arrested for planting an eavesdropping device.
I explained that in my opinion, no [District Attorney] in AL or the [Attorney General] was willing to prosecute a wife for recording her spouse caught in the act of adultery... He became upset and stated that if she or anyone disseminated the information that he would demand that they be arrested." more
Eavesdropper: The coding mistake that may be in your phone.
A simple coding error made in hundreds of apps may have exposed as many as 180 million smartphone users to having their text messages and phone conversations intercepted by hackers, security researchers warned.

The warning comes from experts at the cybersecurity firm Appthority, who spotted an error plaguing as many as 685 mobile apps—including one used for secure communications by a federal law enforcement agency...
The issue, which has been dubbed Eavesdropper...
Eavesdropper is an especially troublesome problem for a number of reasons. First, most users are likely unaware of what API their mobile apps use to handle certain features like texts and calls so it is unlikely the average person would be able to spot if an app they are using is vulnerable. more

The warning comes from experts at the cybersecurity firm Appthority, who spotted an error plaguing as many as 685 mobile apps—including one used for secure communications by a federal law enforcement agency...
The issue, which has been dubbed Eavesdropper...
Eavesdropper is an especially troublesome problem for a number of reasons. First, most users are likely unaware of what API their mobile apps use to handle certain features like texts and calls so it is unlikely the average person would be able to spot if an app they are using is vulnerable. more
Labels:
#eavesdropping,
#hack,
Alert,
App,
cell phone,
cybersecurity
Wednesday, November 8, 2017
Attorney Suspended for 4 Years for Eavesdropping
The state Supreme Court has suspended a northern Indiana attorney for at least four years after finding that he eavesdropped on private conversations between homicide suspects and their attorneys when he was a deputy prosecutor.
The court's disciplinary commission recommended Robert Neary be disbarred. But the justices instead issued an order Monday prohibiting him from working as a lawyer for four years...
They found that when Neary was a LaPorte County deputy prosecutor, he committed attorney misconduct by listening to two homicide suspects' confidential attorney-client conversations in incidents in 2012 and 2014 involving an audio feed and a video recording made in a police interview room. more
The court's disciplinary commission recommended Robert Neary be disbarred. But the justices instead issued an order Monday prohibiting him from working as a lawyer for four years...They found that when Neary was a LaPorte County deputy prosecutor, he committed attorney misconduct by listening to two homicide suspects' confidential attorney-client conversations in incidents in 2012 and 2014 involving an audio feed and a video recording made in a police interview room. more
End-to-End Encryption App for Business Customers
End-to-end encrypted messaging app Wire has introduced a version of its service for business customers...
Wire CEO Alan Duric told ZDNet that the company had 300 firms on the
Teams pilot and that businesses were using the service for their top
managers or M&A teams and issues like crisis communications.
Wire is also eyeing the Internet of Things, arguing that end-to-end encryption could be applied to messages to devices as well as chats with your colleagues.
"There is quite a bit of awareness that industrial espionage is not a myth and that they need to protect their data," he said. more
Wire CEO Alan Duric told ZDNet that the company had 300 firms on the
Teams pilot and that businesses were using the service for their top
managers or M&A teams and issues like crisis communications.Wire is also eyeing the Internet of Things, arguing that end-to-end encryption could be applied to messages to devices as well as chats with your colleagues.
"There is quite a bit of awareness that industrial espionage is not a myth and that they need to protect their data," he said. more
Sunday, November 5, 2017
Video Voyeur Drones Grab Headlines – Business Espionage Drones Don't
A growing number of women in Port Lincoln, South Australia, have reported being woken at night by a drone spying on them in their homes.
One woman was sleeping alone on her remote hobby farm when she was woken up by an object banging into her window, only to realize it was a drone with a camera attached.
Another woman told the ABC of the anxiety and panic she now experiences at night due to a similar encounter, saying, “You’ll hear a noise and even if it’s not a drone you just get paranoid…
Two of the victims no longer shower at night for fear of the drone capturing them while naked.
In May this year, a Sydney woman reported having been spied on by a drone while she was getting out of the shower.
These disturbing instances reflect the growing problem of the law being ill-equipped to deal with fast-developing technology, such as drones and revenge porn — with women constituting the largest proportion of victims to cyber-crimes. more
Spybusters Tip #519 - Video voyeur drones are headline grabbers. Business espionage drones go unnoticed.
If your office has a window, you have an information security vulnerability. One quick high resolution drone camera flyby and visible paperwork and whiteboard information is theirs.
Close curtains, or angle blinds downward when you leave. No curtains? Develop the "clear desk" habit. Then, contact us to make sure the place isn't bugged. ~Kevin
One woman was sleeping alone on her remote hobby farm when she was woken up by an object banging into her window, only to realize it was a drone with a camera attached.
Another woman told the ABC of the anxiety and panic she now experiences at night due to a similar encounter, saying, “You’ll hear a noise and even if it’s not a drone you just get paranoid…
Two of the victims no longer shower at night for fear of the drone capturing them while naked.
In May this year, a Sydney woman reported having been spied on by a drone while she was getting out of the shower.
These disturbing instances reflect the growing problem of the law being ill-equipped to deal with fast-developing technology, such as drones and revenge porn — with women constituting the largest proportion of victims to cyber-crimes. more
Spybusters Tip #519 - Video voyeur drones are headline grabbers. Business espionage drones go unnoticed. If your office has a window, you have an information security vulnerability. One quick high resolution drone camera flyby and visible paperwork and whiteboard information is theirs.
Close curtains, or angle blinds downward when you leave. No curtains? Develop the "clear desk" habit. Then, contact us to make sure the place isn't bugged. ~Kevin
Private Eye Charged with Illegally Spying on Politicians
FL - ...It was only after all three politicians discovered mysterious GPS
trackers under their vehicles
and turned them over to the Florida
Department of Law Enforcement that a criminal investigation began...Now, nearly a year after election day, the State Attorney’s Office has
charged Victor Elbeze with illegal tracking after FDLE agents found his
fingerprints on one of trackers...
Elbeze and his boss at the time, Steve Cohen, who owns the Hallandale Beach firm General Investigative Services, denied following any politicians...Cohen, a shadowy Russian national who recently changed his name from Stanislav Doudnik, refused to speak on camera and wouldn’t say who hired his firm, citing client confidentiality. But he said he never ordered Elbeze, who has left his employ, or anyone else to do anything illegal. more
Elbeze and his boss at the time, Steve Cohen, who owns the Hallandale Beach firm General Investigative Services, denied following any politicians...Cohen, a shadowy Russian national who recently changed his name from Stanislav Doudnik, refused to speak on camera and wouldn’t say who hired his firm, citing client confidentiality. But he said he never ordered Elbeze, who has left his employ, or anyone else to do anything illegal. more
Spycam Found at Condo Building - Florida Legislators Targeted
FL - For at least three days in the final week of the 2017 legislative session, a covert surveillance camera recorded the comings and goings of legislators and lobbyists living on the sixth floor of the Tennyson condominium near the Capitol.
Weeks later, in a dark parking lot of an Italian restaurant in Tallahassee, Sen. Jack Latvala of Clearwater, a Republican candidate for governor, was also being spied upon. Grainy photos show him standing and planting a kiss on the cheek, then the mouth, of a female lobbyist on the last night of the Legislature’s special session.
These weren’t routine smartphone photos captured for fun. They were the work of private investigators whose research has fueled an escalating barrage of rumors in the last week about sexual harassment in Tallahassee and infidelity among the state’s elected legislators.
Incoming Senate Democrat Leader Jeff Clemens of Lake Worth abruptly resigned Friday after admitting to an affair with a lobbyist. Politico Florida was the first to report on Tuesday that private investigators had documented at least four separate incidents involving Latvala dining with female lobbyists and that state law enforcement officers investigated the covert camera at the Tennyson. more
![]() |
| Click to enlarge. |
These weren’t routine smartphone photos captured for fun. They were the work of private investigators whose research has fueled an escalating barrage of rumors in the last week about sexual harassment in Tallahassee and infidelity among the state’s elected legislators.
Incoming Senate Democrat Leader Jeff Clemens of Lake Worth abruptly resigned Friday after admitting to an affair with a lobbyist. Politico Florida was the first to report on Tuesday that private investigators had documented at least four separate incidents involving Latvala dining with female lobbyists and that state law enforcement officers investigated the covert camera at the Tennyson. more
The Secret Shoe, or The Bonded Sole
(via maxim.com)
We're not suggesting that you infiltrate an enemy's ranks to take down a hostile foreign power, but if you ever want to dabble in some international espionage, have we got the shoe for you.
A dressy Derby Shoe made from fine deerskin may seem less critical than a working knowledge of close quarters combat or Russian. Still, "The Secret Shoe" from Oliver Sweeney is here to satisfy all your covert spy needs... and then some.
The luxury footwear provider teamed with VeryFirstTo.com to stash inside this unsuspecting-looking shoe two hidden compartments that can each hold three gadgets at a time.
Derby Shoe has provided 12 for you to pick from: the world's smallest phone, a tiny video camera, a mini Swiss army knife, a tracking device, a money capsule, "the world's most advanced contactless payment ring" and more.
There's also room for a house key.
Another badass feature you'll make use of if you're ever zip-tied and about to be tossed off a helicopter (there's a chance) is the laces. They're made of Kevlar, which means they can double as a friction saw that's strong enough to cut through wood and plastic. more
If your organization isn't picking up the tab for this, you'll probably be interested in the selling price. $1307.50
Still interested?
That's $1307.50
...per shoe. ~Kevin
We're not suggesting that you infiltrate an enemy's ranks to take down a hostile foreign power, but if you ever want to dabble in some international espionage, have we got the shoe for you.
A dressy Derby Shoe made from fine deerskin may seem less critical than a working knowledge of close quarters combat or Russian. Still, "The Secret Shoe" from Oliver Sweeney is here to satisfy all your covert spy needs... and then some.The luxury footwear provider teamed with VeryFirstTo.com to stash inside this unsuspecting-looking shoe two hidden compartments that can each hold three gadgets at a time.
Derby Shoe has provided 12 for you to pick from: the world's smallest phone, a tiny video camera, a mini Swiss army knife, a tracking device, a money capsule, "the world's most advanced contactless payment ring" and more.
There's also room for a house key.
![]() |
| Click to enlarge. |
Another badass feature you'll make use of if you're ever zip-tied and about to be tossed off a helicopter (there's a chance) is the laces. They're made of Kevlar, which means they can double as a friction saw that's strong enough to cut through wood and plastic. more
If your organization isn't picking up the tab for this, you'll probably be interested in the selling price. $1307.50
Still interested?
That's $1307.50
...per shoe. ~Kevin
Tuesday, October 31, 2017
Not So Covert Video Cam Sunglasses
Today is probably the only day a spy could get away with these...
![]() |
| Dorkier than Google Glass? You decide. more |
TSCM Alert - Keylogger Used to Hack School Grades
Former University of Iowa student Trevor Graves was arrested last week and charged...with hacking into the school's system to change grades.
...Graves allegedly attached a keylogger to several university computers in order to compromise faculty, staff and student information. In January 2017 the scheme was identified when a keylogger was discovered and reported by a staff member...
The school estimated that about 250 people had their HawkID and password stolen.
The court documents state that Graves allegedly used the information taken to escalate his privileges within the school's computer system enabling him to change grades, an ability given only instructors. more
This school was lucky. They discovered the spying device almost by accident.
Most electronic surveillance and subsequent information loss is never discovered, because... "If you don't look, you don't find."
Technical Surveillance Countermeasures (TSCM) inspections are not just about finding bugs and wiretaps. These exams also discover keyloggers, optical surveillance (spycams) and other methods of information loss.
Periodic TSCM exams are as vital to an organization's health as medical exams are to people. Think about that for a second... both can spot a cancer while it can still be cured.
Need a TSCM exam, or a local referral? Contact me. ~Kevin
...Graves allegedly attached a keylogger to several university computers in order to compromise faculty, staff and student information. In January 2017 the scheme was identified when a keylogger was discovered and reported by a staff member...
The school estimated that about 250 people had their HawkID and password stolen.
The court documents state that Graves allegedly used the information taken to escalate his privileges within the school's computer system enabling him to change grades, an ability given only instructors. more
This school was lucky. They discovered the spying device almost by accident.
Most electronic surveillance and subsequent information loss is never discovered, because... "If you don't look, you don't find."
![]() |
| Typical keystroke logger attached to keyboard cable. |
Periodic TSCM exams are as vital to an organization's health as medical exams are to people. Think about that for a second... both can spot a cancer while it can still be cured.
Need a TSCM exam, or a local referral? Contact me. ~Kevin
Monday, October 30, 2017
USB Stick Security, or God Save the Queen
UK - Heathrow Airport officials have launched an internal investigation into how a USB memory stick containing the airport's security information was allegedly found on a London street...
The USB stick, which apparently held details such as the route which the Queen takes when using the airport and maps pin-pointing CCTV cameras and a network of tunnels and escape routes, was not given to police but instead was handed to a national newspaper, the Sunday Mirror.
The Sunday Mirror reported that an unemployed man said he was on the way to the library to search the internet for jobs when he found the USB stick in the leaves... he plugged the USB stick into a library computer a few days later and was amazed at what he found... more
Take away security tips...
• Encrypt information you put on a USB memory stick. Assume it will be lost or stolen.
• If you find a USB stick, don't plug it in. It may contain a virus. Dropping virus laden sticks in company parking lots is a simple spy trick.
The USB stick, which apparently held details such as the route which the Queen takes when using the airport and maps pin-pointing CCTV cameras and a network of tunnels and escape routes, was not given to police but instead was handed to a national newspaper, the Sunday Mirror.
The Sunday Mirror reported that an unemployed man said he was on the way to the library to search the internet for jobs when he found the USB stick in the leaves... he plugged the USB stick into a library computer a few days later and was amazed at what he found... more
Take away security tips...
• Encrypt information you put on a USB memory stick. Assume it will be lost or stolen.
• If you find a USB stick, don't plug it in. It may contain a virus. Dropping virus laden sticks in company parking lots is a simple spy trick.
Sunday, October 29, 2017
Cuba Bugged by US Allegations of Sonic Attacks
Could the mysterious “sonic attacks” allegedly waged against U.S. Embassy employees in Cuba really just be the sounds of very loud crickets and cicadas?
That’s what Cuban officials seemed to suggest Thursday in a half-hour prime-time television special titled “Alleged Sonic Attacks.”
The special broadcast was Cuban officials’ most detailed defense to date against U.S. accusations that American diplomats in Havana were subjected to mysterious sounds that left them with a variety of ailments -- including headaches, hearing problems and concussions. more
Odd that it only affected American and Canadian diplomats. ~Kevin
The special broadcast was Cuban officials’ most detailed defense to date against U.S. accusations that American diplomats in Havana were subjected to mysterious sounds that left them with a variety of ailments -- including headaches, hearing problems and concussions. more
Odd that it only affected American and Canadian diplomats. ~Kevin
When Amateurs Spy
Headline: Wedding crasher spying on ‘boyfriend’ sparks massive bridesmaids brawl: cops

Tip: Spy Rule #1 - Remain covert.
Want to know more?

Tip: Spy Rule #1 - Remain covert.
Want to know more?
Vacuum Cleaner Spy - Dishin' Your Dirt to a Pervert
Your vacuum cleaner can spy on you and send the video to hackers.
Sound like a science fiction horror story?
It's reality in 2017.
Researchers at CheckPoint... discovered that as a vulnerability in the LG SmartThinQ app that accompanies the firm's smart devices. As can be seen in the video below, by exploiting that weakness, the researchers were able to force an LG Hom-Bot smart vacuum cleaner to relay a video feed to them from its camera to them.
The vulnerability apparently emanated from how SmartThinQ handled authentication and authorization of users... - that is, the tickets that allow users to access the device's video feed.
What this means is that if you have a vulnerable app and use a Hom-Bot with it anyone who knows your username - which is typically your email address - could potentially access your device's video feed or other data from the device.
Furthermore, besides creating a problem for Hom-Bot, the vulnerability may affect other LG smart devices that connect to the same app.
LG has already fixed the vulnerability, so, if you have any LG smart device and use SmartThinQ, make sure to download the latest version (1.9.23). more
Sound like a science fiction horror story?
It's reality in 2017.
Researchers at CheckPoint... discovered that as a vulnerability in the LG SmartThinQ app that accompanies the firm's smart devices. As can be seen in the video below, by exploiting that weakness, the researchers were able to force an LG Hom-Bot smart vacuum cleaner to relay a video feed to them from its camera to them.
The vulnerability apparently emanated from how SmartThinQ handled authentication and authorization of users... - that is, the tickets that allow users to access the device's video feed.
What this means is that if you have a vulnerable app and use a Hom-Bot with it anyone who knows your username - which is typically your email address - could potentially access your device's video feed or other data from the device.
Furthermore, besides creating a problem for Hom-Bot, the vulnerability may affect other LG smart devices that connect to the same app.
LG has already fixed the vulnerability, so, if you have any LG smart device and use SmartThinQ, make sure to download the latest version (1.9.23). more
Labels:
#eavesdropping,
#hack,
#spycam,
cybersecurity,
IoT,
privacy,
product,
spybot
FutureWatch - Antenna-less Bugs - Easier to Hide
Antenna-less technology is based on replacing a complex and usually
customized antenna design with an off-the-shelf, standardized, miniature
component called antenna booster.
Being surface-mount and chip-like in
nature, the antenna booster fits seamlessly in an electronic printed
circuit board, the same way any other electronic component does, such as
a microprocessor, memory, amplifier, filter or switch.
It can be assembled with a conventional pick-and-place machine, making the design and manufacture of the next generation of IoT/mobile or wireless devices simpler, faster and more effective. more
![]() |
| The Ever Shrinking Antenna. |
It can be assembled with a conventional pick-and-place machine, making the design and manufacture of the next generation of IoT/mobile or wireless devices simpler, faster and more effective. more
Friday, October 27, 2017
Prolific Spy Camera Man Posts Videos Gets Caught
WI - A 28-year-old man is charged with surreptitiously filming women in various states of undress in three locations, including a Target changing room at the Fox River Mall.
Andrew R. Persen of Appleton was charged Monday with 10 counts of capturing an intimate representation without consent, five counts of invading privacy with a surveillance device and a single charge of posting a sexually explicit image without consent...
Besides Target, locations included his own bathroom and the bathroom and bedroom at a female friend's house, according to the criminal complaint...
According to the criminal complaint:
The friend told police on Oct. 11 that her friend had found a nude video of her on a pornography website and she believed Persen had posted it without her consent. The video was posted around June of this year and the website indicated it had hundreds of public views.
She said the username the video was posted under was one that Persen commonly used on social media...
Police searched Persen's house on Oct. 20 and found "numerous" electronic storage devices.
He said that he had put hidden cameras in his friend's bedroom and bathroom in the spring and also in a Target dressing room. He also said he put a camera in his own shower to capture another woman.
Police found videos of the friend filmed at her home. Two detailed in the complaint clearly show him installing the cameras.
One video showed a woman using his shower.
Investigators also found 66 video files that appeared to show the inside of a changing room at Target. If the date and time display is correct, it appears the videos were recorded between 3:20 p.m. and 7:15 p.m. on April 6.
One video appears to show him setting up the camera in the changing room at 3:18 p.m. with his face clearly visible. more
Unfortunately, this type of story appears in the news several times per week. And... these are the failures; this is the tip of all video voyeur activity.
You should really learn how to detect spycams, and then teach your family and friends how to do it as well. It's really simple, once you know how.
Andrew R. Persen of Appleton was charged Monday with 10 counts of capturing an intimate representation without consent, five counts of invading privacy with a surveillance device and a single charge of posting a sexually explicit image without consent...
Besides Target, locations included his own bathroom and the bathroom and bedroom at a female friend's house, according to the criminal complaint...
According to the criminal complaint:
The friend told police on Oct. 11 that her friend had found a nude video of her on a pornography website and she believed Persen had posted it without her consent. The video was posted around June of this year and the website indicated it had hundreds of public views.
She said the username the video was posted under was one that Persen commonly used on social media...
![]() |
| Typical Bathroom Spycam Enclosures — Look for the pinhole. |
He said that he had put hidden cameras in his friend's bedroom and bathroom in the spring and also in a Target dressing room. He also said he put a camera in his own shower to capture another woman.
Police found videos of the friend filmed at her home. Two detailed in the complaint clearly show him installing the cameras.
One video showed a woman using his shower.
Investigators also found 66 video files that appeared to show the inside of a changing room at Target. If the date and time display is correct, it appears the videos were recorded between 3:20 p.m. and 7:15 p.m. on April 6.
One video appears to show him setting up the camera in the changing room at 3:18 p.m. with his face clearly visible. more
Unfortunately, this type of story appears in the news several times per week. And... these are the failures; this is the tip of all video voyeur activity.
You should really learn how to detect spycams, and then teach your family and friends how to do it as well. It's really simple, once you know how.
Tuesday, October 24, 2017
TSCM News - Professional Spybusters in Demand for Bug-Sweeping
In the trade it is known as TSCM but everyone else calls it bug-sweeping. It is not cockroaches that these pest controllers are hunting but eavesdropping devices that could be hidden anywhere from a mobile phone to the cable in the back of a computer.
Demand for the services of professional technical surveillance countermeasures specialists has grown dramatically along with public awareness of the dangers. Britain’s professional spy catchers have never been busier as businesses and wealthy individuals realise that they are being watched and listened to.
According to James Williams, director of the TSCM Institute, the only professional body covering the emerging industry, “eavesdropping is on the increase” as the number of devices and ways to bug people have multiplied. more
If you are looking for a reliable firm (many are not), contact me for a referral in your area. ~Kevin
Demand for the services of professional technical surveillance countermeasures specialists has grown dramatically along with public awareness of the dangers. Britain’s professional spy catchers have never been busier as businesses and wealthy individuals realise that they are being watched and listened to. According to James Williams, director of the TSCM Institute, the only professional body covering the emerging industry, “eavesdropping is on the increase” as the number of devices and ways to bug people have multiplied. more
If you are looking for a reliable firm (many are not), contact me for a referral in your area. ~Kevin
Corporate Espionage Fail - WeWork Staffers Caught
NYC - The battle in the red-hot co-working space business is heating up.
WeWork, the No. 1 player in the sector, allegedly sent two spies to infiltrate rival Knotel — to steal info and some customers, Knotel claimed.
The spies showed up at seven Knotel properties in Manhattan last month in a “systematic attempt to pilfer Knotel’s proprietary information and trade secrets,” according to a cease-and-desist letter the smaller company sent to WeWork...
The corporate espionage rookies might have pulled off the caper — except, in a totally random happening, a Knotel employee recognized one of them as a friend of a friend, according to sources close to Knotel.
While the pair used fake names to gain entry, according to the letter, a call to the Knotel worker’s pal got the spy’s real name — and a couple of social media inquiries turned up the fact that he worked for rival WeWork, sources said. more
WeWork, the No. 1 player in the sector, allegedly sent two spies to infiltrate rival Knotel — to steal info and some customers, Knotel claimed.
The spies showed up at seven Knotel properties in Manhattan last month in a “systematic attempt to pilfer Knotel’s proprietary information and trade secrets,” according to a cease-and-desist letter the smaller company sent to WeWork...The corporate espionage rookies might have pulled off the caper — except, in a totally random happening, a Knotel employee recognized one of them as a friend of a friend, according to sources close to Knotel.
While the pair used fake names to gain entry, according to the letter, a call to the Knotel worker’s pal got the spy’s real name — and a couple of social media inquiries turned up the fact that he worked for rival WeWork, sources said. more
SPYSCAPE in NYC is Set to Open in December
A museum dedicated to spycraft is landing soon in possibly the least inconspicuous place on Earth: midtown Manhattan.
The project, known as SPYSCAPE, is set to open in New York City this December — but details are, fittingly, under wraps. Archimedia, the creative and investment company behind the project, has acquired a number of spy artifacts and archival materials, and will use immersive storytelling to explore history’s greatest spy affairs, from the Enigma code crackers to the teenage hacker behind a recent breach of the CIA website.
The museum's website hints at interactive interrogation rooms, laser tunnels, and more. At the end of the tour, visitors will learn what kind of spy work they’re destined for — allegedly based on a proprietary “profiling system” created by the Head of Training for British Intelligence.
The museum space was designed by Ghanaian-British architect David Adjaye’s New York City-based firm, Adjaye Associates, whose many high-profile projects include Washington, D.C.’s new National Museum of African American History and Culture. more
Can't wait? Cuba's Spy Museum in Havana is open. (Optional, but recommended.) ~Kevin
The project, known as SPYSCAPE, is set to open in New York City this December — but details are, fittingly, under wraps. Archimedia, the creative and investment company behind the project, has acquired a number of spy artifacts and archival materials, and will use immersive storytelling to explore history’s greatest spy affairs, from the Enigma code crackers to the teenage hacker behind a recent breach of the CIA website.The museum's website hints at interactive interrogation rooms, laser tunnels, and more. At the end of the tour, visitors will learn what kind of spy work they’re destined for — allegedly based on a proprietary “profiling system” created by the Head of Training for British Intelligence.
The museum space was designed by Ghanaian-British architect David Adjaye’s New York City-based firm, Adjaye Associates, whose many high-profile projects include Washington, D.C.’s new National Museum of African American History and Culture. more
Can't wait? Cuba's Spy Museum in Havana is open. (Optional, but recommended.) ~Kevin
Friday, October 20, 2017
Security Report: Kids Smartwatches Found to Act Like Bugs and Worse
The tests done by Mnemonic have uncovered critical security flaws in three of the apps and devices.
As detailed in Mnemonic's report, two of the devices have flaws which could allow a potential attacker to take control of the apps, thus gaining access to children's real-time and historical location and personal details, as well as even enabling them to contact the children directly, all without the parents’ knowledge.
Additionally, several of the devices transmit personal data to servers located in North America and East Asia, in some cases without any encryption in place.
One of the watches also functions as a listening device, allowing the parent or a stranger with some technical knowledge to audio monitor the surroundings of the child without any clear indication on the physical watch that this is taking place. more
As detailed in Mnemonic's report, two of the devices have flaws which could allow a potential attacker to take control of the apps, thus gaining access to children's real-time and historical location and personal details, as well as even enabling them to contact the children directly, all without the parents’ knowledge.
Additionally, several of the devices transmit personal data to servers located in North America and East Asia, in some cases without any encryption in place.One of the watches also functions as a listening device, allowing the parent or a stranger with some technical knowledge to audio monitor the surroundings of the child without any clear indication on the physical watch that this is taking place. more
Labels:
#eavesdropping,
#hack,
cell phone,
privacy,
product,
spybot
Thursday, October 19, 2017
FutureWatch: After 51 Years MasterCard Boots Signatures
Mastercard Inc. is doing away with a rule requiring merchants to get signatures for transactions made with its credit and debit cards in the United States and Canada.
Announced early Thursday, Mastercard’s rule change goes into effect April 13, 2018, allowing issuers, merchants, and processors time to make adjustments, though merchants can adopt the change sooner, Mastercard says. Mastercard also issued a bulletin about the matter Wednesday afternoon. The new rule does not affect interchange, and applies only to point-of-sale transactions.
A majority of consumers believe that it would be easier to pay and that checkout lines would move faster if they didn’t have to sign for purchases, Mastercard says. more
So, why drop a 51 year old signature security requirement?
Mastercard announced that it’s adding fingerprint scanners to its “next generation” cards in order to safely verify the cardholder’s identity whenever they’re making in-store purchases. more
Announced early Thursday, Mastercard’s rule change goes into effect April 13, 2018, allowing issuers, merchants, and processors time to make adjustments, though merchants can adopt the change sooner, Mastercard says. Mastercard also issued a bulletin about the matter Wednesday afternoon. The new rule does not affect interchange, and applies only to point-of-sale transactions.
A majority of consumers believe that it would be easier to pay and that checkout lines would move faster if they didn’t have to sign for purchases, Mastercard says. more
So, why drop a 51 year old signature security requirement?
Mastercard announced that it’s adding fingerprint scanners to its “next generation” cards in order to safely verify the cardholder’s identity whenever they’re making in-store purchases. more
Most of Your Employees are Snoops
A new survey of IT security professionals reveals that 92 percent of respondents say employees at their organizations try to access information that is not necessary for their day-to-day work.
The study from identity management company One Identity also shows that IT security professionals themselves are among the worst offenders for corporate data snooping. One in three respondents admit to having accessed sensitive information that is not necessary for their day-to-day work -- showing an ongoing abuse of elevated rights given to the IT security role.
More than one in three (36 percent) of IT pros admit to looking for or accessing sensitive information about their company’s performance, beyond what is required to do for their job. 71 percent of executives admit seeking out extraneous information, compared to 56 percent of non-manager-level IT security team members. Additionally, 45 percent of executives admit to snooping for or accessing sensitive company performance information specifically, compared to just 17 percent of non-manager team members.
In smaller companies the problem is worse... more
No surprise here. Over half of the eavesdropping and information loss issues crossing my path (over the last four decades) are employee related. ~Kevin
The study from identity management company One Identity also shows that IT security professionals themselves are among the worst offenders for corporate data snooping. One in three respondents admit to having accessed sensitive information that is not necessary for their day-to-day work -- showing an ongoing abuse of elevated rights given to the IT security role.
More than one in three (36 percent) of IT pros admit to looking for or accessing sensitive information about their company’s performance, beyond what is required to do for their job. 71 percent of executives admit seeking out extraneous information, compared to 56 percent of non-manager-level IT security team members. Additionally, 45 percent of executives admit to snooping for or accessing sensitive company performance information specifically, compared to just 17 percent of non-manager team members. In smaller companies the problem is worse... more
No surprise here. Over half of the eavesdropping and information loss issues crossing my path (over the last four decades) are employee related. ~Kevin
Spybuster Tip #712: How to Vacuum Your Amazon Breadcrumbs
Amazon automatically tracks the products you browse on the site and compiles a visual list on your account’s home page, in case you are inspired to follow through with a purchase on a return visit.
If you find this sort of thing more creepy than helpful — or you share a computer and would rather not have others see your shopping whims — you can disable the tracking.
To do that, go to Amazon.com and log into your account. Click the Browsing History link at the top of the main page (just below the search window) to see the recent items you previously viewed while clicking around on the site. At the top of the page, click Manage History. more
If you find this sort of thing more creepy than helpful — or you share a computer and would rather not have others see your shopping whims — you can disable the tracking.To do that, go to Amazon.com and log into your account. Click the Browsing History link at the top of the main page (just below the search window) to see the recent items you previously viewed while clicking around on the site. At the top of the page, click Manage History. more
Tuesday, October 17, 2017
Spike in Spy Camera Sales Online Causes Concern
Over a period of time, a sales engineer in Singapore amassed 280 obscene films, many of which depicted women in various stages of undress in public bathrooms and changing rooms.
The unsuspecting women, including schoolgirls, were filmed with secret cameras, and Joel Chew Weichen, 27, had collected the films for distribution.
Based on checks by The Straits Times, a worrying trend has emerged - the sale of such cameras is on the rise.
On online shopping platform Lazada, which has more than 600,000 hidden camera products available, sales of such cameras have grown 1.5 times this year compared with last year. The cameras come disguised as clocks, pens and even smoke detectors.
A spokesman said spy pens, which can cost about $12, are the most popular. Spectacles with built-in cameras may cost about $85...
Chew, who was sentenced to six months in jail this month, was the first of five individuals to plead guilty to having the obscene films for distribution.
He was also part of groups that share and download such videos.
The victims were secretly filmed while in bathrooms in cafes, schools, offices, changing rooms of popular fashion outlets, and bathroom showers in private homes. more
Note: An on-line spycam detection training course is available to organizations and individuals.
The unsuspecting women, including schoolgirls, were filmed with secret cameras, and Joel Chew Weichen, 27, had collected the films for distribution.
Based on checks by The Straits Times, a worrying trend has emerged - the sale of such cameras is on the rise.On online shopping platform Lazada, which has more than 600,000 hidden camera products available, sales of such cameras have grown 1.5 times this year compared with last year. The cameras come disguised as clocks, pens and even smoke detectors.
A spokesman said spy pens, which can cost about $12, are the most popular. Spectacles with built-in cameras may cost about $85...
Chew, who was sentenced to six months in jail this month, was the first of five individuals to plead guilty to having the obscene films for distribution.
He was also part of groups that share and download such videos.
The victims were secretly filmed while in bathrooms in cafes, schools, offices, changing rooms of popular fashion outlets, and bathroom showers in private homes. more
Note: An on-line spycam detection training course is available to organizations and individuals.
My Sister Bugged my Teddy Bear
Chicago - Nobody feuds like a rich family with lawyers on the payroll.
But even by the standards of the tony North Shore, the bitter courtroom battles between the children of the late property developer Aaron Israel stands out.
The Israel brothers — Harvey, Alan and David — have been fighting on and off in court with their sister, Diane, and their late father over the family fortune for 25 years.
Now David Israel is suing his sister for more than $1 million, alleging she hired a private eye who bugged his Northbrook office with a recording device hidden inside a teddy bear.
A recently filed federal complaint includes a photo of the scarf-wearing pink bear, which David says he received from a cancer charity. According to the lawsuit, David cut open the bear and found a listening device inside it after he was taunted by an anonymous text-messager who told him about his office being bugged and said there was “a big surprise” inside the bear.
The taunting text and other creepy anonymous messages (including one telling him “A bit hot to be wearing that shirt don’t you think David?”) were sent by a private eye hired by Diane, according to David’s lawsuit, which also alleges that a listening device was installed in a plant pot, and that his Highland Park home and Gold Coast condo were bugged along with his cars.
Though the private eye, Michael Bucon, in April pleaded guilty to planting the bugs, Diane denies the allegations and wants U.S. District Judge Andrea Wood to throw out the lawsuit... more
But even by the standards of the tony North Shore, the bitter courtroom battles between the children of the late property developer Aaron Israel stands out.
The Israel brothers — Harvey, Alan and David — have been fighting on and off in court with their sister, Diane, and their late father over the family fortune for 25 years.
Now David Israel is suing his sister for more than $1 million, alleging she hired a private eye who bugged his Northbrook office with a recording device hidden inside a teddy bear.A recently filed federal complaint includes a photo of the scarf-wearing pink bear, which David says he received from a cancer charity. According to the lawsuit, David cut open the bear and found a listening device inside it after he was taunted by an anonymous text-messager who told him about his office being bugged and said there was “a big surprise” inside the bear.
The taunting text and other creepy anonymous messages (including one telling him “A bit hot to be wearing that shirt don’t you think David?”) were sent by a private eye hired by Diane, according to David’s lawsuit, which also alleges that a listening device was installed in a plant pot, and that his Highland Park home and Gold Coast condo were bugged along with his cars.
Though the private eye, Michael Bucon, in April pleaded guilty to planting the bugs, Diane denies the allegations and wants U.S. District Judge Andrea Wood to throw out the lawsuit... more
How the All Blacks Bugging Story Ends
The security consultant who escaped conviction in a bugging case is reportedly back working with the All Blacks in Australia.
Adrian Gard, 52, was placed on a one-year good behaviour bond last month for breaching his security licence when organising a sweep of the Sydney hotel where the All Blacks were staying ahead of a test match against Australia in August of last year. more
Adrian Gard, 52, was placed on a one-year good behaviour bond last month for breaching his security licence when organising a sweep of the Sydney hotel where the All Blacks were staying ahead of a test match against Australia in August of last year. more
Monday, October 16, 2017
Wi-Fi Traffic Open to Eavesdropping
Researchers have disclosed a serious weakness in the WPA2 protocol that allows attackers within range of vulnerable device or access point to intercept passwords, e-mails, and other data presumed to be encrypted, and in some cases, to inject ransomware or other malicious content into a website a client is visiting...
The proof-of-concept exploit is called KRACK, short for Key Reinstallation Attacks. The research has been a closely guarded secret for weeks...
A website disclosing the vulnerability said it affects the core WPA2 protocol itself and is effective against devices running Android, Linux, and OpenBSD, and to a lesser extent macOS and Windows, as well as MediaTek Linksys, and other types of devices.
The site warned that attackers can exploit the flaw to decrypt a wealth of sensitive data that's normally encrypted by the nearly ubiquitous Wi-Fi encryption protocol. "This can be abused to steal sensitive information such as credit card numbers, passwords, chat messages, emails, photos, and so on," more
The proof-of-concept exploit is called KRACK, short for Key Reinstallation Attacks. The research has been a closely guarded secret for weeks...
A website disclosing the vulnerability said it affects the core WPA2 protocol itself and is effective against devices running Android, Linux, and OpenBSD, and to a lesser extent macOS and Windows, as well as MediaTek Linksys, and other types of devices.
The site warned that attackers can exploit the flaw to decrypt a wealth of sensitive data that's normally encrypted by the nearly ubiquitous Wi-Fi encryption protocol. "This can be abused to steal sensitive information such as credit card numbers, passwords, chat messages, emails, photos, and so on," more
Subscribe to:
Comments (Atom)












