Friday, August 2, 2024

Greenbrier Hotel Up for Public Auction

The Greenbrier Hotel, owned by Gov. Jim Justice and his family, has been announced for auction on the courthouse steps late this month because of default, according to a legal advertisement placed in Lewisburg’s West Virginia Daily News. more

So, why is this news?

One of the great vestiges of the Cold War is the Greenbrier bunker, a facility built to house all 535 members of Congress in the event of a nuclear attack.

In 1955, Dwight D. Eisenhower instructed the Department of Defense to draft emergency plans for Congress in case of a nuclear strike. Even if Washington, DC was destroyed, American officials needed a procedure to maintain the continuity of government. As part of these efforts, the Army Corps of Engineers was charged with scouting the location of a nuclear bunker for the members of Congress. They ultimately selected the Greenbrier, a luxury resort in White Sulphur Springs, West Virginia.

Greenbrier was chosen because of its location—relatively close and accessible to Washington, but far enough away to be safe from an atomic bomb—and because of its prior relationship with the United States government. During World War II, Greenbrier had served as an internment facility for Japanese, Italian, and German diplomats and then as a military hospital, where Eisenhower himself was at one time a patient. Although it returned to its original function as a hotel after the war, government officials occasionally held conferences at Greenbrier. more 
Video of the bunker.
Time to sing-s-long! or sing-a-long with... a little darker number.

Free TSCM AI Knowledge Wiki

The website, counterespionage.net, provides a comprehensive range of resources related to Technical Surveillance Countermeasures (TSCM), which can be considered as a knowledge wiki for several reasons:
  1. Informative Articles: It features detailed articles explaining what TSCM is and its importance in protecting corporate privacy and intellectual property. For example, the article on What Is TSCM? outlines the holistic approach needed for effective TSCM evaluations.
  2. Free Resources: The site offers free TSCM security reports, publications, and videos that educate users about various aspects of surveillance and counter-surveillance techniques. You can find these resources in the TSCM Information section.

  3. Guides and Tips: It includes practical guides such as the Security Director’s Guide to Discussing TSCM with Management and tips for businesses on counterespionage, which serve as valuable educational tools.

  4. Case Studies and Testimonials: The website also shares case studies and client testimonials that provide real-world examples of TSCM applications, enhancing the learning experience for users.

  5. FAQs and Expert Insights: The presence of a FAQ section allows users to get quick answers to common questions about TSCM, further contributing to its role as a knowledge base.

Overall, the combination of educational content, practical resources, and expert insights makes this website a valuable TSCM knowledge wiki. more

A $500 Open Source Tool Lets Anyone Hack Computer Chips With Lasers

IN MODERN MICROCHIPS, where some transistors have been shrunk to less than a 10th of the size of a Covid-19 virus, it doesn't take much to mess with the minuscule electrical charges that serve as the 0s and 1s underpinning all computing. 

A few photons from a stray beam of light can be enough to knock those electrons out of place and glitch a computer's programming. Or that same optical glitching can be achieved more purposefully—say, with a very precisely targeted and well timed blast from a laser. Now that physics-bending feat of computer exploitation is about to become available to far more hardware hackers than ever before.

At the Black Hat cybersecurity conference in Las Vegas next week, Sam Beaumont and Larry “Patch” Trowell, both hackers at the security firm NetSPI, plan to present a new laser hacking device they're calling the RayV Lite. 

Their tool, whose design and component list they plan to release open source, aims to let anyone achieve arcane laser-based tricks to reverse engineer chips, trigger their vulnerabilities, and expose their secrets—methods that have historically only been available to researchers inside of well-funded companies, academic labs, and government agencies. more

This Week in Spy News

  • Canada women advance in Olympic soccer as emails show their coach supported spying. more
  • Like a spy thriller: Amazing details about assassination of Hamas leader Haniyeh in Tehran start to emerge. more
  • Moldova expels Russian diplomat and calls in envoy amid spy case. more
  • Suspected Russian spy locked up in Brooklyn freed in prisoner swap for Evan Gershovich, Paul Whelan more
  • Chinese Woman, 20, Reports Parents To Police After They Install Spy Camera In Her Bedroom more
  • Slovenian court convicts two Russians of espionage more
  • French citizen accused of espionage in Russia denied bail. more
  • The Philippine National Police is looking into the possibility that gadgets seized from a Chinese national were being used for scamming and espionage activities. more  Security Scrapbook Analysis: The equipment appears to have been obtained from pitsms.top, a Chinese manufacturer of a cellular "Fake Base Station" systems. This could be either a cyber-crime story, or a spy story, depending upon the intended use. Stay tuned. We will update you as this develops. You can watch the Fake Base Station being made, here.


Behind the Prisoner Swap: Spies, a Killer, Secret Messages and Unseen Diplomacy

A turning point came on June 25, when a group of C.I.A. officers sat across from their Russian counterparts during a secret meeting in a Middle Eastern capital.

The Americans floated a proposal: an exchange of two dozen prisoners sitting in jails in Russia, the United States and scattered across Europe, a far bigger and more complex deal than either side had previously contemplated but one that would give both Moscow and Western nations more reasons to say yes...

The Russian spies took the proposal back to Moscow, and only days later the C.I.A. director was on the phone with a Russian spy chief agreeing to the broad parameters of a massive prisoner swap. On Thursday, seven different planes touched down in Ankara, Turkey, and exchanged passengers, bringing to a successful close an intensive diplomatic effort that took place almost entirely out of public view. more

Voice Over Wi-Fi Vulnerability Let Attackers Eavesdrop Calls And SMS

IPsec tunnels are employed by Voice over Wi-Fi (VoWiFi) technology to route IP-based telephony from mobile network operators’ core networks via the Evolved Packet Data Gateway (ePDG).

This process consists of two main phases: negotiation of encryption parameters and performing a key exchange using the Internet Key Exchange protocol, followed by authentication....

The risk is that these vulnerabilities could expose VoWiFi communications to MITM attacks, compromising data integrity or confidentiality, which is essential for better security in implementing VoWiFi solutions...

These findings highlight the systemic flaws in the implementation of VoWiFi, which could make users vulnerable to man-in-the-middle attacks, and communication security is compromised on a global scale, consequently requiring better security measures in VoWiFi protocols and implementations. more

Wednesday, July 31, 2024

$2 billion Corporate Espionage Verdict Overturned by Appeals Court

Software company Pegasystems convinced a Virginia appeals court on Tuesday to throw out a $2 billion jury verdict for rival Appian in a court battle over Pegasystems’ alleged theft of Appian’s trade secrets.

The award from 2022 had been the largest damages verdict in Virginia court history, the Court of Appeals of Virginia said in the decision...

McLean, Virginia-based Appian had said in a 2020 lawsuit that Pegasystems hired a contractor to steal confidential information from Appian’s software platform in order to improve its own products and better train its sales force...

Appian said that Cambridge, Massachusetts-based Pegasystems referred internally to the contractor as a spy and to its scheme as “Project Crush,” with Pegasystems employees using fake credentials to access Appian’s software. Pegasystems characterized “Project Crush” as competitive research in a 2022 statement...

Pegasystems’ CEO said in a statement following the verdict that Appian’s CEO “could not identify one trade secret that Pega had allegedly misappropriated” during the trial. more

Moral: Make sure your "trade secrets" meet the requirements of, and can be clearly identified as, Trade Secrets. more

Tuesday, July 30, 2024

Interesting: AI Can Reveal What’s on Your Screen (sort of)

Hackers can intercept electromagnetic radiation leaking from the cable between your monitor and computer and decode what you are seeing on screen with the help of artificial intelligence.
Such attacks are probably taking place in the real world, says the team behind the work, but ordinary computer users have little to worry about...

Federico Larroca at the University of the Republic in Montevideo, Uruguay, and his colleagues have developed an AI model that can reconstruct an image from digital signals that were intercepted a few metres away from an HDMI cable...

Around 30 per cent of characters were misinterpreted by the eavesdropping process, but that is low enough that humans can read most of the text accurately, the team says. This error rate is about 60 per cent lower than the previous state-of-the-art attack, the researchers add. more

Karma Files: Multi-platform Spyware Provider Spytech Gets Hacked

Second spyware provider hacked this month...
Minnesota-based spyware provider Spytech has been hacked, with files stolen from the company's servers containing detailed device activity logs from a global pool of mostly Windows PCs but also some Macs, Chromebooks, and even Android devices. 

The total number of spyware victims impacted by Spytech and noted by TechCrunch analyzing the scale of the breach is "more than 10,000 devices since 2013,"
and this cross-platform invasion of privacy stretches across the entire globe, including the US, EU, the Middle East, Africa, Asia, and Australia. 

Spytech provides a brand of spyware best known as "stalkerware" since it's typically installed by a person with physical access to the victim's device. more

Tag You're It

Police departments in the United Kingdom are using a “forensic spray”
to tag motorcyclists, e-bikes and other small vehicle riders that are causing a nuisance in Manchester.

The spray, called SmartTag, contains a unique traceable forensic code tied to the bottle, enabling the police department to easily decide where and when the individual was tagged. Only an extremely small amount of liquid is needed to be able to identify whether or not someone or something has been sprayed.

The liquid also cannot be washed off nor can it be detected by the naked eye, making it a suitable tool for law enforcement. more

Previously reported in the Security Scrapbook...
Saturday, May 15, 2010 - SmartWater - "I've been slimed!"

FutureWatch: AI to the Max - Will Intelligent Eavesdropping Bugs Be Possible?

SCIENTISTS ARE GROWING BRAINS IN LABS. COULD THEY BECOME CONSCIOUS? "IT HAS NO EYES, EARS, NOSE OR MOUTH — NOTHING'S COMING IN." (yet)

As scientists continue to make advances using human tissue to grow brains in laboratories, one neuroscientist is naming the existential elephant in the room: could lab-grown brains ever become truly conscious?

In an interview with Live Science, University of California at Santa Barbara neuroscientist Kenneth Kosik explained that as the science stands now, the facsimile brains made in labs aren't likely to achieve consciousness anytime soon. (Nothing to see here, don't worry, move on.)
These brain organoids, as the lab-grown brains are called, are created by taking someone's cells, converting them into stem cells, and differentiating those into neurons. more

Olympics: FIFA Hinders Canada’s chances with Punishments for Drone Spying

FIFA suspended Canada women’s soccer coach Bev Priestman for one year, deducted six points from the team’s Olympic group stage total and issued a fine
on Saturday in response to Canada flying a drone over New Zealand’s training sessions before the start of the Games.

The punishment immediately and severely hurt the chances for a second consecutive gold medal for Canada, which won the Olympic tournament in Tokyo in 2021, a run that was immediately questioned as the drone scandal emerged. more

Saturday, July 20, 2024

One Way Corporate Espionage Spies Cover Their Tracks

Residential proxy IP: The invisible cloak in corporate espionage.
From the IP vendor's ad...

"In the fiercely competitive business battlefield, information is power, and how to obtain and use this information has become a problem that every company needs to face. In this spy war without gunpowder, residential proxy IP is like an invisible cloak, providing strong protection and support for enterprises.

Imagine that you are an intelligence analyst at an emerging technology company, and your task is to collect and analyze the latest developments of competitors so that the company can make more informed decisions. However, the online world is not a smooth road, and your IP address can easily expose your true identity and intentions, making your actions subject to various restrictions. At this time, residential proxy IP is like a capable assistant, helping you to move forward invisibly in this spy war.

Residential proxy IP, as the name suggests, is to use the IP address of an ordinary home network environment for network access. Because these IP addresses come from real home users, they are difficult to identify and track. By using residential proxy IP, enterprises can hide their real IP address and avoid being discovered by competitors or network monitoring agencies. In this way, enterprises can access target websites, crawl data, analyze competitors' strategies, etc. more freely without worrying about being blocked by anti-crawler mechanisms or IP being blocked." more

Corporate Espionage: Steward Health Care Deployed Spy Outfits to Thwart Critics

Despite its financial turmoil and eventual bankruptcy, Steward Health Care allegedly spent millions spying on its adversaries, hiring intelligence companies to track and intimidate critics worldwide.


In what resembles a poorly written spy novel, Steward's leadership hired agents who placed tracking devices on the car of a financial analyst, accessed a healthcare executive’s phone to potentially blackmail him and circulated an allegedly false wire transfer to frame a politician, a report said.

The videos and documents with the incriminating details were obtained by journalism outfit the Organized Crime and Corruption Reporting Project and shared with the Boston Globe, who investigated the case further.

According to reporters, Steward executives who deployed these intelligence firms prioritized paying their bills over all others, including invoices from vendors and suppliers. Monthly expenses for intelligence services reached as high as $440,000, and from 2019 to 2023, Steward allocated over $7 million to these operations.

As to the legality of all of this, because the spying and fraud took place in various jurisdictions globally, it may not be possible to prosecute anyone responsible. more

The Devil Wears Prada - So Do Spies

Former Government Official Arrested For Acting As Unregistered Agent Of South Korean Government

U.S. Attorney Damian Williams said: “As alleged, Sue Mi Terry, a former CIA and White House employee, subverted foreign agent registration laws in order to provide South Korean intelligence officers with access, information, and advocacy

Terry allegedly sold out her positions and influence to the South Korean government in return for luxury handbags, expensive meals, and thousands of dollars of funding for her public policy program. 

 The charges brought should send a clear message to those in public policy who may be tempted to sell their expertise to a foreign government to think twice and ensure you are in accordance with the law.” more

‘His cameras are everywhere’

Clients worry as Martinsville security camera installer investigated for spying...
The owner of a Martinsville security company was in court Friday, facing child pornography charges, including images he may have taken himself. Adam R. Anderson, 42, is pleading not guilty to these felony counts. Court documents reveal he’s also under investigation for allegedly spying on clients using his security systems.

Holly Clark signed up for Anderson Video Security and Alarm LLC after her garage was broken into a few years ago. Holly Clark signed up for Anderson Video Security and Alarm LLC after her garage was broken into a few years ago.

After meeting with tech experts, Clark said she believes he may still have ownership and access to the cameras within his company.

“The thing is, it’s not just me,” she said. “He put cameras in at the library, the city pool, and has allegations of child porn. Do you want his cameras at the city pool? His cameras are everywhere.

Clark said she and other customers are considering a class action lawsuit against Anderson to get sole ownership of the installed security systems. more

Karma Files: Data Breach Exposes Millions of mSpy Spyware Customers

A data breach at the phone surveillance operation mSpy has exposed millions of its customers who bought access to the phone spyware app over the past decade, as well as the Ukrainian company behind it.

Unknown attackers stole millions of customer support tickets, including personal information, emails to support, and attachments, including personal documents, from mSpy in May 2024. While hacks of spyware purveyors are becoming increasingly common, they remain notable because of the highly sensitive personal information often included in the data, in this case about the customers who use the service.

The hack encompassed customer service records dating back to 2014, which were stolen from the spyware maker’s Zendesk-powered customer support system.

mSpy is a phone surveillance app that promotes itself as a way to track children or monitor employees. Like most spyware, it is also widely used to monitor people without their consent. more

FutureWatch: Eavesdropping on the Mind Gets One Step Closer to Reality

Mind-reading AI just got real! Researchers have created a revolutionary system that can recreate what you're looking at with amazing accuracy. And it’s works by only reading brain activity! 

This cutting-edge tech uses advanced algorithms to focus on the most important brain signals, allowing it to reconstruct images with uncanny precision. Imagine a future where you can control devices with your mind, upload memories to the cloud, or even communicate with others telepathically - this brings us one step closer to making it a reality! (via There's An AI For That)

Friday, July 5, 2024

Trinidad and Tobago: Bombshell Report on Elite Spy Unit

An audit into the Strategic Services Agency (SSA), one of key weapons in the state’s arsenal in the fight against crime, found it was being run under the influence of a religious cult comprising highly-trained military operators, armed to the teeth with the latest weaponry, on a treasonous mission to overthrow the Government.

In a bombshell statement in Parliament on July 3, the head of the National Security Council (NSC), Dr Rowley, revealed for the first time details of the audit done by acting director of the SSA retired Brig Gen Anthony Phillips-Spencer, which painted an alarming state of affairs that went undetected for years under the current PNM administration.

The SSA is authorised to intercept communications, phone calls, WhatsApp, e-mails and other modes after obtaining court orders under the Interception of Communication Act. It was first established in 1995 primarily “to guide the formulation and implementation of national policies on illicit trafficking of dangerous drugs and related criminal activities.” more

Silicon Valley Steps Up Screening on Chinese Employees to Counter Espionage

Leading U.S. technology companies reportedly have increased security screening of employees and job applicants, which experts say is necessary to counter the cyber espionage threat from China.


While the enhanced screening is being applied to employees and applicants of all races, those with family or other ties to China are thought to be particularly vulnerable to pressure from the Beijing government.

But at least one Chinese computer science graduate student at a U.S. university is hoping to make his ties to China an asset. Zheng, who does not want to reveal his first name for fear of retaliation from the Chinese government, says he recently changed his focus to cybersecurity in hopes of improving his job prospects in the United States. more

US Aims To ‘Disrupt’ Chinese Spy Station In Cuba

U.S. officials say they hope to “disrupt” a Chinese intelligence gathering operation allegedly based in Cuba
after a Washington think tank released satellite images it said showed the construction of a spy base capable of surveilling a nearby American naval base.

The Center for Strategic and International Studies on Monday released a report alleging that Cuba in 2021 let China construct spy facilities on “the doorstep of the United States” that would allow Beijing to monitor air and maritime traffic up to 9,000 miles (14,500 kms) away by using radar.

At a press briefing on Tuesday, U.S. State Department principal deputy spokesman Vedant Patel said officials had already “talked about this a little bit more than a year ago” when reports of a Chinese base in Cuba nearly derailed a trip to Beijing by Secretary of State Antony Blinken. more

Tracking Devices Stymie Political Sign Thefts

Political candidates have a new campaign expense: Apple AirTags.


The button-size geotracking device has become a popular tool in the rough-and-tumble world of local elections, where lawn signs often end up stolen, vandalized or run over. Candidates who have grown tired of dirty tricks are hiding AirTags in their signs, leading to digital dragnets when they go missing.

Tracking the device’s pings has led to the doorsteps of alleged sign snatchers and, in some cases, candidates’ opponents. The stings have left snatchers dumbfounded. Some have faced charges of theft, criminal mischief and receiving stolen property.

“I just wanted it to stop,” John Dittmore said of why he got an AirTag after several of his campaign signs vanished over three days in May. more

Sports: Germany Uses 1980's Pop Music to Prevent Rivals Spying

Staff at Germany’s European Championship training base have begun playing loud music on their mobile phones in an apparent attempt to stop spies eavesdropping on their tactical sessions.


Reporters from Bild have chronicled how they were followed by two men while walking near the perimeter of the Adidas site in Herzogenaurach, Bavaria, on Wednesday, one of which was holding a phone blaring out the title song to a children’s television series (sing-a-long) and a song by a 1980s pop duo.

As well as the theme tune to Benjamin Blümchen, the unidentified individuals also played Cheri Cheri Lady by Modern Talking, much to the reporters’ bemusement. (sing-a-long)

The deployment of such extreme measures, apparently in order to drown out any instructions Germany manager Julian Nagelsmann and his coaches may issue to his squad, coincided with the build-up to the country’s crunch Euro 2024 quarter-final against Spain on Friday. more

Monday, July 1, 2024

Security Director Alert: China Enforcing Electronic Device Inspection Law

China is enforcing a new law on Monday that allows national security authorities to inspect electronic devices on suspicion of espionage.

The Ministry of State Security is implementing the legislation that stipulates powers to crack down on spying.

The law states procedures to inspect mobile phones, personal computers and other devices of individuals and organizations. more

Lawsuit Claim: Shopping App Temu - “Dangerous Malware,” Spying on Your Texts

Temu—the Chinese shopping app that has rapidly grown so popular in the US that even Amazon is reportedly trying to copy it—is "dangerous malware" that's secretly monetizing a broad swath of unauthorized user data, Arkansas Attorney General Tim Griffin alleged in a lawsuit filed Tuesday.

Griffin cited research and media reports exposing Temu's allegedly nefarious design, which "purposely" allows Temu to "gain unrestricted access to a user's phone operating system, including, but not limited to, a user's camera, specific location, contacts, text messages, documents, and other applications."

"Temu is designed to make this expansive access undetected, even by sophisticated users," Griffin's complaint said. "Once installed, Temu can recompile itself and change properties, including overriding the data privacy settings users believe they have in place." more

TeamViewer Confirms Cyberattack

TeamViewer, the prominent provider of remote access tools, has confirmed a significant cyberattack on its corporate network. 

This attack has been attributed to APT29, a hacking group allegedly linked to Russian intelligence. The breach, discovered on June 26, involved compromised credentials of an employee account, marking another sophisticated cyber-espionage campaign executed by state-sponsored hackers.


According to TeamViewer’s investigation, the breach began with the compromise of credentials from a standard employee account within their corporate IT environment. 

The company has emphasized that the attack was contained within its corporate network, assuring that their internal network and customer systems are separate...Despite these assurances, the company’s investigation is ongoing. more

App Slammed for Spying at Popular Nightclubs Using 'Hidden Cameras'

A new app has sparked extreme blowback after enabling users to use cameras to watch partiers at trendy nightclubs and bars across San Francisco.


2night, the startup behind the app, had hoped that the service would promote nightlife in the area, allowing users to check livestreams of the bars and clubs to determine if they had the right vibe.

But bargoers were quick to lash out after they learned that they were being recorded without their permission, with some going so far as to liken the service to 'Big Brother.' more

THOR: Disables Drone Swarm Attacks


The Department of Defense is exploring options to protect our warfighters further. Enter THOR, stage right. Tactical, High-power, Operational Responder (THOR), is a high-power microwave counter-drone weapon that the Air Force Research Lab has demonstrated for effective use against realistic targets. Watch this video to see how THOR tracks and turns off entire drone swarms. video

Bugging Did Not Pay

A mother who bugged her ex-boyfriend's car and redirected his post in a bid to get more child support is facing jail for stalking. Veronica Jackson, 44, secretly placed a tracker on Kevin McCormack's vehicle and diverted his letters to a drop-off location in a bid to prove he had a job - and could afford £200 monthly maintenance.

Jobless Mr McCormack had claimed he was only able to give £6.25 a week to help with the upkeep of the couple's 12-year-old daughter. Warrington Magistrates Court heard the pair had began a relationship in 2010 and had a daughter together in 2012, but they split up eight years later.

The court was told Mr McCormack received a series of messages from Jackson, from Macclesfield, Cheshire, showing routes he had taken to and from his home. They also included the times of the journeys and messages from Jackson saying: ''I know where you are - I know what you are doing.'' more

30 Spy Movies That Will Make You Want to Be a Secret Agent


Indeed, there are near-endless lists of spy films, but if you’re looking for the top choices, the ones that will captivate your senses, that aren’t just background noise, check out... more

Can You Name the Movie
1. A suave, smooth-talking secret agent and a a bullion dealer.
2. An elegant American interpreter living in Paris, outfitted in Givenchy.
3. In Prague, Czech Republic, a group of IMF agents.
4. A CIA intelligence analyst tracking the location of Osama bin Laden.
5. Extraterrestrials live on Earth, often wearing human shells blend into society.
6. An unnamed man is pulled out of an Italian fishing boat.
7. Joins forces with Russian agent Anya Amasova.
8. Russian operative claims that a mole named Salt plans on killing...
9. Running through the jungles of Uganda, assigned to spy on a terrorist cell.
10. During the fall of the Berlin Wall, sent to Germany to recover microfilm.
11. At the start, the villain escapes in a rocket and cryogenically freezes himself.
12. Captured by the evil TV host Fegan Floop.
13. A hard drive containing details of undercover agents was stolen.
14. Galahad, is in search of a new agent.
15. A girl living in a remote Finnish forest who is raised to be a lethal assassin.
16. They have no recollection of what their superiors said happened in Korea.
17. On vacation in London. Sees a bomb explode outside Buckingham Palace.
18. An advertising executive that is mistaken for government agent.
19. An ordinary man, at a music hall where shots are suddenly fired.
20. A mission to stop a terrorist group called the Apostles.
21. A New York lawyer enlisted by the CIA to defend a Russian spy.
22. He’s brought back to uncover a mole at the British Secret Service.
23. He is investigating the kidnapping of scientists who reappear brainwashed.
24. CIA codebreaker finds his colleagues murdered in the New York office.
25. A surveillance expert who is employed track a young couple.
26. A spy living a double life tracks nuclear rockets from jihadist Salim Abu Aziz.
27. CIA agent posing as an aid worker. Goal: enforce U.S. policies on Vietnam.
28. American daughter of a Nazi, enlisted to spy on escaped war criminals.
29. A World War II veteran charged with a superhuman serum.
30. Connects deaths to a new drug, Dypraxa. Uncovers British Intelligence.

Thursday, June 20, 2024

Security Cam Shoots Paintballs Like in 'Home Alone'

This Security Camera Shoots Paintballs at Intruders.


The track-and-shoot home security cam promises action, but we spot real-world problems after its hugely successful Kickstarter.*

What happens when you combine a paintball gun with a home security cam and smart tracking? All the potential chaos of the Eve PaintCam, an ambitious crowdsourced security camera equipped with smart detection -- and a paintball firing system to mark and scare away intruders.

From creator OZ-IT on Kickstarter and elsewhere, the Eve PaintCam wants people to live out their fantasies of total property control. It even promises face detection to avoid hitting friends (or specifically to hit friends, depending on your mood). more

* Be aware that some Kickstarter projects never materialize, and its use is probably illegal where you live.

Caught on Spycam: Lawmaker Pours Water into Colleague's Bag


A Republican state legislator in Vermont awkwardly apologized on the House floor on Monday after she was caught on hidden camera repeatedly pouring water into a Democratic colleague’s tote bag

State Rep. Mary Morrissey said she was “truly ashamed” of childishly targeting state Rep. Jim Carroll, who dealt with a soaked bag on numerous occasions over the last several months, in what he called “torment.”

“I have given my sincere apology to Jim directly and publicly and will be working towards resolution and restoration through our legislative process,” Morrissey said in front of fellow lawmakers. more

Surveillance News in the Digital World

• AI companies, including Google and OpenAI, are intensifying their screening of new hires due to the threat of Chinese espionage. more

• MICROSOFT ADMITS THAT MAYBE SURVEILING EVERYTHING YOU DO ON YOUR COMPUTER ISN’T A BRILLIANT IDEA... After announcing a new AI feature that records and screenshots everything you do, Microsoft is now delaying its launch after widespread objections. The company broke the news in a blog post detailing its decision not to ship the feature, dubbed Recall, on new computers so that it can continue to "leverage the expertise" of its Windows Insider Program (WIP) beta-testing community. more

• Zoom wants to make sure you’re paying attention.
The company filed a patent application for “scrolling motion detection” in video calls.

• Chinese Spy Tech Driving Junta Internet Crackdown: Justice For Myanmar... China supplied the spy technology and technicians that allowed Myanmar’s junta to intensify its internet surveillance and censorship late last month, Justice for Myanmar (JFM) said on Thursday, warning that China’s increased support for the junta will cost more lives. This support will allow the junta – which has imprisoned more than 25,000 people since the 2021 coup – to identify and jail more people who express dissent. more

• Canada - Public servants uneasy as government 'spy' robot prowls federal offices... A device federal public servants call "the little robot" began appearing in Gatineau office buildings in March. It travels through the workplace to collect data using about 20 sensors and a 360-degree camera, according to Yahya Saad, co-founder of GlobalDWS, which created the robot. "Using AI on the robot, the camera takes the picture, analyzes and counts the number of people and then discards the image," he said. more


Policing Minister's Wife in legal row over Claims of Corporate Espionage

A leading businesswoman who is married to the policing minister, Chris Philp, has been reported to the Crown Prosecution Service (CPS) by a former employer and is being sued in the high court over allegations of corporate espionage.

Elizabeth Philp, 40, whose husband has called for "zero tolerance" to all crime, is accused of data handling offences and unlawfully using "confidential information" from her former employer to set up a rival business.

She denies the allegations and is countersuing her former employer, which she accuses of cyber-attacking the website of the company she subsequently founded. more

Spybusters: Quote of the Week

“Our enemies are ancient cultures fighting for their survival, not just now but for the next thousand years.”
Alex Karp, CEO of Palantir commenting on Chinese spying on U.S. tech companies—“a huge problem.”

Summertime Blues: Pope faces investigation for ‘illegally wiretapping phones’

The Pope faces being investigated after allegedly authorised the unlawful wiretaps of phones in the sale of a London property.


The alleged authorisation is said to have taken place during a Vatican investigation into the “corrupt” sale of a €300 million property in London. 

"I’m gonna take two weeks
I’m gonna have a fine vacation
Gonna take my problems
To the United Nations..."


It comes after the legal team for British financier Raffaele Mincione filed a complaint to the UN. The complaint included details about alleged abuses that were carried out during the trial by Pope Francis.

Rodney Dixon KC, a human rights barrister, has claimed that the Pope approved for Mr Mincione’s phone to be wiretapped during the investigation into the alleged wrongdoing at the Vatican. The trial heard that the spiritual leader allowed investigators to tap phones, intercept emails and arrest anyone without approval from a judge. He made the decision based on ancient laws that the Pope had powers over these authorisations. more  sing-a-long

Friday, June 14, 2024

Beware the Spies in Disguise

Unethical hackers are often hired by companies for corporate espionage: to infiltrate the IT systems of rival organizations to steal sensitive information, trade secrets, and strategic plans. The information can provide a competitive advantage or be sold for financial gain.

Although getting in touch with these hackers is comparatively easier, they have now resorted to anonymous modes of messaging through discreet texting applications that do not store metadata. Such apps use encrypted chat rooms, which makes it difficult for authorities to trace communications.

The internet is also filled with tutorials providing step-by-step guides for many kinds of unethical hacking tasks, which are often used by tech-savvy anti-social elements.

On the other hand, hacking into social media accounts threatens the individual privacy of creators and is often used for blackmail and extortion. more

This is a major problem on LinkedIn. 
Here are some of the come-ons I receive...
  • It's nice to meet new people. Can we talk?
  • Hello, it's a pleasure to contact you. Your resume and skills are excellent. I hope to make friends with you.
  • I am Sophia, I checked your profile. I saw that your professional field is the talent we are looking for, which will be of great help to the new project I am about to start. If you are interested. You can leave your phone number and contact information, and I will arrange a time with you for a detailed conversation and make an appointment for a telephone conference. When is it convenient for you?
  • After reading your resume and work experience, I found that you are a very talented person! can we talk?
  • I think your field of work is great. Can we exchange ideas and learn from each other?
Spy Tip: Remember your Stranger Danger training.

This Week in Wiretapping, Eavesdropping & Spying

Ex-Pittsburgh police commander gets probation in wiretapping case. A former Pittsburgh police commander on Friday morning agreed to take 24 months of probation on charges that he stashed body-worn cameras in patrol cars last fall to secretly record more than a half-dozen of his own officers. more

Secret recording of Supreme Court justices raises legal questions. Posing as a "Christian conservative" at the Supreme Court Historical Society's members-only, black-tie gala, liberal journalist and filmmaker Lauren Windsor secretly recorded her conversations with Supreme Court Chief Justice John Roberts, Justice Samuel Alito and Alito's wife, Martha-Ann Alito. The event was not open to journalists. more

• The producers of the James Bond movies will receive honorary Oscars at a ceremony this November, the Academy said on Wednesday, as anticipation swells for the announcement of who will next play 007. Half-siblings Michael G. Wilson and Barbara Broccoli have controlled the beloved espionage franchise since 1995’s Goldeneye, having been passed the reins by Broccoli’s father Albert. more

• Is your employer spying on you? Here’s how to know for sure. For starters, workers are likely more at risk of being spied on when using company technology, such as phones or laptops. However, your device activity can also be monitored if you have company software downloaded to your personal devices, or if your personal tech is connected to the company network. more

• U.S. journalist Evan Gershkovich to stand trial in Russia on charges of spying for the CIA.
The Wall Street Journal reporter, 32, has spent more than a year in pretrial detention. more

• People are Spying on Travis Kelce's Missouri Home on Google Earth It's not easy being Kansas City Chief Travis Kelce. Oh, wait. It probably kind of is. Still, it's a little odd that many people seem to be spying on Travis Kelce's Kansas City, Missouri mansion on Google Earth. more

If You Have a Smartphone, Fog Reveal Probably Has Your Number

What is Fog Reveal? A legal scholar explains the app some police forces are using to track people without a warrant...

Government agencies and private security companies in the U.S. have found a cost-effective way to engage in warrantless surveillance of individuals, groups and places: a pay-for-access web tool called Fog Reveal.

The tool enables law enforcement officers to see “patterns of life” – where and when people work and live, with whom they associate and what places they visit. The tool’s maker, Fog Data Science, claims to have billions of data points from over 250 million U.S. mobile devices.

The tool – made possible by smart device technology and that difference between data privacy and electronic surveillance law protections – allows domestic law enforcement and private entities to buy access to compiled data about most U.S. mobile phones, including location data. It enables tracking and monitoring of people on a massive scale without court oversight or public transparency. more

China: ‘Secret’ Military Books Sold for Less Than US$1.

Chinese spy agency issues warning after ‘secret’ military books sold for less than US$1. 

China’s top spy agency has warned against the mishandling of confidential information as it tries to educate the public about its anti-espionage law, citing a case in which military-related materials were found to have been sold by a recycling station. 

On its official WeChat account on Thursday, the Ministry of State Security recounted the case of a man with the surname Zhang who bought four books from a waste recycling stationmore

Friday, June 7, 2024

Book: Dark Wire - "Secure Cell Phone" courtesy FBI

The Incredible True Story of the Largest Sting Operation Ever...


...in which the FBI made its own tech start-up to wiretap the world, shows how cunning both the authorities and drug traffickers have become, with privacy implications for everyone.

In 2018, a powerful app for secure communications called Anom took root among organized criminals. They believed Anom allowed them to conduct business in the shadows. Except for one thing: it was secretly run by the FBI. (Tip of the hat to N.C.)

Backdoor access to Anom and a series of related investigations granted American, Australian, and European authorities a front-row seat to the underworld. Tens of thousands of criminals worldwide appeared in full view of the same agents they were trying to evade. International smugglers. Money launderers. Hitmen. A sprawling global economy as efficient and interconnected as the legal one. Officers watched drug shipments and murder plots unfold, making arrests without blowing their cover. more

New Wireless Eavesdropping Vulnerability - Beam Deflection

A research team led by Rice University’s, Edward Knightly, has uncovered an eavesdropping security vulnerability in high-frequency and high-speed wireless backhaul links, widely employed in critical applications such as 5G wireless cell phone signals and low-latency financial trading on Wall Street.

Contrary to the common belief that these links are inherently secure due to their elevated positioning and highly directive millimeter-wave and sub-terahertz “pencil-beams,” the team exposed a novel method of interception using a metasurface-equipped drone dubbed MetaFly. Their findings were published by the world’s premier security conference, IEEE Symposium on Security and Privacy, in May 2024.


“The implications of our research are far-reaching, potentially affecting a broad spectrum of companies, government agencies and individuals relying on these links,” said Knightly, the Sheafor-Lindsay Professor of Electrical and Computer Engineering and professor of computer science. more