Thursday, August 6, 2020

Stay Safe - Stay Feeling Good

This fun statement can be taken several ways...
• Anti Covid-19
I'm not feeling very social right now!
• A warning to spies that you are protected against electronic surveillance. 
Available here.

Want to know more about protecting your privacy?
Visit us at https://counterespionage.com

Recent Spycam News

FL - A Bradenton man was arrested July 24 for shooting video of a girl undressing in a beach changing station. more & more

FL - Justin Stueve is accused of rape and video voyeurism of his then-wife, who said she found a thumb drive full of explicit photos of herself. A judge has ruled that defense attorneys will be allowed to review photos allegedly taken by their client of his ex-wife while she was unconscious. more 

Japan - Police in Tokyo have arrested a 34-year-old man and his 35-year-old common-law wife on suspicion of extortion after they threatened a man that they would report him to police for taking upskirt videos of the woman unless he paid them money...The man agreed to pay 1.1 million yen in return for not being reported to the police. more

WA - Former Arlington Christian teacher charged with voyeurism. more

UT - Deputies arrest 26-year-old for suspected voyeurism after parents find him on roof. more

WA - Outlook man charged with voyeurism of 15-year-old girl. more

LA - A Bossier Parish school teacher...at Benton Elementary School faces 30 new charges...(including) 10 counts of video voyeurism. more

UK - Firm pursues damage claims for victims of disgraced doctor...Given the large number of images taken it is possible many women who saw Dr Altaii were covertly filmed yet remain unaware of that fact even today. more

S. Korea - South Korean singer A investigated for illegally filming women...A is suspected of secretly filming the bodies of several women, including sex scenes, using hidden cameras until early this year...South Korea is notorious for illegal filming crimes also known as molka crimes. more
(BTW - Spycam Detection Training now has Korean sub-titles.)

Canada - A suspended Mountie charged with sex crimes by two different police services across the country is alleged to have secretly filmed women 34 times inside the bathroom of his south Ottawa apartment, during sex and in hotel rooms. more

FL - Robert Privette, 49, was staying at the DoubleTree resort in Key West when he is alleged to have heard two women in the room next door returning from the beach. Privette is then said to have managed to slide a tiny spy camera surreptitiously under the door of the room in order to film the pair, aged 24 and 27, as they undressed after a day on the sands. more

AR - A 41-year-old man accused of secretly videotaping a female teenager with a hidden camera in a Bluetooth speaker is facing video voyeurism and child pornography charges. more

India - A man arrested for voyeurism jumped into the sea while being taken to the beach by the police to collect evidence on Wednesday. His hands were cuffed. His body is yet to be found. more

UK - A former presenter of BBC News...who has shifted his career from being a British TV news personality to evangelical preaching, said most of these offences were committed with children during the past 30 years...He also admitted to two counts of making explicit videos of children... more

UK - A man has admitted using a hidden camera to film people using the toilet in Bristol...Prosecutor May Li said Andrews was discovered when one of the victims noticed a green light above a doorway and saw it was a hidden camera. When she looked at what was in the memory card, she saw Andrews’ face in the footage. (Darwin Award) more

You too can find hidden spy cameras. more

Wednesday, August 5, 2020

Personal Alert: Home Sellers Eavesdropping on Buyers

You never want to reveal too much enthusiasm when home shopping. But now many are giving away their hand before they ever get inside. more

NSA Tells Mobile Users Beware of Find-My-Phone

Beware of find-my-phone, Wi-Fi, and Bluetooth, NSA tells mobile users

And don't forget to limit ad tracking. Advisory contains a host of recommendations.

The National Security Agency is recommending that some government workers and people generally concerned about privacy turn off find-my-phone, Wi-Fi, and Bluetooth whenever those services are not needed, as well as limit location data usage by apps.

“Location data can be extremely valuable and must be protected,” an advisory published on Tuesday stated. “It can reveal details about the number of users in a location, user and supply movements, daily routines (user and organizational), and can expose otherwise unknown associations between users and locations.” more

Tuesday, August 4, 2020

How to Hide from Drones in the Age of Surveillance

Drones of all sizes are being used by environmental advocates to monitor deforestation, by conservationists to track poachers, and by journalists and activists to document large protests. As a political sociologist who studies social movements and drones, I document a wide range of nonviolent and pro-social drone uses in my new book, “The Good Drone.” I show that these efforts have the potential to democratize surveillance...

...it’s time to think about how many eyes are in the sky and how to avoid unwanted aerial surveillance. One way that’s within reach of nearly everyone is learning how to simply disappear from view.

How to disappear
The first thing you can do to hide from a drone is to take advantage of the natural and built environment.  more tips 



Monday, August 3, 2020

Staffing Firm Alleges Corporate Espionage by Former Employees

NY - Two Southern Tier staffing agencies are locked in a bitter dispute alleging corporate espionage, payroll sabotage, the breaching of non-compete and non-disclosure agreements, and the hijacking of a company Facebook page.

In a 54-page filing with the Federal District Court in Northern District earlier this month, Adecco accuses the upstart Staffworks of raiding its Corning, Elmira, Utica and Syracuse staff to steal proprietary account information and using it to steal long-established business...
  • Former employees commandeered a Adecco Corning office Facebook page for their own use, renaming it and taking control of posts.
  • A former Adecco employee broke into locked office filing cabinets, drilling through locks, "to remove colleague personnel files and other Adecco documents containing confidential information." The employee contends she was only trying to obtain personal items from the locked cabinet.
  • Proprietary pricing information and profit margin details was emailed from internal email accounts to personnel accounts before Adecco cut off access.
  • Those named in the suit refused to return company laptops and mobile devices with critical and confidential client and company details.
  • In their last weeks of employment , three defendants sabotaged client relationships by failing to enter information into a payroll system, later using the foul-up as evidence that Adecco was "going downhill," in an attempt to land new clients. more
Note to Adecco: Time for a thorough TSCM inspection. (search for eavesdropping devices)

The Vatican Hack

State-sponsored hackers have reportedly targeted Vatican computer networks in an attempt to give China an advantage in negotiations to renew a provisional deal with the Holy See.

A report, released July 28, said that hackers may have used a counterfeit condolence message from Cardinal Pietro Parolin, the Vatican Secretary of State, to gain access to Vatican communications. more

Block TikTok, or Microsoft to the Rescue

U.S. Secretary of State, Mike Pompeo, claimed that TikTok sends user data to China, exerting pressure on the video-sharing social networking service. Pompeo brought attention to the fact that if personal information flows across a Chinese server, it will eventually end up in the hands of the Chinese Communist Party which he calls an “Evil Empire”.

TikTok has denied U.S. allegations but a report by cyber experts at ProtonMail says otherwise. The report is more a warning as it states – “Beware, the social media giant not only collects troves of personal data on you, but also cooperates with the CCP, extending China’s surveillance and censorship reach beyond its borders.” more

In other news...
Microsoft said Sunday it will continue talks to buy short-form video app, TikTok after its chief executive spoke with President Trump, following a weekend of uncertainty clouding the future of the Chinese-owned app. more

Connect the Dots...
When Microsoft bought Skype, Wired Magazine noted, "The Skype client itself is written almost as if it were a piece of malware, using complex obfuscation and anti-reverse engineering techniques, and it would be disquieting for Microsoft to release something that behaved in such a shady way; at the very least, the client would surely have to be rewritten to avoid the obfuscation and outright hostility to managed networks that Skype currently has... Ultimately, it's hard to see how the Skype purchase is worthwhile from a technology or user-access perspective. The technology isn't good enough and the users aren't lucrative enough or plentiful enough to justify it. more

Pure Conjecture Disguised as Analysis...
Microsoft already had Windows Live Messenger. Did it really need Skype? Skype you might recall was a predominately Estonian-based encrypted platform. It was giving governments fits worldwide. Then, in 2011, Microsoft bought it. Guess what happened.

TikTok, it appears, is also giving government fits. Who ya gonna call?

FutureWatch: Early (1930) Facetime Smartphone Calls

"This technology was predicted by many authors, futurists, and illustrators in the past. This one is one of the earliest illustrations on this subject; it was made in 1930. Again, the resemblance with a modern gadget that we all know as “smartphone” is uncanny." more

Friday, July 31, 2020

"The Name's Richard, not Roger"

Britain on Wednesday named its former ambassador to Turkey as the new director of the MI6 Secret Intelligence Service.

Richard Moore succeeds Alex Younger, who was a career intelligence officer and became Britain's top spy in 2014. moore

Thursday, July 30, 2020

The Little Bugger Spycam or Beetleloose


Scientists developed a teensy-tiny black-and-white camera that can comfortably be mounted on a live beetle—specifically a death-feigning beetle and a Pinacate beetle.

The device streamed photos and videos straight to an iPhone, depicting exactly what the beetle was staring at: from squirrels that look like hulking grizzly bears to a truck that looms like a mountain. They published their findings in Science Robotics last week.

The entire system weighs around a tenth of a playing card, uses minimal power, and keeps the frame pointed at where the bug looks by mimicking its steering mechanisms. more

GPS Tracker – World’s Smallest and More

A GPS tracker can be incredibly small. Once the size of bricks some can now fit on your finger.

New features have arrived, too. Some have…
  • SOS buttons
  • Audio eavesdropping capability
  • Integration with Google Maps
  • Speed reporting
  • Geo-fencing with automatic alerts
  • Disable vehicle
  • Updates every five seconds
  • Wireless recharging
  • Worldwide coverage
  • Bluetooth – for tracking the last few feet

Saturday, July 25, 2020

DHS Gives Federal Agencies 24 hours to Patch Critical Microsoft Windows Vulnerability

Our friend in cold country has a hot tip for you!
Thanks, Mike.

--------------------
If you’re running an externally facing Windows DNS server, it should be patched as soon as possible.  It’s probably a good idea to work this patch into your internal patch management cycle as well.

CVE-2020-1350

If your DNS is managed by an external IT firm, please feel free to forward this to them.
If you’re not sure, drop me an email or give me a call at (907) 354-4879 (cell).

Thanks,
-Mike.
---
Mike Messick
President, Deep Forest Security Consulting
PO Box 242334
Anchorage, AK. 99524-2334
(907) 334-9090 Office

Thursday, July 23, 2020

The World’s Smallest Voice Recorder?

Is this The World’s Smallest Voice Recorder?



Specifications
TileRec by ATTO Digital 
Ultra-small: ≈1.53”x1.53”x.02” (≈39 x 39 x 5 mm)
Record modes: Voice activated or continuous.
Storage capacity: 145 hours.
Format: 128 kbps CD Quality MP3.
Playback: Download files to any computer.
Battery “on time”: Up to 24 hours.
Battery charge time: 2 hours.
Housing: Sturdy aluminum case.
Operates with one on/off switch.
Cost: $59.80 Amazon

Voice recorders keep getting smaller and smaller. 

However, If smallest means thin to you, yes there is a thinner one, the Edic-mini Tiny16+ A75…
 1 mm thinner, 12 mm less wide, but double the length. And, at $345, six times the price. They also make one card-key sized (2.7 mm thin).

Edic-mini Tiny16+ Flat voice recorder 

If by smallest you mean really, really thin… You might want to consider the NAGRA Dollar Bill recorder that’s being marketed to law enforcement instead. Thirty-one times as expensive as the TileRec.
There are many slightly larger voice recorders that are still considered to be mini in size. Our search on eBay returned 1,809 results and over 2,000 on Amazon.

eBay Search Box for voice recorder 
The prices on eBay ranged from $1.45 (with free shipping from China!) to $2,000. for the Edic-mini Tiny+ B76-150HQ. The Edic-mini Tiny+ being closest in size to the TileRec.

A Voice Recorder Manufacturer Speaks

Jang Sung-Churl, chief executive of electronics firm Auto Jungbo Co. Ltd., told Reuters that covert recording devices “have been selling like hotcakes” …sales of voice recorders so far this year (2019) have doubled to 80 devices per day, Jang said as he forecast sales to also double this calendar year to 1.4 billion won ($1,172,289).

Think about it. That's almost 30,000 devices sold per year... before the expected doubling of sales. And, he is only one manufacturer. An educated guess is that there are thousands of manufacturers around the world.

Accessibility + Affordability = Big Concerns.

 

Who Cares About Voice Recorder Size?

Lots of folks, for many and varied reasons…
  • Sneaky people who want to eavesdrop.
  • Sneaky people who want to entrap others.
  • Anyone worried about covert surveillance.
  • Local law enforcement detectives and Private Investigators. They might not have the budget necessary for a covert NAGRA Dollar Bill Recorder, but have the smarts to slap a TileRec between two one-dollar bills.
  • Technical Surveillance Countermeasures (TSCM) Technicians whose job it is to find illegal, electronic surveillance devices.
It all boils down to these two things:
People hiding voice recorders, and… thwarting the people doing it.

 

Discovering Voice Recorders 

Since the offense has the advantage let’s concentrate on the defense.

The average covert voice recorder will either be carried by a person to record face to face conversations or it will be hidden within conversations-of-interest areas.

 

In-Person Recording Detection Tips

  • Since frisking is probably out of the question, assume you are being recorded.
 Even if you could frisk, results would be iffy; these voice recorders are tiny.
  • At the outset of a conversation ask the other person if they are recording you. Watch their reaction. Do they overly protest, or fake anger? 

If they say no but record anyway, the recording’s value can be challenged. They lied, so maybe they also faked, edited or doctored the recording.
  • Also… Be professional. If you would not say it in a courtroom, don’t say it.
Big Red Flag – When someone tries to recreate a previous conversation with you.

 

Covert Recording Detection Tips

  • Pay attention to your surroundings. Who has access and when? Voice recorders need to be retrieved: to review recordings and to recharge batteries.
  • Avoid using the same area for all your sensitive conversations. Use various and unpredictable locations if possible.
  • Conducting your own search for surveillance devices is futile. An experienced eavesdropper will plant one easy-to-find device. They know the search will stop at that point. The harder-to-find device and it’s back-up will still be on the job. Without proper training and instrumentation your success is unlikely.
  • 

For office and home office situations an independent Technical Surveillance Countermeasures (TSCM) sweep team should be employed. Have them conduct periodic due diligence debugging inspections. In addition to searching for room audio and video surveillance devices have them check your vehicles. Vehicle inspections also include a search for GPS tracking devices.

 

TileRec Voice Recorder Detection Test

 

Voice Recorder Detection Test 50% & 100% PowerTesting Our Defenses

Murray Associates conducted tests to determine the effectiveness of their detection techniques on mini voice recorders. 

TileRec was difficult–but not impossible–to detect compared to other recorders tested.

During a professional TSCM inspection the technician’s physical search is aided by an instrument called a Non-Linear Junction Detector (NLJD). This instrument can detect electronic surveillance devices, including mini voice recorders, active or dormant.

A distance of 3 to 4 inches was chosen to test the NLJD detection technique. This simulates the recorder being secreted within another object. Green shows the power output. Red shows the level of detection.

With the NLJD set at 50% power output the TileRec was barely detectable. When the power was increased to 90-100%, success. Even at this higher power operator skill in using the NLJD was critical.

Conclusions

  • The TileRec is (probably)
    The World’s Smallest (affordable)
    Voice Recorder (as of now).
  • Size doesn’t matter. Any mini recorder can be easily secreted and threaten privacy.
  • The market for mini recorders is huge. There are a lot of them out there. Some of the very good ones are very inexpensive.
  • Detection is difficult, but not impossible.
  • The best self-protection tactic is watching what you say and situational awareness. Critical situations require the assistance of a professional TSCM / counterespionage firm.
* * *

Kevin D. Murray CPP, CISM, CFE is a business counterespionage consultant and TSCM specialist with over four decades of experience.

Murray Associates is an independent counterespionage consulting firm, providing eavesdropping detection (TSCM) and counterespionage services to business, government and the at-risk individual.
 
Headquartered in the New York metropolitan area, a Murray Associates team can assist you quickly, anywhere in the United States, and internationally.

If you have any questions, or would like to schedule TSCM / information security audits, please let us know.

Friday, July 17, 2020

Quote of the Week — Espionage Truths

"... a key way to detecting espionage is to follow your instincts and protocols."
~ /

International Conferences on Business Espionage and Cyber Security

August 23-24, 2021 in Budapest, Hungary
ICBECS 2021: 15. International Conference on Business Espionage and Cyber Security aims to bring together leading academic scientists, researchers and research scholars to exchange and share their experiences and research results on all aspects of Business Espionage and Cyber Security. It also provides a premier interdisciplinary platform for researchers, practitioners and educators to present and discuss the most recent innovations, trends, and concerns as well as practical challenges encountered and solutions adopted in the fields of Business Espionage and Cyber Security. more

ICBECS 2020: 14. International Conference on Business Espionage and Cyber Security, August 19-20, 2020 in Budapest, Hungary (to be held digitally) more

From The Dot Connection Files - CIA & Iran - Just Coincidence? You Decide

Three stories.
Same day.
Makes one wonder...

The Central Intelligence Agency, using new powers, carried out aggressive covert cyber operations against countries including Iran, North Korea, China and Russia, a new report says... The new powers gave the CIA more latitude to “damage adversaries’ critical infrastructure, such as petrochemical plants, and to engage in the kind of hack-and-dump operations that Russian hackers and WikiLeaks popularized,” the report explained. more

Iranian cyberspies leave training videos exposed online — One of Iran's top hacking groups has left a server exposed online where security researchers say they found a trove of screen recordings showing the hackers in action. more

The US has "several" intelligence indications that Iran has put portions of its air defense system on "high alert" in recent days, following unexplained explosions at key facilities tied to the country's military and nuclear programs, according to a US official who is closely tracking developments. more   sing-a-long (nsfw use headphones)

Thursday, July 16, 2020

Is James Bond an Idol with Feet of Clay? — You decide.

James Bond has long been the most famous "secret agent" out there. Everyone knows James Bond, and it is rare to meet someone who hasn't seen at least one of the films.

Like with most films of that kind, there are a lot of issues with the character and story lines in general. Take for instance the fact that they call him a "secret agent" when he is in fact an Intelligence Officer. Add to that he doesn't have a line manager, he somehow reports directly to the head of MI-6.

Then there is the reality that a "license to kill" doesn't really exist. Despite these tiny issues with details, the films are actually quite good.

However, there are many reasons that James Bond truly is the worst spy ever, even if he is a fictional character. Here are the top 007 reasons:
  1. He carries a gun on airplanes
  2. He constantly destroys or loses his equipment
  3. He is always being captured and/or beaten up
  4. He never follows orders
  5. He travels under his own name
  6. He always draws attention to himself
  7. Everyone knows who he is 
To top it off they all know his 00 code number … His secret code number. The number of times an adversary uses 007 is absolutely astounding. This alone is enough to make James Bond the worst spy ever. more

Wednesday, July 15, 2020

Android: Camera Can Remain Active When Phone is Locked

Mozilla says it will fix the bug later this year, in October.

Mozilla says it's working on fixing a bug in Firefox for Android that keeps the smartphone camera active even after users have moved the browser in the background or the phone screen was locked.

The bug was first spotted and reported to Mozilla a year ago, in July 2019, by an employee of video delivery platform Appear TV.

The bug manifests when users chose to video stream from a website loaded in Firefox instead of a native app. more

Santa and Cuebiq Know if You've Been Naughty or Nice

After Memorial Day, as the United States began to reopen, coronavirus cases began to rise...

For the Fourth of July weekend, a new analysis of cell phone data suggests even more people hit the road among 10 coronavirus hotspots, despite warnings from health experts.

The analysis comes from data shared with CNN by Cuebiq, one of the private companies that the US Centers for Disease Control and Prevention uses to track general movement in the United States. 

Cuebiq gets its data when people download apps on their phones and opt into anonymous location data tracking. The company's full data set includes 15 million phones nationwide. more

The Atlas of Surveillance

Documenting Police Tech in Our Communities. 

Explore 5,300 datapoints in the U.S. collected by hundreds of researchers.

TOGGLE the Legend to reveal how each technology is spreading. ZOOM into any region to see the technologies in greater detail. If an area has no markers, it means it hasn't been researched yet.
Click to enlarge. Go to website to explore. Wired article here.

Monday, July 13, 2020

Google to Restrict Ads for Spycams and More

Google is set to announce a major overhaul of its ad policy starting next month.

In a blog post, Google has said that the changes specifically framed to put restrictions on advertisements promoting surveillance technologies that let people secretly spy on their intimate partners will be made into the Enabling Dishonest Behavior policy on August 11.

“The updated policy will prohibit the promotion of products or services that are marketed or targeted with the express purpose of tracking or monitoring another person or their activities without their authorization.”, the Alphabet-owned company said in its blog. Google said the updated policies will be applicable globally as soon as it will be brought into effect starting August 11. more

Tuesday, July 7, 2020

Digital Assistant Speakers Know More Than Just Their Names

As voice assistants like Google Assistant and Alexa increasingly make their way into internet of things devices, it’s becoming harder to track when audio recordings are sent to the cloud and who might gain access to them.

To spot transgressions, researchers at the University of Darmstadt, North Carolina State University, and the University of Paris Saclay developed LeakyPick, a platform that periodically probes microphone-equipped devices and monitors subsequent network traffic for patterns indicating audio transmission. 

They say LeakyPick identified “dozens” of words that accidentally trigger Amazon Echo speakers. more

More stories about Digital Assistant Speakers.

After B&E for Bugging Home Inmate Charged Again

NY - A Gansevoort inmate was arrested Friday following an altercation at the Saratoga County Jail.

Todd D. Derush, 39, of Wilton-Gansevoort Road, was charged with felony second-degree assault.

He was arrested on Jan. 30 for allegedly illegally entering an acquaintance’s home and hiding equipment to record conversations. The victim had an order of protection against him. He was charged with felony second-degree burglary, first-degree criminal contempt, eavesdropping, unlawful surveillance and misdemeanor possession of eavesdropping devices. more

New Spy Movie: My Grandfather The Spy

EXCLUSIVE: Dave Evans’ feature doc My Grandfather The Spy, which chronicles the director’s exploration of his own family’s long-buried secrets, has been boarded by SMP Distribution for international sales... It follows how director Evans uncovers that his grandfather Eric, seemingly a quiet unassuming shopkeeper, actually had a connection to Cold War espionage... Shooting took place in Bulgaria, England and Wales. SMP is now looking into festival screenings. more

Don't Click on Links Like This... but click on this one to learn why. (blahaha)

A subset of Three UK users have received an SMS message warning them about text message-based spam – complete with a shortlink and textual urgings to click it and learn more.

The definitely-not-smishing-honest message was received by Reg reader Chris, and he was not very chuffed with it. He told us:

"They send an unsolicited out-of-the-blue SMS which asks you to 'click' (not tap) on a link. When checked out in a sandboxed environment this goes to an insecure http-only page which warns of suspicious text messages and a video telling recipients not to tap on any links. Awesome!" more

The offending message is reproduced in all its glory below:

Privacy Advocates Alert: Make Orwell Fiction Again

Make Orwell Fiction Again https://amzn.to/2O591aq

Monday, July 6, 2020

America’s Cup Buffeted by Fraud and Spying Allegations

New Zealand’s plans to host the 2021 America’s Cup are in disarray amid allegations of fraud, spying and a government decision to suspend funding for the world’s most famous yachting event.

Grant Dalton, managing director of Team New Zealand, has denied claims of fraud and financial mismanagement. He said the team and organisers were the victims of spying and intentional reputational damage by people with questionable motives.

“It is a deliberate, sinister, and highly orchestrated attack which includes anonymous tip-offs, recordings and document leaks. ‘Informants’ orchestrate unfair accusations, bypassing normal processes, and going straight to external authorities,” he said.

Mr Dalton revealed this week the team had sacked a number of employees for leaking confidential information. He said his organisation had been infiltrated by spies. more

US Court Rules Facebook Widgets can be Considered Wiretaps

After a nine-year-long legal battle, a federal appeals court has ruled that Facebook’s practice of collecting data through its widgets could be considered a violation of anti-wiretapping laws.

The social media firm has long defended its actions by quoting the part of the federal Wiretap Act that defines wiretapping as interception of communications. According to a Gizmodo report, in Facebook’s logic, gathering user data isn’t the same as wiretapping without that active interception.

However, a panel of judges on the 9th Circuit Court of Appeals in the US has dismissed this technicality as it was found that the Facebook widget was collecting information from people who didn’t click on it. Such actions, they ruled, count as interception. more

How attackers hack mobile networks...

...and get access to free data, locations, wiretap calls and more.  
A fairly detailed and interesting article for the technically curious. more

TikTok - Times Up

This has been a week that TikTok—the Chinese viral video giant that has soared under lockdown—will want to put quickly behind it...

Whether India had always planned to announce its ban on TikTok, along with 58 other Chinese apps, on June 29, or was prompted by the viral response to the iOS security issue is not known. But, as things stand, TikTok has been pulled from the App Store and Play Store in India, its largest market, and has seen similar protests from users in other major markets around the world, including the U.S.

One of the more unusual groups campaigning against TikTok is the newly awakened Anonymous hactivist group... “Delete TikTok now,” the account tweeted, “if you know someone that is using it, explain to them that it is essentially malware operated by the Chinese government running a massive spying operation.more
Calls for Tik Tok to be banned in Australia over Chinese spying fears

Security Director Alert: Why Home Offices Also Need TSCM

Since the coronavirus hit the U.S. in full force in March, spam emails are up 6,000%. This data from the head of IBM’s X-Force Threat Intelligence, Wendi Whitmore... The surge is, in part, connected to the high numbers of people working from home...

Since the lockdowns began, cybersecurity experts began to worry that it would be easier for attackers to compromise security systems. The fear of the pandemic, financial stress, and other distractions at home turned workers into ripe targets for scammers, as stress lowers people’s guard to tactics like phishing.

In the case of workers using VPNs, some experts see them as the perfect way to get a bad actor into a company’s network, likening it to a hypodermic needle. All an attacker needs is a few employees to click on some malware, perhaps from an email or a fake resume and they could be in — and some cyber experts even speculated that attackers might target unsecured Wi-Fi networks. more

Friday, June 26, 2020

Former Police Officer Accused of Spying on Neighbors

MO - A man told police he found a mini video recorder on an outside window ledge of his St. Charles County home... The camera allegedly was pointed into a closet and bathroom inside his home.

When St. Charles County police analyzed the camera and SD card, they found multiple clips showing the man and his wife, both clothed and nude, inside of their home...

According to court documents, more recordings led authorities to believe the camera was resting on John Zlatic’s back porch at one point in time. When police attempted to talk Zlatic, the suspect did not answer his doorbell...

Officers were able to get DNA profiles from a plastic clamp that was used to prop the camera on the window ledge. They then used Zlatic’s former police uniform, which had been given back to the department upon his resignation, to confirm the DNA on the clamp was his, court documents state. more 
Learn how to detect spycams.

Reports: Cybercrimes Surge 400%, Teleworkers Need to Tighten Security

...in another new analysis, IBM warns that teleworkers are especially vulnerable to attack.

“There is a level of apathy and a lack of awareness when it comes to securing the home office environment....they’re seeing double the failure rates on their security tests than they saw pre-COVID,” warns Mathew Newfield, Chief Information Security Officer at Unisys...

This unprecedented remote working explosion amounts to a dramatic game changer for corporate security officers and cyber attackers,” says Patrick Barry, Chief Information Officer at Rebyc Security.”

Corporate cyber security strategies, policies, penetration testing procedures, and technologies need to be reconsidered and reevaluated and, in many cases, revamped.more

This Month in Wiretapping History

 1977 - S. Korea - The foreign ministry delivers a letter of protest to Washington over the wiretapping of the office of President Park Chung-hee by the U.S. Central Intelligence Agency. The agency was investigating an allegation that a South Korean lobbyist paid bribes of up to US$1 million to high-level U.S. politicians at the behest of the South Korean president, who did not get along with his U.S. counterpart, Jimmy Carter. more

Thursday, June 25, 2020

Questions We Get... Are 5G Cell Phone Signals Dangerous?

A. Being a licensed amateur radio operator, the topic hits close to home. Basically, any high strength RF emission can cause damage. Leukemia is the top one for transmitter engineers in the broadcast biz. 

Fortunately... "The intensity of radio waves over distance obeys the inverse-square law, which states that intensity is inversely proportional to the square of the distance from a source. Think of it this way: double the distance, and you get four times less power."

Given the distance cell antennas are away from people the effect is negligible. However, if your office chair sits next to a wall with a cell antenna mounted just on the other side, you might want to change offices. ~Kevin  more

Tuesday, June 23, 2020

How to Detect Hacked Charging Cables

Click to enlarge.
  • They Appear Normal
  • They Blend In
  • They Suck Up Your Data
They are Alien Cables from Hacker Space.

Imagine a charging cable which looks exactly, and I mean exactly, like any stock charging cable. Oh, just one difference. This charging cable has built-in Wi-Fi and can run penetration programs on whatever it is plugged into.

Hacked charging cables exist, in four versions and two colors, white and black, and they sell for $119.99.

Ostensibly, they are, “built for covert field-use by Red Teams.” However, anyone can buy one. We did. 

Determining if the following claims are true is important to protecting our clients.

“It looks like the real thing. It feels like the real thing, down to the millimeter.” Has “features that enhance remote execution, stealth, and forensics evasion.”
Our tests revealed... more

Thursday, June 18, 2020

Believe It, Or Not, or... Laugha While You Can

via The New York Times

A team of scientists hunting dark matter has recorded suspicious pings coming from a vat of liquid xenon underneath a mountain in Italy. 

They are not claiming to have discovered dark matter — or anything, for that matter — yet. But these pings, they say, could be tapping out a new view of the universe. more

This might be old news to some. Cue the music.

Is Your Hotel or AirBnB Spying on You?

Have you ever found a random USB charger in a hotel room and thought “How lucky, someone left their charger and now it’s mine!”?

Have you ever plugged your phone into the USB of an alarm clock and said, “I’m so glad this hotel or guest house made my life easier with this bedside technology!”?

Have you ever looked up at a smoke detector and said, “Thank god that’s there in case of a fire, I’ll be protected!”?

Well, here’s some bad news: all of those items can be, and possibly are, hidden cameras that are watching you, recording you, spying on you, and violating you. And the worst part, these disguised cameras are only sometimes illegal.

Don’t believe us? Do a simple Amazon search and prepare to be frightened by the amount of spying equipment you can get two-day shipping on. There are hidden cameras in wall outlets, clocks, picture frames, clothes hooks, pens, and so much more. more

Learn how to detect covert spy cameras.

Wednesday, June 17, 2020

Privacy Protector – Anonymous Camera for iPhone

 A new camera app has been released for iOS that, unlike basically every other photography app, is designed to hide the photo’s subject rather than highlight them. Called Anonymous Camera, this app works to protect the people captured in a video or photo by blurring or otherwise hiding their faces — or, in cases where it is necessary, by removing their bodies entirely.

There are times when you may need to interview someone or take a picture, but hide someone featured in the content for their sake. This could include interviews with someone who wishes to remain private, protecting whistleblowers, or simply hiding the faces of protesters and activists so that facial recognition technology can’t be used to identify them.

Anonymous Camera is a free app that can perform these actions, as well as entirely removing the subject’s body in cases where they have other identifiers like tattoos. The app is free to download, though there’s also a Pro version priced at $2 that includes watermark-free video recording. more

Why Law Firms Need TSCM More Than Ever

Law firms are still the firm favorites and proverbial jewel in the crown for cyber criminals. 

Hackers for hire can be extremely useful for some people and organizations. Although the report by the University of Toronto revealed that Dark Basin had infact conducted commercial espionage on behalf of clients against opponents involved in high profile public events.

But their work didn’t stop there. They also worked on criminal cases, financial transactions, news stories and advocacy in an attempt to throw doubt on prosecutions. more

TSCM - Technical Surveillance Countermeasures / Bug Sweep / Information Security Audit