Thursday, April 13, 2023

The Mail Room Guy and the USB Spy Cable

Someone "lost" a USB charging cable. You found it. Lucky you? Maybe not...

USB spy cables look exactly like legitimate ones... exactly. 

In this example, the competition has paid an inside employee (the Mail Room guy) to drop a few cables around certain parts of the corporate headquarters. They didn't tell him why. And, he doesn't care. Why should he? He gets $50 per cable dropped.

Once plugged in, the cable takes control of your device. (cell phone, laptop, desktop, etc.) All your data becomes accessible. Next, pre-loaded penetration tools spring into action.

The connection can be used as a pivot point to attack other computers on the network. This is controlled remotely by the spy/hacker, via Wi-Fi to the internet, or via their nearby smartphone.

Once the hacker has infiltrated your network, more data can be extracted, viruses planted, or a ransomware attack staged. Obviously, this is dangerous in a business environment.

Recommendations:
• Mark your cables so if swapped you'll notice.
• Call us. We test USB cables as part of our debugging sweeps.
• If you use our services, we will give you a free test instrument so you can test new cables yourself.

Thursday, April 6, 2023

Hackers Can Open Nexx Garage Doors Remotely...

...and there's no fix!

Multiple vulnerabilities discovered Nexx smart devices can be exploited to control garage doors, disable home alarms, or smart plugs.

There are five security issues disclosed publicly, with severity scores ranging from medium to critical that the vendor has yet to acknowledge and fix. more

Doctor Slipped Cleaner into Spouse’s Tea - He Installed Cameras

...now she’s charged.


A Mission Viejo dermatologist is accused of using liquid cleaner to try to poison her husband. Suspicious about the taste of his tea, he installed cameras at home. 

Growing suspicious, Chen secretly installed cameras around his Irvine home where, according to the restraining order request, he captured video of Yu pouring liquid drain cleaner into his cup when he left it unattended... 

According to prosecutors, video showed Yu pouring the chemical into the tea on July 11, 18 and 25. more

Florida Grounds Drones over Fears of Spying

Police, fire and other government agencies across Florida must ground millions of dollars in aerial drones because of a new state rule banning the agencies from using devices made by China-based DJI. 

The DJI drones are among the most widely used in the world, but Gov. Ron DeSantis’ administration said they pose a security threat and did not include them on a list of approved drone manufacturers. more

A New Wave of Lawsuits - Wiretapping Litigation for Website Analytics

2022 saw a new wave of class action lawsuits targeting companies that use technology to track consumers’ interfaces on their websites...

Plaintiffs often ground their claims in the electronic interception provisions of federal and state wiretapping laws. Under the Federal Wiretap Act of 1968, a person is prohibited from “intentionally intercept[ing] … any … electronic communication.” 18 U.S.C. § 2511(1)(a) (2022). The FWA and many state statutes define “interception” as “acquiring the contents of that electronic communication.” Id. § 2510(4). “Content” is defined as “any information concerning the substance, purport[] or meaning of that communication.” Id. § 2510(8). 

Under the FWA, a court may require a defendant to pay $10,000 per violation. Id. § 2520(c)(2). Fines under similar state laws range from $1,000 to $50,000 per violation, depending on the state. more

The Most Insane Story In Gaming Makes For A Fantastic Biopic

Tetris (Movie) Review:


Of the many events that have happened across the gaming industry, the story of Tetris is one of the most interesting. This simple puzzle game made in Russia had entire companies funding men to infiltrate the USSR to try and get their rights from their Ministry of Technology. Communist personnel played these capitalists off each other, with politics and corporate rivalry thrown in for good measure...

You wouldn’t think watching a bunch of business meetings would be that interesting but they’re the most exciting part of the movie. ELORG invited all three men to meet them at the same time but kept separate from each other. They move back and forth in a mixture of business and interrogations as different layers of corporate espionage and corrupt under-the-table dealings are peeled back. more

Enjoy the weekend!

Tinker, Tailor, Soldier, Spy - This Time it's The Tailor

A San Francisco tailor was arrested for filming coworkers with a camera disguised as a clock in the dressing room of a clothing cleaner where they all worked.


Andrew Hong, 31, was booked Saturday night on suspicion of invasion of privacy. But the months-long investigation continues as San Francisco Police Department’s Special Victims Unit asks others to come forward with information about the case.

...a woman came to the Northern Station to report a hidden camera at a Divisadero Street clothing cleaner...

She told officers she found it in the dressing room and that it appeared to be the kind of camera used for home surveillance, police said. more

Why More Businesses Are Not Conducting Periodic TSCM Inspections

IT & Security Pros Pressured to Keep Quiet About Data Breaches

Organizations globally are under tremendous pressure to address evolving threats like ransomware, zero-day vulnerabilities, and espionage, and they face challenges in extending security coverage across multiple environments and dealing with an ongoing skills shortage, according to Bitdefender.

Alarmingly, more than 42% of the total IT/security professionals surveyed said they have been told to keep a breach confidential when they knew it should be reported and 30% said they have kept a breach confidential.

43% of IT/security professionals surveyed said extending capabilities across multiple environments (on-premises, cloud, and hybrid) is the greatest challenge they face which tied with complexity of security solutions also at 43%.

Not having the security skill set to drive full value came in as a strong second at 36%. more

This is an old phenomenon. We call it The Ostrich Effect.

Thursday, March 30, 2023

Liz Hurley Left 'Mortified' After Media Bugged Devices, Court Heard

A PRIVATE investigator hired by a national newspaper bugged Ledbury celebrity, Liz Hurley’s home, a high court hearing has heard. 

Ms Hurley is among celebrities like Elton John and Prince Harry who have taken action against Associated Newspapers the publisher of the Daily Mail and Mail on Sunday newspapers over years of alleged phone tapping and privacy breaches...

David Sherborne, who was representing Ms Hurley said in the written submission that she was left feeling “shocked and mortified” by the alleged targeting. He said a private investigator, acting on behalf of the Mail on Sunday, hacked their phones, tapped landlines, placed “a sticky window mini-microphone on the exterior of her home window” and bugged Mr (Hugh) Grant’s car to obtain “private communications with Mr Grant, her financial details, her travel arrangements and medicals during her pregnancy and birth of her son”. more

High profile individuals commonly have their homes, vehicles and aircraft swept for bugs.

Arizona Bill to Make Drone Spying a Crime Moves Forward

AZ - State lawmakers are moving to ensure people don’t get too nosy with their new drones.

In a party-line vote on Wednesday, members of the House Commerce Committee approved legislation that would make it a criminal offense to intentionally photograph, tape or otherwise observe someone else in a private place where that person has a “reasonable expectation of privacy.”

The only thing is that there hasn’t been a consensus as to when exactly someone crosses that line. more

Prosecutors: Veteran Deputy was Listening in on Jury Deliberations

NY - An Ontario County Sheriff’s Office veteran, Adam Broadwell, pleaded not guilty on Monday to felony charges of eavesdropping, possession of an eavesdropping device, and official misconduct. 

Broadwell is accused of listening in on a jury deliberation by using a device specifically designed for eavesdropping.

According to Assistant District Attorney Kelly Wolford, the jury was deliberating a felony case when Broadwell listened in on the conversation. The eavesdropping charges brought against Broadwell relate to his use of a device to enhance the sound of people talking in his area. 

However, Broadwell’s defense attorney, Clark Zimmermann, argued that the device used was a Bluetooth earbud set linked to an Android phone, which does not match the definition of an eavesdropping device. more

Our previous reports on Bluetooth earbud eavesdropping.

Inaudible Ultrasound Attack Can Control Phones and Smart Speakers

American university researchers have developed a novel attack called "Near-Ultrasound Inaudible Trojan" (NUIT) that can launch silent attacks against devices powered by voice assistants, like smartphones, smart speakers, and other IoTs.

The team demonstrated NUIT attacks against modern voice assistants found inside millions of devices, including Apple's Siri, Google's Assistant, Microsoft's Cortana, and Amazon's Alexa, showing the ability to send malicious commands to those devices.

The main principle that makes NUIT effective and dangerous is that microphones in smart devices can respond to near-ultrasound waves that the human ear cannot, thus performing the attack with minimal risk of exposure while still using conventional speaker technology. more

“Is this a bug?” (updated)

“Is this a bug?” is a question we are often asked.


Usually the answer is, “I understand why you are asking is this a bug. Some bugs do look similar to this. But, here is what you actually found.”

Real electronic eavesdropping devices are getting smaller. So are lots of other little electronic bits which are part of our everyday lives. Distinguishing between the two can be tricky. If the object you found makes you think, is this a bug, keep reading. You stand a good chance of finding your answer here.

Weekend Project - Two-Tube Spy Transmitter

From the look around his shack Helge Fykse (LA6NCA) really has a thing for old technology. The typewriter, the rotary phones, the boat-anchor receiver — they all contribute to the retro feel of the space, as well as the circuit he’s working on... The tiny transmitter is built into a small metal box, which is stuffed with the resistors, capacitors, and homebrew inductors needed to complete the circuit... Almost every component used has a vintage look... But does it work? Of course it does! more

Saturday, March 25, 2023

Bad Bunny - Not Your Recording - Bad Bunny

Pop superstar Bad Bunny is being sued for $40m (£33m) by his ex-girlfriend, who says he used a recording of her in two songs without permission.

Carliz De La Cruz Hernández says she recorded the catchphrase "Bad Bunny baby" on her phone in 2015, before he became famous and before they split up.

The line has appeared on the Puerto Rican singer and rapper's 2017 single Pa Ti and the 2022 song Dos Mil 16. Bad Bunny was the most-streamed artist on Spotify for the past three years. more

Journalist Plugs in Unknown USB Drive Mailed to Him

...it exploded in his face

Although these are just a few examples, they should be enough to preclude one from inserting a mysterious, unsolicited USB drive mailed to them into a computer. Unfortunately, one Ecuadorian journalist didn't get the memos. more

In case you missed our memo...

USB Memory Security Recommendations

  • Block ports with a mechanical port block lock.
  • Place security tape over that.
  • Create a “no USB sticks unless pre-approved” rule.
  • Warn employees that a gift USB stick could be a Trojan Horse gift.
  • Warn employees that one easy espionage tactic involves leaving a few USB sticks scattered in the company parking lot. The opposition knows that someone will pick one up and plug it in. The infection begins the second they plug it in.
  • Don’t let visitors stick you. Extend the “no USB sticks unless pre-approved” rule to them as well. Their sticks may be infected.

Trending… IBM Takes The USB Memory Security Lead

USB Memory Security - Thumbs Down“IBM has allegedly issued a worldwide ban against the the use of removable drives, including Flash, USB, and SD cards, to transfer data.

This new policy is being instituted to prevent confidential and sensitive information from being leaked due to misplaced or unsecured storage devices.

According to a report by The Register, IBM’s global chief Information security officer Shamla Naidoo issued an advisory stating that the company “is expanding the practice of prohibiting data transfer to all removable portable storage devices (eg: USB, SD card, flash drive).” This advisory further stated that this policy is already in effect for some departments, but will be further enforced throughout the entire company.” more

Spy Headlines this Week

• TikTok CEO on ByteDance: "I Don't Think That Spying is the Right Way to Describe It." more

Facing spying claims, Mexico recorded phone call of prominent activist more

The Spy Law That Big Tech Wants to Limit more

Your refrigerator could be spying on you! Senate committee clamps down on smart devices more

• Greek intelligence allegedly uses Predator spyware to wiretap Facebook Security Manager more

• Senate Bill Would Be Big Step to Combatting Harmful Workplace Surveillance Practices more

• Archbishop admits spying on other Vatican officials more

• Everett school superintendent sues city for racial discrimination; charges mayor bugged her office more

• CIA's CTO and deputy director explain the future of high-tech spying more

Spying, cocaine, money-laundering, historic losses: The sordid tale of the fall of Credit Suisse more

Cell phone spying growing strong: How to know if you’ve been a victim of ‘stalkerware’ more

• Fox News producer was forced to spy on Maria Bartiromo, who execs called 'crazy,' more

• ESPIONAGE BOOK RECOMMENDATIONS FROM A FORMER CIA SPY more

Friday, March 17, 2023

Getting Clocked Can Disable Your Wi-Fi Cameras

This cheap "watch" is used by hackers and thieves to disable Wi-Fi cameras, and other things connected to Wi-Fi access points. (It has some legitimate uses, too.)

Watch Functions

- Deauther Attack: Disconnect 2.4G WiFi
- Deauther Beacon: Create fake networks
- Deauther Probe: Confuse Wi-Fi trackers
- Packet Monitor: Display Wi-Fi traffic
- Kicks devices off a WiFi network- Spam beacon frames
- Spam probe requests

Additional background information about deauthentication attacks via Atlas VPN...
How Hackers Disable WiFi Cameras
A deauth or deauthentication attack (DoS) disrupts connections between users and Wi-Fi access points. The attackers force devices to lose access and then reconnect to a network they control. Then, perpetrators can track connections, capture login details, or trick users into installing rogue programs... this attack does not need unique skills or elaborate equipment. Deauth attacks could also knock devices offline, like home security software.

How it it Used?
• Forcing hidden cameras to go offline. Over the years, frequent disputes forced Airbnb to forbid the use of cameras in rented apartments or rooms. Yet, more cunning homeowners can conceal cameras from their guests.
• Hotels that push paid Wi-Fi. There have been incidents when hotels employed deauthentication attacks to promote their Wi-Fi services. In fact, the Federal Communications Commission (FCC) issued documents stating that blocking or interfering with Wi-Fi hotspots is illegal. One of the first offenders was the Marriott hotel, with financial motives for disrupting visitors’ access points. However, charging perpetrators with deauthentication attacks is a rare sight. Usually, victims might blame the interruptions on unstable Wi-Fi.
• Susceptible smart devices. Criminals could push connected devices offline for several reasons. One danger is that attackers might disable security systems. Thus, such interruption halts monitoring of the home, office, or another area. In worst-case scenarios, such deauth attacks could facilitate burglars entering buildings. Another example comes from a vulnerability in Ring Video Doorbell Pro (now fixed). The exploited flaw means using a Wi-FI deauthentication attack to force the device to re-enter the configuration mode. Then, eavesdroppers can capture Wi-Fi credentials orchestrated to travel in an unencrypted HTTP.
• Forcing users to join evil twins. Spoofed deauthentication frames force targeted devices to drop their connection. It could be a way to break the legitimate connection and trick users into joining fake hotspots. Deauth attacks could flood the access point so that devices cannot join for a period of time.

Our Tips: How to Make Sure They Don't Disable Your WiFi Cameras
Tip 1. Don't go wireless, use Cat6a shielded cable.
Tip 2. Use Power over Ethernet (PoE). Make sure it is properly grounded.
Tip 3. Make sure the power supply to the network is backed-up (UPS). Power failures do happen.
Tip 4. Hide the cables to deter sabotage.
Tip 5. If you absolutely, positively need a wireless video solution consider using a 4G cellular camera, or a dedicated video link.

WiFi Camera Attack Prevention
The prevention of deauthentication attacks does not offer many options. But there are effective strategies for mitigating their impact. Ensure that your network applies WPA2 encryption. If you use a pre-shared key, it must be complex and lengthy to withstand threats like brute-force attacks. Another improvement might be 802.11w, which validates deauthentication frames and discards spoofed ones. Older hardware and IoT might not support it, raising issues for some Wi-Fi clients.

Furthermore, remember you have minimal control over free public Wi-Fi and its security.

A VPN can assist if deauthentication attacks force clients to connect to evil twins. Atlas VPN creates a secure path between users and access points. Encrypted traffic will prevent attackers from capturing any meaningful communications or data. more

Wednesday, March 15, 2023

Researchers Shrink Camera to the Size of a Salt Grain

Researchers at Princeton University and the University of Washington have developed an ultracompact camera the size of a coarse grain of salt. The system relies on a technology called a metasurface, which is studded with 1.6 million cylindrical posts and can be produced much like a computer chip. Image courtesy of the researchers.
Micro-sized cameras have great potential to spot problems in the human body and enable sensing for super-small robots, but past approaches captured fuzzy, distorted images with limited fields of view.

Now, researchers at Princeton University and the University of Washington have overcome these obstacles with an ultracompact camera the size of a coarse grain of salt. The new system can produce crisp, full-color images on par with a conventional compound camera lens 500,000 times larger in volume... more

Spy History: Evolution of Aerial Spying Over the Past 200 Years

Last month, the US government shot down a Chinese spy balloon floating near a South Carolina beach. 

The Pentagon said it was there gathering intelligence. China said it was doing civilian research. Regardless, it was nothing new.

Governments have been spying on each other for hundreds of years...Here's how surveillance from the sky has developed over the years...

The first record of aerial surveillance happened toward the end of the 18th century. During the Revolutionary War, the French successfully used hot air balloons to monitor combat during the Battle of Fleurus against Britain, Germany, and Holland. more

From Phone Bugging to Kidnapping...

 ...these are the biggest security concerns of the super-rich...

Armed burglaries, kidnapping, offshore bank account hacking - when it comes to security risks of the super-rich, nothing is off the cards.

‘UHNWs often have unique security concerns due to their wealth and high profile’, says David Webb, Managing Director at Valkyrie, a specialist security consultancy firm. ‘These issues are not just specific to them but can also involve their families and close friends...

In addition to the investigation we conducted a TSCM sweep (Technical Surveillance Counter Measures aka bug search), cyber review and device compromise check, as it was believed the blackmailer had access to the clients systems and possibly had planted eavesdropping devices in his house and office – which ultimately proved true.’ more

KamiKakaBot: Corporate Espionage & Eavesdropping Tool

Suspected government-backed hackers are attacking...with malware called KamiKakaBot that is designed to steal sensitive information.
Researchers from Amsterdam-based cybersecurity firm EclecticIQ attributed the attacks to the advanced persistent threat (APT) group Dark Pink...

Dark Pink's main goals were to conduct corporate espionage, steal documents, capture sound from microphones of infected devices, and exfiltrate messaging data, according to research by cybersecurity firm Group-IB. more

UK: No More Mr. Nice Guy, Spy

The day's headlines
• UK intelligence ramps up efforts to counter Russian spies
• MI5 to establish new security agency to counter Chinese hacking, espionage


According to the report, a new department of national security will be established within MI-5. Its goal will be to advise companies, research organizations, and universities that may be victims of industrial espionage. In addition, private and public entities will be able to contact the new body for advice on how to interact with partners from China and or how to safely use Chinese-made equipment...

London is also preparing to announce a $24 million increase in BBC funding to counter Chinese and Russian disinformation in vulnerable countries. In addition, funding for a Chinese language training program for UK diplomats will be doubled. more

Spy Coffee and You're In

FL - A 31-year-old man was arrested and accused of placing a hidden camera inside the men’s bathroom at the “We Spy Coffee & More” shop in Tarpon Springs, according to authorities.

On Monday, the Tarpon Springs Police Department said a customer was using the men’s restroom at the “We Spy Coffee & More” shop, located at 505 Dodecanese Blvd., when they noticed they were being recorded by a camera placed underneath the sink.

“it was an iPhone that was propped underneath the sink and it was upside down. He picked the phone up and he looked at it and he saw that it was actually actively making a video recording,” said Detective John Melton.
The victim confronted 31-year-old Spyridon Voulgarakis, who is an employee of the store. Authorities said Voulgarakis later admitted to hiding the camera and recording other men using the restroom. more

Friday, March 10, 2023

From Those Wonderful Folks Who Brought You Spy Balloons & Trojan Horse Cranes...

...Spy Buoys
Months before a Chinese spy balloon drifted across Alaska and Canada, the Canadian military discovered and retrieved Chinese spy buoys in the Arctic, a region of long interest to Beijing. The Chinese buoys were monitoring U.S. submarines and the melting of ice sheets. Retired Canadian Armed Forces (CAF) Lieutenant-General Michael Day said the buoys would likely have been used to monitor U.S. nuclear submarine traffic in the Arctic, and for mapping seabeds and ice thickness. more

How to Spot a Chinese Spy on Social Media

National security experts say foreign adversaries are using popular job sites like LinkedIn and Indeed to recruit spies and extract trade secrets from U.S. workers...

There are a few things to look out for if you think you’re being targeted on social media. 
  • Urgency: Be cautious of anyone who connects on social media and makes it seem like they need information quickly.
  • Do your research: Be skeptical of anyone who claims to be part of a company or think tank where there is little or no information available on the organization.
  • Probing questions: Be wary of social media accounts that connect and follow up with a lot of questions pertaining to industry specifics.
“They’ll offer that person an opportunity that is difficult to turn down,” said MacIntyre. “For example — an all-expense paid trip, a high paying new job — all of these can be appealing to people and then once they get that person over into their country to agree to do that, those people are often put in compromising situations or are pressured to provide information that they shouldn’t provide.”

Both experts said it’s best to follow the old adage: if the offer sounds too good to be true, then it probably is. more

Odd-Ball Spy News

Fifth of Government Workers Don't Care if Employer is Hacked
(Probably true for all businesses.)
Ivanti, the security vendor polled 800 public sector workers worldwide to compile its new Government Cybersecurity Status Report. It found a “not my job” attitude is exposing governments to excessive cyber-risk. Just a third (34%) of workers recognized that their actions impact their organization’s security posture. Nearly two-fifths (36%) said they haven’t reported phishing emails in the past, while a fifth (21%) said they don’t even care if the organization is hacked. more (This may help.)
Extra Credit: Seven years ago this month... Survey revealed 1 in 5 employees would sell their passwords.

Sweaters That Fool Facial Recognition
Protect your facial biometric data with knit wear? As absurd as that sounds, designer Rachele Didero, of the Italian startup Cap_able, has patented textiles that do just that. The patterns trick facial-recognition cameras into thinking it's not looking at a person. The pieces in the Manifesto Collection which include sweaters, pants, a dress, and a shirt, start at ~$300.
The idea has been around for a while.
Cheaper alternate designs; some with next day delivery!

Famed Manhattan Showroom Loses Peephole Camera Appeal
Manhattan appeals court on Thursday revived the brunt of a lawsuit against the renowned New York Design Center over a video camera... Cast your mind back to 2014... A camera hidden in the wall of a ladies' room at the New York Design Center secretly documented customers and employees for a month, a new lawsuit alleges. According to court documents obtained by the Post, the camera was found behind a broken wall tile on the sixth floor bathroom in April; the custodian who discovered it said it was trained on one of the stalls. more

Who Is Anthony Pellicano?
Infamous Hollywood private investigator Anthony Pellicano is the subject of a new documentary Sin Eater: The Crimes of Anthony Pellicano. The two-part special debuts on March 10 at 10 p.m. on FX and will stream on Hulu. Pellicano...gained a reputation as a fixer who could dig up dirt on his clients’ enemies to make them go away. But Pellicano’s ruthless methods were eventually his undoing, as he served extensive prison time for weapons charges as well as racketeering, wiretapping, and other crimes. more & as previously reported here.

Chinese Rocket that Delivered Military Spy Satellites Breaks Up Over Texas
The second stage of a Chinese rocket that delivered a trio of military surveillance satellites in June disintegrated over Texas on Wednesday, USNI News has learned. The four-ton component of a Chang Zheng 2D ‘Long March’ rocket punched through the atmosphere on Wednesday over Texas at 17,000 miles per hour and disintegrated, two defense officials confirmed to USNI News on Thursday... The debris field is over the least populated counties in the state, according to the Texas Demographic Center. more

The 10 Best Spy Movies That Aren't James Bond
When it comes to pure action-packed entertainment, few genres serve up as many thrills as spy movies. Spy films have been a mainstay of cinema all the way back to the medium's earliest days, like 1914's silent film The German Spy Peril. The genre kicked into high gear during the Cold War... more

SafeHouse Chicago, Spy-Themed Restaurant and Bar, Abruptly Closes
After six years of catering to secret agents and curious spies across Chicago, a spy-themed establishment has closed its doors. SafeHouse Chicago, a restaurant and bar featuring all things espionage-related, announced its abrupt closure online Monday, saying the business has "completed its last mission in Chicago." "We want to thank all of the spies who visited our Windy City headquarters and for your loyalty and support. It has been an absolute pleasure to welcome and serve spies from around the globe," SafeHouse said, in part, in a message posted on its website. more
Spybusters Tip #692: Head to Milwaukee. Best kept secret since 1966.

Monday, March 6, 2023

A New National Cybersecurity Strategy

State-sponsored cyberattacks and corporate espionage are becoming a bigger concern with each passing year,
often resulting in millions of dollars in damages. Attackers are making off with critical data as governments, businesses, and cybersecurity experts struggle to protect citizens and customers. As of now, individuals and small businesses are on their own when attacked, but the Biden administration wants to change that and make multibillion dollar tech firms more accountable for Americans' digital safety.

The White House on Thursday unveiled a new National Cybersecurity Strategy to make cyberspace more secure for Americans. The new policy puts the onus on tech firms and large organizations to make their systems more secure, so that they are better able to resist the increasingly more sophisticated cybersecurity threats from around the world.

Explaining its stance, the Biden administration said that the "organizations that are most capable and best-positioned to reduce risks" should do more to ensure the online safety of American citizens rather than shifting the burden of cybersecurity to individuals, small businesses, and local governments. more

"Impose a legal responsibility to proactively protect National Interest Assets. Hold the corporate caretakers of our economic future accountable for protecting their valuables. Create standards of protection. Provide penalties for inadequate or negligent protection. Enforce compliance before the theft occurs."

Legal Claim: Glimpse into World of Corporate Espionage

Covert cameras and alleged hacking: how bust payments company Wirecard ‘hired spies and lawyers to silence critics’
... 

The claim, which has just been lodged in London’s high court, details allegations of covert surveillance by Kroll, and hacked communications and proposals for hi-tech attacks to intercept mobile phone data by other unknown operators.

Through its lawyers Kroll said that it had “acted entirely in accordance with all applicable laws and regulations”, that Earl’s claim was “misconceived” and that the company denied the claim in full. Jones Day did not respond to requests for comment.

Whether or not the legal claim against Jones Day or Kroll succeeds, the case, and emails disclosed in it, provide a rare glimpse into the murky world of corporate espionage and reputation management – and the lengths to which some companies will go to try to silence critics. more

Spy Bots: Last Month, Balloons - This Month, Trojan Horse Cranes

According to The Wall Street Journal, Pentagon officials are concerned that the ship-to-shore cranes — made by the China-based manufacturer, ZPMC — have emerged as a possible spying tool for the Chinese government. 

The ZPMC cranes, according to the Journal, possess "sophisticated sensors that can register and track the provenance and destination of containers, prompting concerns that China could capture information about material being shipped in or out of the country to support U.S. military operations around the world."

There are also worries of the cranes providing remote access to other parties disrupting the flow of goods in America, the Journal reports. "Cranes can be the new Huawei," said Bill Evanina, a former top U.S. counterintelligence official. more

History: Early Anti-Eavesdropping / Wiretapping Invention

November 10, 1892...
Wiretapping telegraph lines was a known problem back then. Problem was... it was risky, detectable, and the tap always lead to the tapper. In some instances, all this could be circumvented by simply eavesdropping. If one could hear the telegraph clicking—and knew code—one could jot down the message, just like the telegraph employee.

This is how the problem was solved...


Non-Disclosure Agreements That End Up in the Toilet

The need for a Non-Disclosure Agreement used to be a hard pill to swallow. Not anymore. 
NDA is an edible confidentiality agreement that protects all information exchanged within 30 minutes of ingestion.

Contract Summary
NDA is an edible non-disclosure agreement that protects in perpetuity all information exchanged within 30 minutes of ingestion. Every NDA is comprised of a size 00 gelatin capsule imprinted with a QR code leading to this website and filled with powder made from copies of this agreement printed onto rice paper with ingestible ink. NDA can be executed by any number of people at once. Simply provide every party with their own capsule before executing the agreement. Parties can extend the duration of effect by consuming additional NDA. more

Saturday, March 4, 2023

"Technical Surveillance Countermeasures Market (TSCM) Is Likely to Experience a Tremendous Growth by 2029"

(Orion Market Research reports, with explanation links added.)
Technical surveillance countermeasures market (TSCM) is anticipated to grow at a significant CAGR during the forecast period.
The emergence of wireless technology and Internet of Things technology, growing adoption of espionage device detecting systems in various sectors such as commercial, government, industrial, defence and aerospace, and rising demand for modern surveillance technologies are some of the major factors, that are expected to fuel the technical surveillance countermeasures (TSCM) market demand, during the forecast period.

TSCM, also referred to as digital bug sweeping, entails detection and identification of the presence of technological surveillance hazards and devices, including hidden microphones, cameras, or other electronic devices. It offers thorough instrumented, and, physical and visible evaluation of a facility's technical security status. This system not only detects and locates espionage devices, however, additionally identifies various regions, where an enterprise has a risk factor to lose any vital information through illicit eavesdropping devices or systems such as electronic bugs, hidden cameras, listening devices, cellular interception, Bluetooth interception, burst transmitters, laser microphones, among other devices. more
• Security Companies: Add TSCM to your services menu.
• Corporate Security Departments: Add TSCM to your enterprise services.
In-house, or contract... Contact Murray Associates TSCM for free turnkey advice.

The Secret, Insecure Life Of Security Cameras

Smart" cameras are one of the most ubiquitous IoT devices in the business world today, but they’re also one of the riskiest regarding cybersecurity.

What makes these devices so problematic—and a hacker’s dream—is that they fail at basic cybersecurity, are often accessible from the internet and almost always have outbound access to the internet, too...

Corporate Espionage
A more serious threat with smart cameras is that hackers can use them to spy on a company through video and audio feeds.

Sophisticated hackers can use this type of access to monitor susceptible areas in the company, such as boardrooms, executive conference rooms and manufacturing facilities. I’ve recently seen over half a dozen corporations compromised this way. The hackers remained undetected for years while they had direct access to important meetings and manufacturing operations.

Sneaky Data Theft
Smart cameras also make it harder for companies to detect stolen data leaving their networks. In a typical IT attack, hackers run the risk of getting caught when they try to exfiltrate data from the network. However, cameras and other types of IoT are a prominent blind spot for IT teams since they typically don’t monitor the cameras’ network traffic or block them from connecting to new IP addresses. This makes cameras a perfect conduit for data theft. more

Russian Spy Plane Destroyed With Help of Toy Store Drone

Pro-Ukrainian pilots flew a drone they bought from a typical consumer store onto a $328 million Russian spy plane that was later destroyed. 

Remarkable footage shows the drone casually arriving at Machulishchy air base near Minsk, Belarus, and landing on the Beriev A-50 spy plane that’s equipped with a special radar attached to the fuselage.

The flight was reportedly carried out by Belarusian anti-government activists, although it’s unclear whether the shop-bought drone was carrying explosives or if it was used to target the plane for a subsequent attack. more

Cruise Ship Employee Busted - Spycaming in Women’s Bathroom

A cruise ship employee has been sacked after he was busted allegedly filming a female passenger while she was in the bathroom.
A viral video of the creeper’s high seas peeping currently boasts more than 10.1 million views on TikTok.

“This man was in the women’s restroom located at the kids club,” the victim, identifed only as Saja, captioned the disturbing clip. 

The sordid incident reportedly occurred aboard the MSC Meraviglia — a cruise ship belonging to the France-based MSC Cruises fleet headquartered in Geneva, Switzerland. more (with original video)

Friday, February 24, 2023

Qphone Claims to Secure Communications

Highly Secure Communications Platform Enables Encrypted, End-to-End Voice, Messaging, and Video


Global Integrity announced the immediate availability of Qphone, a secure communications software platform that encrypts and protects voice, text, and video conversations between mobile devices, laptops, and desktop computers. Supporting iOS and Android, the Qphone app ensures total privacy of communications using end-to-end quantum-resistant encryption.

Every day there are new instances of eavesdropping, corporate espionage, and compromised systems initiated from bad actors, leaving organizations vulnerable,” explained Bill Marlow, CEO of Global Integrity. “Messaging apps and cybersecurity infrastructure available today are mostly compromised in some fashion. Qphone offers a new approach, delivering a native phone app that is easy to use yet highly secure. In short, Qphone makes privacy simple.” more

Russian Spy Ring in Australia Busted (and more)

A Russian spy ring in Australia operated in the country for more than 18 months before it was broken in a counter espionage operation by the Australian Security Intelligence Organisation (ASIO)
.

The Australian domestic intelligence service spent months tracking the spies and ensured they did not suspect they were being watched, the Sydney Morning Herald reports.

Sources with knowledge of the ASIO operation say some of the Russian agents posed as diplomatic and consular staff while others used deep cover identities. more

A Russian citizen, who has been living and conducting business activities in Poland for many years, has been charged with spying for Russia between 2015 and April 2022, Polish authorities said on Thursday. more

North Sea countries on alert after Russian ‘spy ship’ scouts wind farms... A Russian vessel attempting to map out energy infrastructure for possible sabotage was escorted away from a North Sea wind farm by Dutch authorities, according to media reports. more

China, Russia targeting Canada's artificial intelligence know-how, CSIS warns. more

The Rest of the Story: US Government Has Been Dancing...

...Around UFOs for 75 Years

A legacy of hype, hysteria and fraud is undermining legitimate inquiry into those strange objects in the sky, whether you call them spy balloons, flying saucers or unidentified aerial phenomena...

...on June 24, 1947, when Kenneth Arnold, a businessman and pilot, spotted nine objects flying at unfathomable speed near Mount Rainier in Washington.

Arnold dutifully reported these to aviation officials. When pressed to describe the movement of the curious craft, he likened it to “a saucer skipping across the water.” This initial report went out across the news wires. Bored reporters eager to make something of the story ran with it, inventing details along the way.

In a few days, journalists had turned Arnold’s movement metaphor into something more material: a “flying saucer.” Arnold complained to veteran journalist Edward Murrow that newspapers had “misunderstood and misquoted me,” but to no avail. The idea of a flying saucer immediately captured the nation’s imagination, sparking a flood of alleged sightings. more  (Klaatu would not approve.)

Chinese Spy Balloon Close Up

It's arguably the greatest selfie ever taken. A pilot aboard the Air Force's legendary U-2 spy plane is looking down at China's alleged spy balloon as it hovers somewhere over the United States.

The photo, taken on Feb. 3 and released by the Department of Defense on Wednesday, has reportedly reached legendary status inside the Pentagon.

But where, exactly, was it taken? In a world with very few secrets, it's actually possible to answer that question.

The balloon and the U-2 spy plane were just south of the tiny city of Bellflower, Missouri, population 325, according to the U.S. Census. more

Extra Credit: 
Japanese Mystery Ball Live: 
After ‘Spy Balloon’ Conundrums, 
Mystery Ball’ Spotted On Japan’s Beach

Tin Foil Hats - When it is Not All in Your Mind

Tin Foil Hats - When it is Not All in Your Mind


Monday, February 20, 2023

FBI Lab Will Get to the ‘Guts’ of Chinese Balloon

The US has finished work to recover sunken remnants of the Chinese balloon shot down off the coast of South Carolina and the debris reinforces that it was for spying, officials have said.


The White House national security spokesman, John Kirby, said the wreckage included “electronics and optics” but declined to say what the US had learned from it so far.

“It’s a significant amount [of recovered material], including the payload structure as well as some of the electronics and the optics, and all that’s now at the FBI laboratory in Quantico,” Kirby said. more